Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 21:13
Static task
static1
Behavioral task
behavioral1
Sample
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe
Resource
win10v2004-20220414-en
General
-
Target
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe
-
Size
336KB
-
MD5
2c213eac311b385bba88f42c04a5ba73
-
SHA1
eb1ef4ab7662e500b0641fd9a1850b30da181908
-
SHA256
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
-
SHA512
f03e8a10e1054312a2ef18e374b97f2d28fa28ba470bfafa1c6a5026c87e08c3e6eab7914fec0da8255c5246614068c61450e921760a48c7c5c6b378ebe13c74
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\Recovery+wdkkx.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5D2512473AEA1D2
http://tes543berda73i48fsdfsd.keratadze.at/5D2512473AEA1D2
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/5D2512473AEA1D2
http://xlowfznrg4wf7dli.ONION/5D2512473AEA1D2
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
lycexmikkggt.exelycexmikkggt.exepid Process 1712 lycexmikkggt.exe 1864 lycexmikkggt.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 940 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
lycexmikkggt.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run lycexmikkggt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\pfdulkdmxcrh = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\lycexmikkggt.exe\"" lycexmikkggt.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exelycexmikkggt.exedescription pid Process procid_target PID 1948 set thread context of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1712 set thread context of 1864 1712 lycexmikkggt.exe 31 -
Drops file in Program Files directory 64 IoCs
Processes:
lycexmikkggt.exedescription ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_ButtonGraphic.png lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ar.pak lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\menu_style_default_Thumbnail.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonSubpicture.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\applet\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_ButtonGraphic.png lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluHandle.png lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\hu.pak lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\th.pak lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\vignettemask25.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\7-Zip\History.txt lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_videoinset.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\Recovery+wdkkx.png lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png lycexmikkggt.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_win.css lycexmikkggt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\Recovery+wdkkx.html lycexmikkggt.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Recovery+wdkkx.txt lycexmikkggt.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\Recovery+wdkkx.txt lycexmikkggt.exe -
Drops file in Windows directory 2 IoCs
Processes:
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exedescription ioc Process File created C:\Windows\lycexmikkggt.exe 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe File opened for modification C:\Windows\lycexmikkggt.exe 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
lycexmikkggt.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 lycexmikkggt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 lycexmikkggt.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 lycexmikkggt.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 lycexmikkggt.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 lycexmikkggt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 lycexmikkggt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
lycexmikkggt.exepid Process 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe 1864 lycexmikkggt.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exelycexmikkggt.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe Token: SeDebugPrivilege 1864 lycexmikkggt.exe Token: SeIncreaseQuotaPrivilege 896 WMIC.exe Token: SeSecurityPrivilege 896 WMIC.exe Token: SeTakeOwnershipPrivilege 896 WMIC.exe Token: SeLoadDriverPrivilege 896 WMIC.exe Token: SeSystemProfilePrivilege 896 WMIC.exe Token: SeSystemtimePrivilege 896 WMIC.exe Token: SeProfSingleProcessPrivilege 896 WMIC.exe Token: SeIncBasePriorityPrivilege 896 WMIC.exe Token: SeCreatePagefilePrivilege 896 WMIC.exe Token: SeBackupPrivilege 896 WMIC.exe Token: SeRestorePrivilege 896 WMIC.exe Token: SeShutdownPrivilege 896 WMIC.exe Token: SeDebugPrivilege 896 WMIC.exe Token: SeSystemEnvironmentPrivilege 896 WMIC.exe Token: SeRemoteShutdownPrivilege 896 WMIC.exe Token: SeUndockPrivilege 896 WMIC.exe Token: SeManageVolumePrivilege 896 WMIC.exe Token: 33 896 WMIC.exe Token: 34 896 WMIC.exe Token: 35 896 WMIC.exe Token: SeIncreaseQuotaPrivilege 896 WMIC.exe Token: SeSecurityPrivilege 896 WMIC.exe Token: SeTakeOwnershipPrivilege 896 WMIC.exe Token: SeLoadDriverPrivilege 896 WMIC.exe Token: SeSystemProfilePrivilege 896 WMIC.exe Token: SeSystemtimePrivilege 896 WMIC.exe Token: SeProfSingleProcessPrivilege 896 WMIC.exe Token: SeIncBasePriorityPrivilege 896 WMIC.exe Token: SeCreatePagefilePrivilege 896 WMIC.exe Token: SeBackupPrivilege 896 WMIC.exe Token: SeRestorePrivilege 896 WMIC.exe Token: SeShutdownPrivilege 896 WMIC.exe Token: SeDebugPrivilege 896 WMIC.exe Token: SeSystemEnvironmentPrivilege 896 WMIC.exe Token: SeRemoteShutdownPrivilege 896 WMIC.exe Token: SeUndockPrivilege 896 WMIC.exe Token: SeManageVolumePrivilege 896 WMIC.exe Token: 33 896 WMIC.exe Token: 34 896 WMIC.exe Token: 35 896 WMIC.exe Token: SeBackupPrivilege 1940 vssvc.exe Token: SeRestorePrivilege 1940 vssvc.exe Token: SeAuditPrivilege 1940 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exelycexmikkggt.exelycexmikkggt.exedescription pid Process procid_target PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1948 wrote to memory of 1016 1948 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 27 PID 1016 wrote to memory of 1712 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 28 PID 1016 wrote to memory of 1712 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 28 PID 1016 wrote to memory of 1712 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 28 PID 1016 wrote to memory of 1712 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 28 PID 1016 wrote to memory of 940 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 29 PID 1016 wrote to memory of 940 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 29 PID 1016 wrote to memory of 940 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 29 PID 1016 wrote to memory of 940 1016 43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe 29 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1712 wrote to memory of 1864 1712 lycexmikkggt.exe 31 PID 1864 wrote to memory of 896 1864 lycexmikkggt.exe 32 PID 1864 wrote to memory of 896 1864 lycexmikkggt.exe 32 PID 1864 wrote to memory of 896 1864 lycexmikkggt.exe 32 PID 1864 wrote to memory of 896 1864 lycexmikkggt.exe 32 -
System policy modification 1 TTPs 2 IoCs
Processes:
lycexmikkggt.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lycexmikkggt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" lycexmikkggt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe"C:\Users\Admin\AppData\Local\Temp\43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe"C:\Users\Admin\AppData\Local\Temp\43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\lycexmikkggt.exeC:\Windows\lycexmikkggt.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\lycexmikkggt.exeC:\Windows\lycexmikkggt.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1864 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\43F7C5~1.EXE3⤵
- Deletes itself
PID:940
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD52c213eac311b385bba88f42c04a5ba73
SHA1eb1ef4ab7662e500b0641fd9a1850b30da181908
SHA25643f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
SHA512f03e8a10e1054312a2ef18e374b97f2d28fa28ba470bfafa1c6a5026c87e08c3e6eab7914fec0da8255c5246614068c61450e921760a48c7c5c6b378ebe13c74
-
Filesize
336KB
MD52c213eac311b385bba88f42c04a5ba73
SHA1eb1ef4ab7662e500b0641fd9a1850b30da181908
SHA25643f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
SHA512f03e8a10e1054312a2ef18e374b97f2d28fa28ba470bfafa1c6a5026c87e08c3e6eab7914fec0da8255c5246614068c61450e921760a48c7c5c6b378ebe13c74
-
Filesize
336KB
MD52c213eac311b385bba88f42c04a5ba73
SHA1eb1ef4ab7662e500b0641fd9a1850b30da181908
SHA25643f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
SHA512f03e8a10e1054312a2ef18e374b97f2d28fa28ba470bfafa1c6a5026c87e08c3e6eab7914fec0da8255c5246614068c61450e921760a48c7c5c6b378ebe13c74