Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 12:24
Static task
static1
Behavioral task
behavioral1
Sample
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe
Resource
win10v2004-20220414-en
General
-
Target
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe
-
Size
419KB
-
MD5
52d3ab3e5431244512b9777cf9c43e6f
-
SHA1
8b4c82d5e39e0f826f3c8e8377aa3f4e9a5b515a
-
SHA256
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
-
SHA512
18d78bffb7add66d489f2cc8ad3409ef232271dcfd40efae902df44e1853f4225ecdc35f54f196ede90656b3066ba9c72a6e3d0bddb1445fd08f6468d4b4f065
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+awwmf.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6892350BC7CA2A6
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6892350BC7CA2A6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/6892350BC7CA2A6
http://xlowfznrg4wf7dli.ONION/6892350BC7CA2A6
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
thpmxnfdapkr.exethpmxnfdapkr.exepid Process 1248 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1424 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
thpmxnfdapkr.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run thpmxnfdapkr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\sjnmabbgdpmt = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\thpmxnfdapkr.exe\"" thpmxnfdapkr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exethpmxnfdapkr.exedescription pid Process procid_target PID 1180 set thread context of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1248 set thread context of 324 1248 thpmxnfdapkr.exe 32 -
Drops file in Program Files directory 64 IoCs
Processes:
thpmxnfdapkr.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\yo.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\it-IT\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogo.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoBeta.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Google\Chrome\Application\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-previous-static.png thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\play-static.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\es-ES\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv thpmxnfdapkr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoCanary.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\en-US\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ko.pak thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-background.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\_RECoVERY_+awwmf.html thpmxnfdapkr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\_RECoVERY_+awwmf.png thpmxnfdapkr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png thpmxnfdapkr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fi.pak thpmxnfdapkr.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECoVERY_+awwmf.txt thpmxnfdapkr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lv.pak thpmxnfdapkr.exe -
Drops file in Windows directory 2 IoCs
Processes:
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exedescription ioc Process File created C:\Windows\thpmxnfdapkr.exe 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe File opened for modification C:\Windows\thpmxnfdapkr.exe 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
thpmxnfdapkr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 thpmxnfdapkr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 thpmxnfdapkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 thpmxnfdapkr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 thpmxnfdapkr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 thpmxnfdapkr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 thpmxnfdapkr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
thpmxnfdapkr.exepid Process 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe 324 thpmxnfdapkr.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exethpmxnfdapkr.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe Token: SeDebugPrivilege 324 thpmxnfdapkr.exe Token: SeIncreaseQuotaPrivilege 1868 WMIC.exe Token: SeSecurityPrivilege 1868 WMIC.exe Token: SeTakeOwnershipPrivilege 1868 WMIC.exe Token: SeLoadDriverPrivilege 1868 WMIC.exe Token: SeSystemProfilePrivilege 1868 WMIC.exe Token: SeSystemtimePrivilege 1868 WMIC.exe Token: SeProfSingleProcessPrivilege 1868 WMIC.exe Token: SeIncBasePriorityPrivilege 1868 WMIC.exe Token: SeCreatePagefilePrivilege 1868 WMIC.exe Token: SeBackupPrivilege 1868 WMIC.exe Token: SeRestorePrivilege 1868 WMIC.exe Token: SeShutdownPrivilege 1868 WMIC.exe Token: SeDebugPrivilege 1868 WMIC.exe Token: SeSystemEnvironmentPrivilege 1868 WMIC.exe Token: SeRemoteShutdownPrivilege 1868 WMIC.exe Token: SeUndockPrivilege 1868 WMIC.exe Token: SeManageVolumePrivilege 1868 WMIC.exe Token: 33 1868 WMIC.exe Token: 34 1868 WMIC.exe Token: 35 1868 WMIC.exe Token: SeIncreaseQuotaPrivilege 1868 WMIC.exe Token: SeSecurityPrivilege 1868 WMIC.exe Token: SeTakeOwnershipPrivilege 1868 WMIC.exe Token: SeLoadDriverPrivilege 1868 WMIC.exe Token: SeSystemProfilePrivilege 1868 WMIC.exe Token: SeSystemtimePrivilege 1868 WMIC.exe Token: SeProfSingleProcessPrivilege 1868 WMIC.exe Token: SeIncBasePriorityPrivilege 1868 WMIC.exe Token: SeCreatePagefilePrivilege 1868 WMIC.exe Token: SeBackupPrivilege 1868 WMIC.exe Token: SeRestorePrivilege 1868 WMIC.exe Token: SeShutdownPrivilege 1868 WMIC.exe Token: SeDebugPrivilege 1868 WMIC.exe Token: SeSystemEnvironmentPrivilege 1868 WMIC.exe Token: SeRemoteShutdownPrivilege 1868 WMIC.exe Token: SeUndockPrivilege 1868 WMIC.exe Token: SeManageVolumePrivilege 1868 WMIC.exe Token: 33 1868 WMIC.exe Token: 34 1868 WMIC.exe Token: 35 1868 WMIC.exe Token: SeBackupPrivilege 1316 vssvc.exe Token: SeRestorePrivilege 1316 vssvc.exe Token: SeAuditPrivilege 1316 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exethpmxnfdapkr.exethpmxnfdapkr.exedescription pid Process procid_target PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1180 wrote to memory of 1920 1180 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 28 PID 1920 wrote to memory of 1248 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 29 PID 1920 wrote to memory of 1248 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 29 PID 1920 wrote to memory of 1248 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 29 PID 1920 wrote to memory of 1248 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 29 PID 1920 wrote to memory of 1424 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 30 PID 1920 wrote to memory of 1424 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 30 PID 1920 wrote to memory of 1424 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 30 PID 1920 wrote to memory of 1424 1920 4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe 30 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 1248 wrote to memory of 324 1248 thpmxnfdapkr.exe 32 PID 324 wrote to memory of 1868 324 thpmxnfdapkr.exe 33 PID 324 wrote to memory of 1868 324 thpmxnfdapkr.exe 33 PID 324 wrote to memory of 1868 324 thpmxnfdapkr.exe 33 PID 324 wrote to memory of 1868 324 thpmxnfdapkr.exe 33 -
System policy modification 1 TTPs 2 IoCs
Processes:
thpmxnfdapkr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System thpmxnfdapkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" thpmxnfdapkr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe"C:\Users\Admin\AppData\Local\Temp\4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe"C:\Users\Admin\AppData\Local\Temp\4ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\thpmxnfdapkr.exeC:\Windows\thpmxnfdapkr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\thpmxnfdapkr.exeC:\Windows\thpmxnfdapkr.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:324 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\4AB4B8~1.EXE3⤵
- Deletes itself
PID:1424
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD552d3ab3e5431244512b9777cf9c43e6f
SHA18b4c82d5e39e0f826f3c8e8377aa3f4e9a5b515a
SHA2564ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
SHA51218d78bffb7add66d489f2cc8ad3409ef232271dcfd40efae902df44e1853f4225ecdc35f54f196ede90656b3066ba9c72a6e3d0bddb1445fd08f6468d4b4f065
-
Filesize
419KB
MD552d3ab3e5431244512b9777cf9c43e6f
SHA18b4c82d5e39e0f826f3c8e8377aa3f4e9a5b515a
SHA2564ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
SHA51218d78bffb7add66d489f2cc8ad3409ef232271dcfd40efae902df44e1853f4225ecdc35f54f196ede90656b3066ba9c72a6e3d0bddb1445fd08f6468d4b4f065
-
Filesize
419KB
MD552d3ab3e5431244512b9777cf9c43e6f
SHA18b4c82d5e39e0f826f3c8e8377aa3f4e9a5b515a
SHA2564ab4b82583b0293f1e7773015958d119820907915d4df882316f9cef0c6022b6
SHA51218d78bffb7add66d489f2cc8ad3409ef232271dcfd40efae902df44e1853f4225ecdc35f54f196ede90656b3066ba9c72a6e3d0bddb1445fd08f6468d4b4f065