Analysis
-
max time kernel
155s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
19-07-2022 03:17
Static task
static1
Behavioral task
behavioral1
Sample
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe
Resource
win10v2004-20220718-en
General
-
Target
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe
-
Size
396KB
-
MD5
15667babdcdd88ee08174a39c86b00ad
-
SHA1
19ed09bbe8711e7e0b9a6b7664538559a86d312d
-
SHA256
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0
-
SHA512
e9688e3c981eb1ff0f822dfc2c1a75c570d518b28c8b324b54f4e4fe626cd78ab39171a9f0a61f54eb1e602d941f7faa456aec169bd2379854e7fa411a6fec4a
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3762437355-3468409815-1164039494-1000\Recovery+usruk.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/4502CCBF1C1955E
http://kkd47eh4hdjshb5t.angortra.at/4502CCBF1C1955E
http://ytrest84y5i456hghadefdsd.pontogrot.com/4502CCBF1C1955E
http://xlowfznrg4wf7dli.ONION/4502CCBF1C1955E
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
daynlcfnrgbs.exedaynlcfnrgbs.exepid Process 820 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1280 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
daynlcfnrgbs.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run daynlcfnrgbs.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\mtmaewrnfasg = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\daynlcfnrgbs.exe\"" daynlcfnrgbs.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exedaynlcfnrgbs.exedescription pid Process procid_target PID 1816 set thread context of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 820 set thread context of 560 820 daynlcfnrgbs.exe 30 -
Drops file in Program Files directory 64 IoCs
Processes:
daynlcfnrgbs.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\WhiteDot.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\am.pak daynlcfnrgbs.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\1047x576black.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\ExportStart.xlsx daynlcfnrgbs.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_PreComp_MATTE_PAL.wmv daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\en-GB.pak daynlcfnrgbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\uk.pak daynlcfnrgbs.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv daynlcfnrgbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_ButtonGraphic.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_ButtonGraphic.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\GoldRing.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-next-static.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\Recovery+usruk.html daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\kn.pak daynlcfnrgbs.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_SelectionSubpicture.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotsdarkoverlay.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\PreviousMenuButtonIcon.png daynlcfnrgbs.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_ButtonGraphic.png daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-previous-static.png daynlcfnrgbs.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\Recovery+usruk.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Recovery+usruk.png daynlcfnrgbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\el.pak daynlcfnrgbs.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt daynlcfnrgbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\Recovery+usruk.png daynlcfnrgbs.exe -
Drops file in Windows directory 2 IoCs
Processes:
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exedescription ioc Process File created C:\Windows\daynlcfnrgbs.exe 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe File opened for modification C:\Windows\daynlcfnrgbs.exe 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
daynlcfnrgbs.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 daynlcfnrgbs.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 daynlcfnrgbs.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 daynlcfnrgbs.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 daynlcfnrgbs.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
daynlcfnrgbs.exepid Process 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe 560 daynlcfnrgbs.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exedaynlcfnrgbs.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe Token: SeDebugPrivilege 560 daynlcfnrgbs.exe Token: SeIncreaseQuotaPrivilege 1828 WMIC.exe Token: SeSecurityPrivilege 1828 WMIC.exe Token: SeTakeOwnershipPrivilege 1828 WMIC.exe Token: SeLoadDriverPrivilege 1828 WMIC.exe Token: SeSystemProfilePrivilege 1828 WMIC.exe Token: SeSystemtimePrivilege 1828 WMIC.exe Token: SeProfSingleProcessPrivilege 1828 WMIC.exe Token: SeIncBasePriorityPrivilege 1828 WMIC.exe Token: SeCreatePagefilePrivilege 1828 WMIC.exe Token: SeBackupPrivilege 1828 WMIC.exe Token: SeRestorePrivilege 1828 WMIC.exe Token: SeShutdownPrivilege 1828 WMIC.exe Token: SeDebugPrivilege 1828 WMIC.exe Token: SeSystemEnvironmentPrivilege 1828 WMIC.exe Token: SeRemoteShutdownPrivilege 1828 WMIC.exe Token: SeUndockPrivilege 1828 WMIC.exe Token: SeManageVolumePrivilege 1828 WMIC.exe Token: 33 1828 WMIC.exe Token: 34 1828 WMIC.exe Token: 35 1828 WMIC.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exedaynlcfnrgbs.exedaynlcfnrgbs.exedescription pid Process procid_target PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1816 wrote to memory of 1960 1816 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 26 PID 1960 wrote to memory of 820 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 27 PID 1960 wrote to memory of 820 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 27 PID 1960 wrote to memory of 820 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 27 PID 1960 wrote to memory of 820 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 27 PID 1960 wrote to memory of 1280 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 28 PID 1960 wrote to memory of 1280 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 28 PID 1960 wrote to memory of 1280 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 28 PID 1960 wrote to memory of 1280 1960 5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe 28 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 820 wrote to memory of 560 820 daynlcfnrgbs.exe 30 PID 560 wrote to memory of 1828 560 daynlcfnrgbs.exe 31 PID 560 wrote to memory of 1828 560 daynlcfnrgbs.exe 31 PID 560 wrote to memory of 1828 560 daynlcfnrgbs.exe 31 PID 560 wrote to memory of 1828 560 daynlcfnrgbs.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
daynlcfnrgbs.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System daynlcfnrgbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" daynlcfnrgbs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe"C:\Users\Admin\AppData\Local\Temp\5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe"C:\Users\Admin\AppData\Local\Temp\5061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\daynlcfnrgbs.exeC:\Windows\daynlcfnrgbs.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\daynlcfnrgbs.exeC:\Windows\daynlcfnrgbs.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:560 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\506139~1.EXE3⤵
- Deletes itself
PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD515667babdcdd88ee08174a39c86b00ad
SHA119ed09bbe8711e7e0b9a6b7664538559a86d312d
SHA2565061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0
SHA512e9688e3c981eb1ff0f822dfc2c1a75c570d518b28c8b324b54f4e4fe626cd78ab39171a9f0a61f54eb1e602d941f7faa456aec169bd2379854e7fa411a6fec4a
-
Filesize
396KB
MD515667babdcdd88ee08174a39c86b00ad
SHA119ed09bbe8711e7e0b9a6b7664538559a86d312d
SHA2565061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0
SHA512e9688e3c981eb1ff0f822dfc2c1a75c570d518b28c8b324b54f4e4fe626cd78ab39171a9f0a61f54eb1e602d941f7faa456aec169bd2379854e7fa411a6fec4a
-
Filesize
396KB
MD515667babdcdd88ee08174a39c86b00ad
SHA119ed09bbe8711e7e0b9a6b7664538559a86d312d
SHA2565061395e96ddf44be20b37f12ab25da2ee84f9c8ec2dd0b5db4f11cfdb14b2a0
SHA512e9688e3c981eb1ff0f822dfc2c1a75c570d518b28c8b324b54f4e4fe626cd78ab39171a9f0a61f54eb1e602d941f7faa456aec169bd2379854e7fa411a6fec4a