Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
17-07-2022 03:44
Static task
static1
Behavioral task
behavioral1
Sample
5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe
Resource
win10v2004-20220414-en
General
-
Target
5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe
-
Size
356KB
-
MD5
7e373cf7f83afa2949c9537df192a8e5
-
SHA1
ac50b6101a1dee8c0d4550c5c001a477d6765ac9
-
SHA256
5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271
-
SHA512
a5666ee8fb9c0a614831c362ec0a90e698650db6f6dfe59c6e87ff624c84e0d0a832e6cbc6224038acd5009d2a0081437af6a367be75424b3868e8d7d07b86a5
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\Recovery+hokxr.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/F06477B86DFA44F3
http://tes543berda73i48fsdfsd.keratadze.at/F06477B86DFA44F3
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/F06477B86DFA44F3
http://xlowfznrg4wf7dli.ONION/F06477B86DFA44F3
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1996 xldyiqutlopp.exe 1992 xldyiqutlopp.exe -
Deletes itself 1 IoCs
pid Process 656 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run xldyiqutlopp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\woifexcikfln = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\xldyiqutlopp.exe\"" xldyiqutlopp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 900 set thread context of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 1996 set thread context of 1992 1996 xldyiqutlopp.exe 31 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_ButtonGraphic.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lt.pak xldyiqutlopp.exe File opened for modification C:\Program Files\Google\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_SelectionSubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_selectionsubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIconSubpict.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lv.pak xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\System\ado\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png xldyiqutlopp.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\en-US\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-highlight.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-previous-static.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\System\en-US\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\System\es-ES\Recovery+hokxr.html xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\shatter.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationUp_SelectionSubpicture.png xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bn.pak xldyiqutlopp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\de.pak xldyiqutlopp.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\Recovery+hokxr.txt xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Scene_PAL.wmv xldyiqutlopp.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\Recovery+hokxr.png xldyiqutlopp.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\Recovery+hokxr.txt xldyiqutlopp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xldyiqutlopp.exe 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe File opened for modification C:\Windows\xldyiqutlopp.exe 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 xldyiqutlopp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 xldyiqutlopp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 xldyiqutlopp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 xldyiqutlopp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 xldyiqutlopp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 xldyiqutlopp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe 1992 xldyiqutlopp.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe Token: SeDebugPrivilege 1992 xldyiqutlopp.exe Token: SeIncreaseQuotaPrivilege 708 WMIC.exe Token: SeSecurityPrivilege 708 WMIC.exe Token: SeTakeOwnershipPrivilege 708 WMIC.exe Token: SeLoadDriverPrivilege 708 WMIC.exe Token: SeSystemProfilePrivilege 708 WMIC.exe Token: SeSystemtimePrivilege 708 WMIC.exe Token: SeProfSingleProcessPrivilege 708 WMIC.exe Token: SeIncBasePriorityPrivilege 708 WMIC.exe Token: SeCreatePagefilePrivilege 708 WMIC.exe Token: SeBackupPrivilege 708 WMIC.exe Token: SeRestorePrivilege 708 WMIC.exe Token: SeShutdownPrivilege 708 WMIC.exe Token: SeDebugPrivilege 708 WMIC.exe Token: SeSystemEnvironmentPrivilege 708 WMIC.exe Token: SeRemoteShutdownPrivilege 708 WMIC.exe Token: SeUndockPrivilege 708 WMIC.exe Token: SeManageVolumePrivilege 708 WMIC.exe Token: 33 708 WMIC.exe Token: 34 708 WMIC.exe Token: 35 708 WMIC.exe Token: SeIncreaseQuotaPrivilege 708 WMIC.exe Token: SeSecurityPrivilege 708 WMIC.exe Token: SeTakeOwnershipPrivilege 708 WMIC.exe Token: SeLoadDriverPrivilege 708 WMIC.exe Token: SeSystemProfilePrivilege 708 WMIC.exe Token: SeSystemtimePrivilege 708 WMIC.exe Token: SeProfSingleProcessPrivilege 708 WMIC.exe Token: SeIncBasePriorityPrivilege 708 WMIC.exe Token: SeCreatePagefilePrivilege 708 WMIC.exe Token: SeBackupPrivilege 708 WMIC.exe Token: SeRestorePrivilege 708 WMIC.exe Token: SeShutdownPrivilege 708 WMIC.exe Token: SeDebugPrivilege 708 WMIC.exe Token: SeSystemEnvironmentPrivilege 708 WMIC.exe Token: SeRemoteShutdownPrivilege 708 WMIC.exe Token: SeUndockPrivilege 708 WMIC.exe Token: SeManageVolumePrivilege 708 WMIC.exe Token: 33 708 WMIC.exe Token: 34 708 WMIC.exe Token: 35 708 WMIC.exe Token: SeBackupPrivilege 1348 vssvc.exe Token: SeRestorePrivilege 1348 vssvc.exe Token: SeAuditPrivilege 1348 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 900 wrote to memory of 1904 900 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 27 PID 1904 wrote to memory of 1996 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 28 PID 1904 wrote to memory of 1996 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 28 PID 1904 wrote to memory of 1996 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 28 PID 1904 wrote to memory of 1996 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 28 PID 1904 wrote to memory of 656 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 29 PID 1904 wrote to memory of 656 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 29 PID 1904 wrote to memory of 656 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 29 PID 1904 wrote to memory of 656 1904 5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe 29 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1996 wrote to memory of 1992 1996 xldyiqutlopp.exe 31 PID 1992 wrote to memory of 708 1992 xldyiqutlopp.exe 32 PID 1992 wrote to memory of 708 1992 xldyiqutlopp.exe 32 PID 1992 wrote to memory of 708 1992 xldyiqutlopp.exe 32 PID 1992 wrote to memory of 708 1992 xldyiqutlopp.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xldyiqutlopp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" xldyiqutlopp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe"C:\Users\Admin\AppData\Local\Temp\5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe"C:\Users\Admin\AppData\Local\Temp\5236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\xldyiqutlopp.exeC:\Windows\xldyiqutlopp.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\xldyiqutlopp.exeC:\Windows\xldyiqutlopp.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1992 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:708
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5236DA~1.EXE3⤵
- Deletes itself
PID:656
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD57e373cf7f83afa2949c9537df192a8e5
SHA1ac50b6101a1dee8c0d4550c5c001a477d6765ac9
SHA2565236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271
SHA512a5666ee8fb9c0a614831c362ec0a90e698650db6f6dfe59c6e87ff624c84e0d0a832e6cbc6224038acd5009d2a0081437af6a367be75424b3868e8d7d07b86a5
-
Filesize
356KB
MD57e373cf7f83afa2949c9537df192a8e5
SHA1ac50b6101a1dee8c0d4550c5c001a477d6765ac9
SHA2565236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271
SHA512a5666ee8fb9c0a614831c362ec0a90e698650db6f6dfe59c6e87ff624c84e0d0a832e6cbc6224038acd5009d2a0081437af6a367be75424b3868e8d7d07b86a5
-
Filesize
356KB
MD57e373cf7f83afa2949c9537df192a8e5
SHA1ac50b6101a1dee8c0d4550c5c001a477d6765ac9
SHA2565236dad57ae58cf0d8505e979322b97fabb761dbc34d21a662b60771e8d1d271
SHA512a5666ee8fb9c0a614831c362ec0a90e698650db6f6dfe59c6e87ff624c84e0d0a832e6cbc6224038acd5009d2a0081437af6a367be75424b3868e8d7d07b86a5