Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe
Resource
win10v2004-20220414-en
General
-
Target
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe
-
Size
308KB
-
MD5
2854f3ee319e80dd485446f4acae042e
-
SHA1
01086bd863fdf7c8eb1e732bacdd914f09d355e2
-
SHA256
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
-
SHA512
4991feb491391cf44ae61128084f9c725c30df4640783293c72cd9801a216ef026ded9fda50e23c222bd3cbe74aeed9d785b5e58ff66410b85fd5b799c483aa4
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+tsmpu.txt
teslacrypt
http://t54ndnku456ngkwsudqer.wallymac.com/49E71824CFF979B1
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/49E71824CFF979B1
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/49E71824CFF979B1
http://xlowfznrg4wf7dli.ONION/49E71824CFF979B1
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+tsmpu.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
cdsfqjtspkft.execdsfqjtspkft.exepid Process 2796 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.execdsfqjtspkft.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation cdsfqjtspkft.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cdsfqjtspkft.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN cdsfqjtspkft.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ysjjodi = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\cdsfqjtspkft.exe" cdsfqjtspkft.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.execdsfqjtspkft.exedescription pid Process procid_target PID 3044 set thread context of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 2796 set thread context of 1896 2796 cdsfqjtspkft.exe 89 -
Drops file in Program Files directory 64 IoCs
Processes:
cdsfqjtspkft.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\ro.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_ReCoVeRy_+tsmpu.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\_ReCoVeRy_+tsmpu.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ru-RU\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\History.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\_ReCoVeRy_+tsmpu.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoCanary.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Internet Explorer\en-US\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\_ReCoVeRy_+tsmpu.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\_ReCoVeRy_+tsmpu.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\_ReCoVeRy_+tsmpu.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lv.pak cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\DESIGNER\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-TW\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\msadc\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sl.pak cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nl-NL\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\th-TH\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\System\es-ES\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ko.pak cdsfqjtspkft.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\7-Zip\readme.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\_ReCoVeRy_+tsmpu.txt cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nb-NO\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\_ReCoVeRy_+tsmpu.png cdsfqjtspkft.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\_ReCoVeRy_+tsmpu.html cdsfqjtspkft.exe -
Drops file in Windows directory 2 IoCs
Processes:
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exedescription ioc Process File created C:\Windows\cdsfqjtspkft.exe 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe File opened for modification C:\Windows\cdsfqjtspkft.exe 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cdsfqjtspkft.exepid Process 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe 1896 cdsfqjtspkft.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.execdsfqjtspkft.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 4088 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe Token: SeDebugPrivilege 1896 cdsfqjtspkft.exe Token: SeIncreaseQuotaPrivilege 3784 WMIC.exe Token: SeSecurityPrivilege 3784 WMIC.exe Token: SeTakeOwnershipPrivilege 3784 WMIC.exe Token: SeLoadDriverPrivilege 3784 WMIC.exe Token: SeSystemProfilePrivilege 3784 WMIC.exe Token: SeSystemtimePrivilege 3784 WMIC.exe Token: SeProfSingleProcessPrivilege 3784 WMIC.exe Token: SeIncBasePriorityPrivilege 3784 WMIC.exe Token: SeCreatePagefilePrivilege 3784 WMIC.exe Token: SeBackupPrivilege 3784 WMIC.exe Token: SeRestorePrivilege 3784 WMIC.exe Token: SeShutdownPrivilege 3784 WMIC.exe Token: SeDebugPrivilege 3784 WMIC.exe Token: SeSystemEnvironmentPrivilege 3784 WMIC.exe Token: SeRemoteShutdownPrivilege 3784 WMIC.exe Token: SeUndockPrivilege 3784 WMIC.exe Token: SeManageVolumePrivilege 3784 WMIC.exe Token: 33 3784 WMIC.exe Token: 34 3784 WMIC.exe Token: 35 3784 WMIC.exe Token: 36 3784 WMIC.exe Token: SeIncreaseQuotaPrivilege 3784 WMIC.exe Token: SeSecurityPrivilege 3784 WMIC.exe Token: SeTakeOwnershipPrivilege 3784 WMIC.exe Token: SeLoadDriverPrivilege 3784 WMIC.exe Token: SeSystemProfilePrivilege 3784 WMIC.exe Token: SeSystemtimePrivilege 3784 WMIC.exe Token: SeProfSingleProcessPrivilege 3784 WMIC.exe Token: SeIncBasePriorityPrivilege 3784 WMIC.exe Token: SeCreatePagefilePrivilege 3784 WMIC.exe Token: SeBackupPrivilege 3784 WMIC.exe Token: SeRestorePrivilege 3784 WMIC.exe Token: SeShutdownPrivilege 3784 WMIC.exe Token: SeDebugPrivilege 3784 WMIC.exe Token: SeSystemEnvironmentPrivilege 3784 WMIC.exe Token: SeRemoteShutdownPrivilege 3784 WMIC.exe Token: SeUndockPrivilege 3784 WMIC.exe Token: SeManageVolumePrivilege 3784 WMIC.exe Token: 33 3784 WMIC.exe Token: 34 3784 WMIC.exe Token: 35 3784 WMIC.exe Token: 36 3784 WMIC.exe Token: SeBackupPrivilege 3688 vssvc.exe Token: SeRestorePrivilege 3688 vssvc.exe Token: SeAuditPrivilege 3688 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.execdsfqjtspkft.execdsfqjtspkft.exedescription pid Process procid_target PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 3044 wrote to memory of 4088 3044 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 79 PID 4088 wrote to memory of 2796 4088 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 80 PID 4088 wrote to memory of 2796 4088 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 80 PID 4088 wrote to memory of 2796 4088 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 80 PID 4088 wrote to memory of 4488 4088 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 81 PID 4088 wrote to memory of 4488 4088 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 81 PID 4088 wrote to memory of 4488 4088 418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe 81 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 2796 wrote to memory of 1896 2796 cdsfqjtspkft.exe 89 PID 1896 wrote to memory of 3784 1896 cdsfqjtspkft.exe 90 PID 1896 wrote to memory of 3784 1896 cdsfqjtspkft.exe 90 -
System policy modification 1 TTPs 2 IoCs
Processes:
cdsfqjtspkft.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cdsfqjtspkft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" cdsfqjtspkft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe"C:\Users\Admin\AppData\Local\Temp\418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe"C:\Users\Admin\AppData\Local\Temp\418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\cdsfqjtspkft.exeC:\Windows\cdsfqjtspkft.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\cdsfqjtspkft.exeC:\Windows\cdsfqjtspkft.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1896 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\418597~1.EXE3⤵PID:4488
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD52854f3ee319e80dd485446f4acae042e
SHA101086bd863fdf7c8eb1e732bacdd914f09d355e2
SHA256418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
SHA5124991feb491391cf44ae61128084f9c725c30df4640783293c72cd9801a216ef026ded9fda50e23c222bd3cbe74aeed9d785b5e58ff66410b85fd5b799c483aa4
-
Filesize
308KB
MD52854f3ee319e80dd485446f4acae042e
SHA101086bd863fdf7c8eb1e732bacdd914f09d355e2
SHA256418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
SHA5124991feb491391cf44ae61128084f9c725c30df4640783293c72cd9801a216ef026ded9fda50e23c222bd3cbe74aeed9d785b5e58ff66410b85fd5b799c483aa4
-
Filesize
308KB
MD52854f3ee319e80dd485446f4acae042e
SHA101086bd863fdf7c8eb1e732bacdd914f09d355e2
SHA256418597a845828a5b7d2840f24ce521de6f6c928a37390383ceea6d7a9a42ab5a
SHA5124991feb491391cf44ae61128084f9c725c30df4640783293c72cd9801a216ef026ded9fda50e23c222bd3cbe74aeed9d785b5e58ff66410b85fd5b799c483aa4