Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08/07/2022, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe
Resource
win10v2004-20220414-en
General
-
Target
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe
-
Size
352KB
-
MD5
0d704d7223e378e9e5c18d0f53e038da
-
SHA1
3f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb
-
SHA256
42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf
-
SHA512
f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+dacvq.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/779ED861476D90
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/779ED861476D90
http://yyre45dbvn2nhbefbmh.begumvelic.at/779ED861476D90
http://xlowfznrg4wf7dli.ONION/779ED861476D90
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+dacvq.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1248 lywnyvxecara.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertFromStop.raw => C:\Users\Admin\Pictures\ConvertFromStop.raw.mp3 lywnyvxecara.exe File renamed C:\Users\Admin\Pictures\InitializeProtect.crw => C:\Users\Admin\Pictures\InitializeProtect.crw.mp3 lywnyvxecara.exe File renamed C:\Users\Admin\Pictures\InstallDisconnect.raw => C:\Users\Admin\Pictures\InstallDisconnect.raw.mp3 lywnyvxecara.exe File renamed C:\Users\Admin\Pictures\SendComplete.png => C:\Users\Admin\Pictures\SendComplete.png.mp3 lywnyvxecara.exe -
Deletes itself 1 IoCs
pid Process 1648 cmd.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+dacvq.html lywnyvxecara.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run lywnyvxecara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\xaardjufidql = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\lywnyvxecara.exe\"" lywnyvxecara.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\resources.pak lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Windows NT\TableTextService\fr-FR\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\navBack.png lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rssBackBlue_Undocked.png lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\settings.css lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\localizedStrings.js lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\RSSFeeds.js lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Windows NT\TableTextService\fr-FR\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Windows Journal\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\30.png lywnyvxecara.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png lywnyvxecara.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\library.js lywnyvxecara.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_SelectionSubpicture.png lywnyvxecara.exe File opened for modification C:\Program Files\Google\Chrome\Application\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt lywnyvxecara.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMainMask_PAL.wmv lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground_PAL.wmv lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Java\jre7\_RECoVERY_+dacvq.txt lywnyvxecara.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\Microsoft Office\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_RECoVERY_+dacvq.png lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_RECoVERY_+dacvq.html lywnyvxecara.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\_RECoVERY_+dacvq.html lywnyvxecara.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\lywnyvxecara.exe 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe File opened for modification C:\Windows\lywnyvxecara.exe 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73F72621-FE70-11EC-AA2F-C621D3E3FB96} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 lywnyvxecara.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 lywnyvxecara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 lywnyvxecara.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 lywnyvxecara.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 lywnyvxecara.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 lywnyvxecara.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 212 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe 1248 lywnyvxecara.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe Token: SeDebugPrivilege 1248 lywnyvxecara.exe Token: SeIncreaseQuotaPrivilege 568 WMIC.exe Token: SeSecurityPrivilege 568 WMIC.exe Token: SeTakeOwnershipPrivilege 568 WMIC.exe Token: SeLoadDriverPrivilege 568 WMIC.exe Token: SeSystemProfilePrivilege 568 WMIC.exe Token: SeSystemtimePrivilege 568 WMIC.exe Token: SeProfSingleProcessPrivilege 568 WMIC.exe Token: SeIncBasePriorityPrivilege 568 WMIC.exe Token: SeCreatePagefilePrivilege 568 WMIC.exe Token: SeBackupPrivilege 568 WMIC.exe Token: SeRestorePrivilege 568 WMIC.exe Token: SeShutdownPrivilege 568 WMIC.exe Token: SeDebugPrivilege 568 WMIC.exe Token: SeSystemEnvironmentPrivilege 568 WMIC.exe Token: SeRemoteShutdownPrivilege 568 WMIC.exe Token: SeUndockPrivilege 568 WMIC.exe Token: SeManageVolumePrivilege 568 WMIC.exe Token: 33 568 WMIC.exe Token: 34 568 WMIC.exe Token: 35 568 WMIC.exe Token: SeIncreaseQuotaPrivilege 568 WMIC.exe Token: SeSecurityPrivilege 568 WMIC.exe Token: SeTakeOwnershipPrivilege 568 WMIC.exe Token: SeLoadDriverPrivilege 568 WMIC.exe Token: SeSystemProfilePrivilege 568 WMIC.exe Token: SeSystemtimePrivilege 568 WMIC.exe Token: SeProfSingleProcessPrivilege 568 WMIC.exe Token: SeIncBasePriorityPrivilege 568 WMIC.exe Token: SeCreatePagefilePrivilege 568 WMIC.exe Token: SeBackupPrivilege 568 WMIC.exe Token: SeRestorePrivilege 568 WMIC.exe Token: SeShutdownPrivilege 568 WMIC.exe Token: SeDebugPrivilege 568 WMIC.exe Token: SeSystemEnvironmentPrivilege 568 WMIC.exe Token: SeRemoteShutdownPrivilege 568 WMIC.exe Token: SeUndockPrivilege 568 WMIC.exe Token: SeManageVolumePrivilege 568 WMIC.exe Token: 33 568 WMIC.exe Token: 34 568 WMIC.exe Token: 35 568 WMIC.exe Token: SeBackupPrivilege 560 vssvc.exe Token: SeRestorePrivilege 560 vssvc.exe Token: SeAuditPrivilege 560 vssvc.exe Token: SeIncreaseQuotaPrivilege 1440 WMIC.exe Token: SeSecurityPrivilege 1440 WMIC.exe Token: SeTakeOwnershipPrivilege 1440 WMIC.exe Token: SeLoadDriverPrivilege 1440 WMIC.exe Token: SeSystemProfilePrivilege 1440 WMIC.exe Token: SeSystemtimePrivilege 1440 WMIC.exe Token: SeProfSingleProcessPrivilege 1440 WMIC.exe Token: SeIncBasePriorityPrivilege 1440 WMIC.exe Token: SeCreatePagefilePrivilege 1440 WMIC.exe Token: SeBackupPrivilege 1440 WMIC.exe Token: SeRestorePrivilege 1440 WMIC.exe Token: SeShutdownPrivilege 1440 WMIC.exe Token: SeDebugPrivilege 1440 WMIC.exe Token: SeSystemEnvironmentPrivilege 1440 WMIC.exe Token: SeRemoteShutdownPrivilege 1440 WMIC.exe Token: SeUndockPrivilege 1440 WMIC.exe Token: SeManageVolumePrivilege 1440 WMIC.exe Token: 33 1440 WMIC.exe Token: 34 1440 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 232 iexplore.exe 1628 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 232 iexplore.exe 232 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1248 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 27 PID 2024 wrote to memory of 1248 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 27 PID 2024 wrote to memory of 1248 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 27 PID 2024 wrote to memory of 1248 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 27 PID 2024 wrote to memory of 1648 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 28 PID 2024 wrote to memory of 1648 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 28 PID 2024 wrote to memory of 1648 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 28 PID 2024 wrote to memory of 1648 2024 42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe 28 PID 1248 wrote to memory of 568 1248 lywnyvxecara.exe 30 PID 1248 wrote to memory of 568 1248 lywnyvxecara.exe 30 PID 1248 wrote to memory of 568 1248 lywnyvxecara.exe 30 PID 1248 wrote to memory of 568 1248 lywnyvxecara.exe 30 PID 1248 wrote to memory of 212 1248 lywnyvxecara.exe 39 PID 1248 wrote to memory of 212 1248 lywnyvxecara.exe 39 PID 1248 wrote to memory of 212 1248 lywnyvxecara.exe 39 PID 1248 wrote to memory of 212 1248 lywnyvxecara.exe 39 PID 1248 wrote to memory of 232 1248 lywnyvxecara.exe 40 PID 1248 wrote to memory of 232 1248 lywnyvxecara.exe 40 PID 1248 wrote to memory of 232 1248 lywnyvxecara.exe 40 PID 1248 wrote to memory of 232 1248 lywnyvxecara.exe 40 PID 1248 wrote to memory of 1440 1248 lywnyvxecara.exe 43 PID 1248 wrote to memory of 1440 1248 lywnyvxecara.exe 43 PID 1248 wrote to memory of 1440 1248 lywnyvxecara.exe 43 PID 1248 wrote to memory of 1440 1248 lywnyvxecara.exe 43 PID 232 wrote to memory of 1592 232 iexplore.exe 42 PID 232 wrote to memory of 1592 232 iexplore.exe 42 PID 232 wrote to memory of 1592 232 iexplore.exe 42 PID 232 wrote to memory of 1592 232 iexplore.exe 42 PID 1248 wrote to memory of 1828 1248 lywnyvxecara.exe 46 PID 1248 wrote to memory of 1828 1248 lywnyvxecara.exe 46 PID 1248 wrote to memory of 1828 1248 lywnyvxecara.exe 46 PID 1248 wrote to memory of 1828 1248 lywnyvxecara.exe 46 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" lywnyvxecara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lywnyvxecara.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe"C:\Users\Admin\AppData\Local\Temp\42b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\lywnyvxecara.exeC:\Windows\lywnyvxecara.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1248 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- Opens file in notepad (likely ransom note)
PID:212
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:232 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LYWNYV~1.EXE3⤵PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\42B053~1.EXE2⤵
- Deletes itself
PID:1648
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5aa93108c9fc63659bd51e38944f21eb7
SHA1208a472c677904d0c82286d7967ad231a4c81314
SHA25645fed373684f03044186850bcc7445486d11b51f28373d315abbd7e9d19a01fb
SHA512e3bc8be71f08b05724840581866d53b394176e135c2837980b284d39bb6db56f219bf6982c6dd50270a267478b8bcaea65574abea21fa886e798bef5a0590a69
-
Filesize
1KB
MD507ee92b341201ae74248b206650e50e0
SHA1d5ae1fc341ab234bd927989146f6050eaf7c15b3
SHA2565d317444e56e990fc69a36ba79c3358c6d45f928991f0e2f2f0d3ba3f3809a84
SHA512bb0d97fed3c61f282e7597ca9ff8f5601cb8bb7db3835b992452061f079aad2b0526cbe8e18d014151b00dd2738df9c8c242ebe5913bc587985a4edc9b52c010
-
Filesize
64KB
MD54ec4c9d4c2873ddd4d085e1a024f9060
SHA12863846684b833ea3a2d399afd3175cec9a979bb
SHA2563d5828d87db739327c7ad0b0f5106a81544323fc8e07f4c271aedf2f2377a518
SHA512f536c067799e10ee22fb6b9a3e3290ed4cbcae2fde5ed451ada5188403cf7f3de4383c5ab0a96c7938e32a8a78e43386d1f010f06a21af8964228bf0d504fe5b
-
Filesize
352KB
MD50d704d7223e378e9e5c18d0f53e038da
SHA13f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb
SHA25642b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf
SHA512f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85
-
Filesize
352KB
MD50d704d7223e378e9e5c18d0f53e038da
SHA13f6bc9426c8e3eff59b8aad08cdb050ec2d3e7cb
SHA25642b053c01ac747b6f67dba1c108c70f379fb84770f9884537167e6f5eb5e8fcf
SHA512f8dabf5ef228f143a699a31e366aa6af3fc13ada4a39448b3982e34c30e2afaeccf3b91c5b2d267ab895b8ffbe7da0daab13f8e49474dd68e47b923c9fd2eb85