Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 01:58
Static task
static1
Behavioral task
behavioral1
Sample
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe
Resource
win10v2004-20220414-en
General
-
Target
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe
-
Size
418KB
-
MD5
5a12efa968ba9182beca5d192342529f
-
SHA1
4bac6715187a58c2ea324a4aa1a086a16be05084
-
SHA256
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4
-
SHA512
866dc487d94d86e73ddda3b6a73c462beb576cdca396400acb9036ae57462613a47ed20bdfcd2d3a1b44f6f3fde2fc94b44314eaf1e3f602b0096c9911de5925
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+akhbw.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/217048DADA834DA0
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/217048DADA834DA0
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/217048DADA834DA0
http://xlowfznrg4wf7dli.ONION/217048DADA834DA0
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
pckxpsgevkte.exepckxpsgevkte.exepid Process 1740 pckxpsgevkte.exe 1736 pckxpsgevkte.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1732 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
pckxpsgevkte.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run pckxpsgevkte.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\iejfkjphsojf = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\pckxpsgevkte.exe\"" pckxpsgevkte.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exepckxpsgevkte.exedescription pid Process procid_target PID 304 set thread context of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 1740 set thread context of 1736 1740 pckxpsgevkte.exe 30 -
Drops file in Program Files directory 64 IoCs
Processes:
pckxpsgevkte.exedescription ioc Process File opened for modification C:\Program Files\Common Files\System\en-US\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\it-IT\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\en-US\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\1047x576black.png pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_SelectionSubpicture.png pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Services\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\1047x576black.png pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\play-static.png pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_PreComp_MATTE_PAL.wmv pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\ado\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_VideoInset.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\_RECoVERY_+akhbw.png pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\System\ado\_RECoVERY_+akhbw.txt pckxpsgevkte.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\_RECoVERY_+akhbw.html pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground_PAL.wmv pckxpsgevkte.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png pckxpsgevkte.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt pckxpsgevkte.exe -
Drops file in Windows directory 2 IoCs
Processes:
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exedescription ioc Process File opened for modification C:\Windows\pckxpsgevkte.exe 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe File created C:\Windows\pckxpsgevkte.exe 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
pckxpsgevkte.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 pckxpsgevkte.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 pckxpsgevkte.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 pckxpsgevkte.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 pckxpsgevkte.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 pckxpsgevkte.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 pckxpsgevkte.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pckxpsgevkte.exepid Process 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe 1736 pckxpsgevkte.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exepckxpsgevkte.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe Token: SeDebugPrivilege 1736 pckxpsgevkte.exe Token: SeIncreaseQuotaPrivilege 1996 WMIC.exe Token: SeSecurityPrivilege 1996 WMIC.exe Token: SeTakeOwnershipPrivilege 1996 WMIC.exe Token: SeLoadDriverPrivilege 1996 WMIC.exe Token: SeSystemProfilePrivilege 1996 WMIC.exe Token: SeSystemtimePrivilege 1996 WMIC.exe Token: SeProfSingleProcessPrivilege 1996 WMIC.exe Token: SeIncBasePriorityPrivilege 1996 WMIC.exe Token: SeCreatePagefilePrivilege 1996 WMIC.exe Token: SeBackupPrivilege 1996 WMIC.exe Token: SeRestorePrivilege 1996 WMIC.exe Token: SeShutdownPrivilege 1996 WMIC.exe Token: SeDebugPrivilege 1996 WMIC.exe Token: SeSystemEnvironmentPrivilege 1996 WMIC.exe Token: SeRemoteShutdownPrivilege 1996 WMIC.exe Token: SeUndockPrivilege 1996 WMIC.exe Token: SeManageVolumePrivilege 1996 WMIC.exe Token: 33 1996 WMIC.exe Token: 34 1996 WMIC.exe Token: 35 1996 WMIC.exe Token: SeIncreaseQuotaPrivilege 1996 WMIC.exe Token: SeSecurityPrivilege 1996 WMIC.exe Token: SeTakeOwnershipPrivilege 1996 WMIC.exe Token: SeLoadDriverPrivilege 1996 WMIC.exe Token: SeSystemProfilePrivilege 1996 WMIC.exe Token: SeSystemtimePrivilege 1996 WMIC.exe Token: SeProfSingleProcessPrivilege 1996 WMIC.exe Token: SeIncBasePriorityPrivilege 1996 WMIC.exe Token: SeCreatePagefilePrivilege 1996 WMIC.exe Token: SeBackupPrivilege 1996 WMIC.exe Token: SeRestorePrivilege 1996 WMIC.exe Token: SeShutdownPrivilege 1996 WMIC.exe Token: SeDebugPrivilege 1996 WMIC.exe Token: SeSystemEnvironmentPrivilege 1996 WMIC.exe Token: SeRemoteShutdownPrivilege 1996 WMIC.exe Token: SeUndockPrivilege 1996 WMIC.exe Token: SeManageVolumePrivilege 1996 WMIC.exe Token: 33 1996 WMIC.exe Token: 34 1996 WMIC.exe Token: 35 1996 WMIC.exe Token: SeBackupPrivilege 972 vssvc.exe Token: SeRestorePrivilege 972 vssvc.exe Token: SeAuditPrivilege 972 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exepckxpsgevkte.exepckxpsgevkte.exedescription pid Process procid_target PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 304 wrote to memory of 916 304 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 26 PID 916 wrote to memory of 1740 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 27 PID 916 wrote to memory of 1740 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 27 PID 916 wrote to memory of 1740 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 27 PID 916 wrote to memory of 1740 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 27 PID 916 wrote to memory of 1732 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 28 PID 916 wrote to memory of 1732 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 28 PID 916 wrote to memory of 1732 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 28 PID 916 wrote to memory of 1732 916 429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe 28 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1740 wrote to memory of 1736 1740 pckxpsgevkte.exe 30 PID 1736 wrote to memory of 1996 1736 pckxpsgevkte.exe 31 PID 1736 wrote to memory of 1996 1736 pckxpsgevkte.exe 31 PID 1736 wrote to memory of 1996 1736 pckxpsgevkte.exe 31 PID 1736 wrote to memory of 1996 1736 pckxpsgevkte.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
pckxpsgevkte.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pckxpsgevkte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" pckxpsgevkte.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe"C:\Users\Admin\AppData\Local\Temp\429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe"C:\Users\Admin\AppData\Local\Temp\429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\pckxpsgevkte.exeC:\Windows\pckxpsgevkte.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\pckxpsgevkte.exeC:\Windows\pckxpsgevkte.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1736 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\429C7D~1.EXE3⤵
- Deletes itself
PID:1732
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418KB
MD55a12efa968ba9182beca5d192342529f
SHA14bac6715187a58c2ea324a4aa1a086a16be05084
SHA256429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4
SHA512866dc487d94d86e73ddda3b6a73c462beb576cdca396400acb9036ae57462613a47ed20bdfcd2d3a1b44f6f3fde2fc94b44314eaf1e3f602b0096c9911de5925
-
Filesize
418KB
MD55a12efa968ba9182beca5d192342529f
SHA14bac6715187a58c2ea324a4aa1a086a16be05084
SHA256429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4
SHA512866dc487d94d86e73ddda3b6a73c462beb576cdca396400acb9036ae57462613a47ed20bdfcd2d3a1b44f6f3fde2fc94b44314eaf1e3f602b0096c9911de5925
-
Filesize
418KB
MD55a12efa968ba9182beca5d192342529f
SHA14bac6715187a58c2ea324a4aa1a086a16be05084
SHA256429c7d9da94ad491151a1d2c09c248bddf02ff53ceccb3bca4463ba8c025bdf4
SHA512866dc487d94d86e73ddda3b6a73c462beb576cdca396400acb9036ae57462613a47ed20bdfcd2d3a1b44f6f3fde2fc94b44314eaf1e3f602b0096c9911de5925