Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 03:55
Static task
static1
Behavioral task
behavioral1
Sample
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe
Resource
win10v2004-20220414-en
General
-
Target
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe
-
Size
371KB
-
MD5
2c5ed4b464979c52cc09368c97604f38
-
SHA1
2db032be1a52a744190c3c8814f35977362ed45b
-
SHA256
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
-
SHA512
d4b74607ed95b12868bcfddf2d1ec26fd6df7a13f59c6a200b6fcdadbfe3fbb3c7dbd09150fe8bd7129c87a7fac2dfe1fad26f9cbf13cec5de0f670b49e1a195
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+vwahf.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/A5C941D8C6BD537D
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/A5C941D8C6BD537D
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A5C941D8C6BD537D
http://xlowfznrg4wf7dli.ONION/A5C941D8C6BD537D
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
nsibcsnfxqfl.exensibcsnfxqfl.exepid Process 1468 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1108 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
nsibcsnfxqfl.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run nsibcsnfxqfl.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\bpeggxoqmsqt = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\nsibcsnfxqfl.exe\"" nsibcsnfxqfl.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exensibcsnfxqfl.exedescription pid Process procid_target PID 1280 set thread context of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1468 set thread context of 912 1468 nsibcsnfxqfl.exe 31 -
Drops file in Program Files directory 64 IoCs
Processes:
nsibcsnfxqfl.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\_RECoVERY_+vwahf.png nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\_RECoVERY_+vwahf.html nsibcsnfxqfl.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\_RECoVERY_+vwahf.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt nsibcsnfxqfl.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt nsibcsnfxqfl.exe -
Drops file in Windows directory 2 IoCs
Processes:
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exedescription ioc Process File created C:\Windows\nsibcsnfxqfl.exe 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe File opened for modification C:\Windows\nsibcsnfxqfl.exe 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
nsibcsnfxqfl.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 nsibcsnfxqfl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 nsibcsnfxqfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 nsibcsnfxqfl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 nsibcsnfxqfl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 nsibcsnfxqfl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 nsibcsnfxqfl.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
nsibcsnfxqfl.exepid Process 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe 912 nsibcsnfxqfl.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exensibcsnfxqfl.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe Token: SeDebugPrivilege 912 nsibcsnfxqfl.exe Token: SeIncreaseQuotaPrivilege 1592 WMIC.exe Token: SeSecurityPrivilege 1592 WMIC.exe Token: SeTakeOwnershipPrivilege 1592 WMIC.exe Token: SeLoadDriverPrivilege 1592 WMIC.exe Token: SeSystemProfilePrivilege 1592 WMIC.exe Token: SeSystemtimePrivilege 1592 WMIC.exe Token: SeProfSingleProcessPrivilege 1592 WMIC.exe Token: SeIncBasePriorityPrivilege 1592 WMIC.exe Token: SeCreatePagefilePrivilege 1592 WMIC.exe Token: SeBackupPrivilege 1592 WMIC.exe Token: SeRestorePrivilege 1592 WMIC.exe Token: SeShutdownPrivilege 1592 WMIC.exe Token: SeDebugPrivilege 1592 WMIC.exe Token: SeSystemEnvironmentPrivilege 1592 WMIC.exe Token: SeRemoteShutdownPrivilege 1592 WMIC.exe Token: SeUndockPrivilege 1592 WMIC.exe Token: SeManageVolumePrivilege 1592 WMIC.exe Token: 33 1592 WMIC.exe Token: 34 1592 WMIC.exe Token: 35 1592 WMIC.exe Token: SeIncreaseQuotaPrivilege 1592 WMIC.exe Token: SeSecurityPrivilege 1592 WMIC.exe Token: SeTakeOwnershipPrivilege 1592 WMIC.exe Token: SeLoadDriverPrivilege 1592 WMIC.exe Token: SeSystemProfilePrivilege 1592 WMIC.exe Token: SeSystemtimePrivilege 1592 WMIC.exe Token: SeProfSingleProcessPrivilege 1592 WMIC.exe Token: SeIncBasePriorityPrivilege 1592 WMIC.exe Token: SeCreatePagefilePrivilege 1592 WMIC.exe Token: SeBackupPrivilege 1592 WMIC.exe Token: SeRestorePrivilege 1592 WMIC.exe Token: SeShutdownPrivilege 1592 WMIC.exe Token: SeDebugPrivilege 1592 WMIC.exe Token: SeSystemEnvironmentPrivilege 1592 WMIC.exe Token: SeRemoteShutdownPrivilege 1592 WMIC.exe Token: SeUndockPrivilege 1592 WMIC.exe Token: SeManageVolumePrivilege 1592 WMIC.exe Token: 33 1592 WMIC.exe Token: 34 1592 WMIC.exe Token: 35 1592 WMIC.exe Token: SeBackupPrivilege 856 vssvc.exe Token: SeRestorePrivilege 856 vssvc.exe Token: SeAuditPrivilege 856 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exensibcsnfxqfl.exensibcsnfxqfl.exedescription pid Process procid_target PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1280 wrote to memory of 1640 1280 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 27 PID 1640 wrote to memory of 1468 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 28 PID 1640 wrote to memory of 1468 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 28 PID 1640 wrote to memory of 1468 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 28 PID 1640 wrote to memory of 1468 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 28 PID 1640 wrote to memory of 1108 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 29 PID 1640 wrote to memory of 1108 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 29 PID 1640 wrote to memory of 1108 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 29 PID 1640 wrote to memory of 1108 1640 4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe 29 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 1468 wrote to memory of 912 1468 nsibcsnfxqfl.exe 31 PID 912 wrote to memory of 1592 912 nsibcsnfxqfl.exe 32 PID 912 wrote to memory of 1592 912 nsibcsnfxqfl.exe 32 PID 912 wrote to memory of 1592 912 nsibcsnfxqfl.exe 32 PID 912 wrote to memory of 1592 912 nsibcsnfxqfl.exe 32 -
System policy modification 1 TTPs 2 IoCs
Processes:
nsibcsnfxqfl.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nsibcsnfxqfl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" nsibcsnfxqfl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe"C:\Users\Admin\AppData\Local\Temp\4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe"C:\Users\Admin\AppData\Local\Temp\4d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\nsibcsnfxqfl.exeC:\Windows\nsibcsnfxqfl.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\nsibcsnfxqfl.exeC:\Windows\nsibcsnfxqfl.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:912 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\4D23A9~1.EXE3⤵
- Deletes itself
PID:1108
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD52c5ed4b464979c52cc09368c97604f38
SHA12db032be1a52a744190c3c8814f35977362ed45b
SHA2564d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
SHA512d4b74607ed95b12868bcfddf2d1ec26fd6df7a13f59c6a200b6fcdadbfe3fbb3c7dbd09150fe8bd7129c87a7fac2dfe1fad26f9cbf13cec5de0f670b49e1a195
-
Filesize
371KB
MD52c5ed4b464979c52cc09368c97604f38
SHA12db032be1a52a744190c3c8814f35977362ed45b
SHA2564d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
SHA512d4b74607ed95b12868bcfddf2d1ec26fd6df7a13f59c6a200b6fcdadbfe3fbb3c7dbd09150fe8bd7129c87a7fac2dfe1fad26f9cbf13cec5de0f670b49e1a195
-
Filesize
371KB
MD52c5ed4b464979c52cc09368c97604f38
SHA12db032be1a52a744190c3c8814f35977362ed45b
SHA2564d23a9ea3868bbc64028ead54549f67d78ffbaebe823892b30f5f342a470f6d8
SHA512d4b74607ed95b12868bcfddf2d1ec26fd6df7a13f59c6a200b6fcdadbfe3fbb3c7dbd09150fe8bd7129c87a7fac2dfe1fad26f9cbf13cec5de0f670b49e1a195