Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 21:10
Static task
static1
Behavioral task
behavioral1
Sample
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe
Resource
win10v2004-20220414-en
General
-
Target
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe
-
Size
364KB
-
MD5
833c63e2520b66e2d6931dc117463ca5
-
SHA1
e1cd37f586a25fe7681d8c5ec41500ddaa112fc3
-
SHA256
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0
-
SHA512
9e374ad770a3983967fee753832ae16c86218122d18a5ed052983f64e468bc8fa2d5570396ce8948b411be429e4a932a7d1d47af42767bf1a0edba65edf9c9a6
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+sunpu.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/82DC8A17F94E51C3
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/82DC8A17F94E51C3
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/82DC8A17F94E51C3
http://xlowfznrg4wf7dli.ONION/82DC8A17F94E51C3
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
buhalhqxwlhb.exepid Process 1284 buhalhqxwlhb.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
buhalhqxwlhb.exedescription ioc Process File renamed C:\Users\Admin\Pictures\InvokeExport.raw => C:\Users\Admin\Pictures\InvokeExport.raw.mp3 buhalhqxwlhb.exe File renamed C:\Users\Admin\Pictures\ReceiveInvoke.raw => C:\Users\Admin\Pictures\ReceiveInvoke.raw.mp3 buhalhqxwlhb.exe File renamed C:\Users\Admin\Pictures\UnblockUninstall.png => C:\Users\Admin\Pictures\UnblockUninstall.png.mp3 buhalhqxwlhb.exe File renamed C:\Users\Admin\Pictures\UnlockLock.raw => C:\Users\Admin\Pictures\UnlockLock.raw.mp3 buhalhqxwlhb.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1740 cmd.exe -
Drops startup file 3 IoCs
Processes:
buhalhqxwlhb.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+sunpu.html buhalhqxwlhb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
buhalhqxwlhb.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run buhalhqxwlhb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\opjaeufcvdid = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\buhalhqxwlhb.exe\"" buhalhqxwlhb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
buhalhqxwlhb.exedescription ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\settings.js buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\22.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\divider-horizontal.png buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows NT\Accessories\de-DE\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_thunderstorm.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\5.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous.png buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonDown_Off.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\currency.js buhalhqxwlhb.exe File opened for modification C:\Program Files\Common Files\Services\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_disabled.png buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\currency.js buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\fr-FR\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationLeft_SelectionSubpicture.png buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_docked.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-previous-static.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\calendar.js buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-4.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\header-background.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_RECoVERY_+sunpu.html buhalhqxwlhb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_RECoVERY_+sunpu.png buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_RECoVERY_+sunpu.txt buhalhqxwlhb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\next_hov.png buhalhqxwlhb.exe -
Drops file in Windows directory 2 IoCs
Processes:
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exedescription ioc Process File opened for modification C:\Windows\buhalhqxwlhb.exe 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe File created C:\Windows\buhalhqxwlhb.exe 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
buhalhqxwlhb.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 buhalhqxwlhb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 buhalhqxwlhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 buhalhqxwlhb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 buhalhqxwlhb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 buhalhqxwlhb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 buhalhqxwlhb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
buhalhqxwlhb.exepid Process 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe 1284 buhalhqxwlhb.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exebuhalhqxwlhb.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe Token: SeDebugPrivilege 1284 buhalhqxwlhb.exe Token: SeIncreaseQuotaPrivilege 1392 WMIC.exe Token: SeSecurityPrivilege 1392 WMIC.exe Token: SeTakeOwnershipPrivilege 1392 WMIC.exe Token: SeLoadDriverPrivilege 1392 WMIC.exe Token: SeSystemProfilePrivilege 1392 WMIC.exe Token: SeSystemtimePrivilege 1392 WMIC.exe Token: SeProfSingleProcessPrivilege 1392 WMIC.exe Token: SeIncBasePriorityPrivilege 1392 WMIC.exe Token: SeCreatePagefilePrivilege 1392 WMIC.exe Token: SeBackupPrivilege 1392 WMIC.exe Token: SeRestorePrivilege 1392 WMIC.exe Token: SeShutdownPrivilege 1392 WMIC.exe Token: SeDebugPrivilege 1392 WMIC.exe Token: SeSystemEnvironmentPrivilege 1392 WMIC.exe Token: SeRemoteShutdownPrivilege 1392 WMIC.exe Token: SeUndockPrivilege 1392 WMIC.exe Token: SeManageVolumePrivilege 1392 WMIC.exe Token: 33 1392 WMIC.exe Token: 34 1392 WMIC.exe Token: 35 1392 WMIC.exe Token: SeIncreaseQuotaPrivilege 1392 WMIC.exe Token: SeSecurityPrivilege 1392 WMIC.exe Token: SeTakeOwnershipPrivilege 1392 WMIC.exe Token: SeLoadDriverPrivilege 1392 WMIC.exe Token: SeSystemProfilePrivilege 1392 WMIC.exe Token: SeSystemtimePrivilege 1392 WMIC.exe Token: SeProfSingleProcessPrivilege 1392 WMIC.exe Token: SeIncBasePriorityPrivilege 1392 WMIC.exe Token: SeCreatePagefilePrivilege 1392 WMIC.exe Token: SeBackupPrivilege 1392 WMIC.exe Token: SeRestorePrivilege 1392 WMIC.exe Token: SeShutdownPrivilege 1392 WMIC.exe Token: SeDebugPrivilege 1392 WMIC.exe Token: SeSystemEnvironmentPrivilege 1392 WMIC.exe Token: SeRemoteShutdownPrivilege 1392 WMIC.exe Token: SeUndockPrivilege 1392 WMIC.exe Token: SeManageVolumePrivilege 1392 WMIC.exe Token: 33 1392 WMIC.exe Token: 34 1392 WMIC.exe Token: 35 1392 WMIC.exe Token: SeBackupPrivilege 812 vssvc.exe Token: SeRestorePrivilege 812 vssvc.exe Token: SeAuditPrivilege 812 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exebuhalhqxwlhb.exedescription pid Process procid_target PID 1552 wrote to memory of 1284 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 27 PID 1552 wrote to memory of 1284 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 27 PID 1552 wrote to memory of 1284 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 27 PID 1552 wrote to memory of 1284 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 27 PID 1552 wrote to memory of 1740 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 28 PID 1552 wrote to memory of 1740 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 28 PID 1552 wrote to memory of 1740 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 28 PID 1552 wrote to memory of 1740 1552 43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe 28 PID 1284 wrote to memory of 1392 1284 buhalhqxwlhb.exe 30 PID 1284 wrote to memory of 1392 1284 buhalhqxwlhb.exe 30 PID 1284 wrote to memory of 1392 1284 buhalhqxwlhb.exe 30 PID 1284 wrote to memory of 1392 1284 buhalhqxwlhb.exe 30 -
System policy modification 1 TTPs 2 IoCs
Processes:
buhalhqxwlhb.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System buhalhqxwlhb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" buhalhqxwlhb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe"C:\Users\Admin\AppData\Local\Temp\43fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\buhalhqxwlhb.exeC:\Windows\buhalhqxwlhb.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1284 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\43FC62~1.EXE2⤵
- Deletes itself
PID:1740
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5833c63e2520b66e2d6931dc117463ca5
SHA1e1cd37f586a25fe7681d8c5ec41500ddaa112fc3
SHA25643fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0
SHA5129e374ad770a3983967fee753832ae16c86218122d18a5ed052983f64e468bc8fa2d5570396ce8948b411be429e4a932a7d1d47af42767bf1a0edba65edf9c9a6
-
Filesize
364KB
MD5833c63e2520b66e2d6931dc117463ca5
SHA1e1cd37f586a25fe7681d8c5ec41500ddaa112fc3
SHA25643fc62690894f36af348e9051901f8456c2e375e0ce973b1e4a6d24dfd927fe0
SHA5129e374ad770a3983967fee753832ae16c86218122d18a5ed052983f64e468bc8fa2d5570396ce8948b411be429e4a932a7d1d47af42767bf1a0edba65edf9c9a6