Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20/07/2022, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe
Resource
win10v2004-20220718-en
General
-
Target
4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe
-
Size
375KB
-
MD5
47a349dd2ab3dde3fa0ec7c7364dd794
-
SHA1
84f7080c82e16ff7ad72e86f949fefe6af567625
-
SHA256
4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69
-
SHA512
0fd9e1ce3ac5c89c69d268f981f7171a70dace77c1ec83bd1454312ab4cb3c7fd34e1e83853fff16c1395bacbd8c63a583eecc3ca9fbe7b4b406b4d6c3c8aa59
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3762437355-3468409815-1164039494-1000\_RECoVERY_+vtyxp.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/1733F07FFAD3D841
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1733F07FFAD3D841
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/1733F07FFAD3D841
http://xlowfznrg4wf7dli.ONION/1733F07FFAD3D841
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1404 gtobgufcjfab.exe 1184 gtobgufcjfab.exe -
Deletes itself 1 IoCs
pid Process 1768 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run gtobgufcjfab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\wrcjeikmdike = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\gtobgufcjfab.exe\"" gtobgufcjfab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1500 set thread context of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1404 set thread context of 1184 1404 gtobgufcjfab.exe 32 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\et.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\History.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt gtobgufcjfab.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt gtobgufcjfab.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gtobgufcjfab.exe 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe File opened for modification C:\Windows\gtobgufcjfab.exe 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 gtobgufcjfab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 gtobgufcjfab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 gtobgufcjfab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 gtobgufcjfab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 gtobgufcjfab.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 gtobgufcjfab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe 1184 gtobgufcjfab.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe Token: SeDebugPrivilege 1184 gtobgufcjfab.exe Token: SeIncreaseQuotaPrivilege 1676 WMIC.exe Token: SeSecurityPrivilege 1676 WMIC.exe Token: SeTakeOwnershipPrivilege 1676 WMIC.exe Token: SeLoadDriverPrivilege 1676 WMIC.exe Token: SeSystemProfilePrivilege 1676 WMIC.exe Token: SeSystemtimePrivilege 1676 WMIC.exe Token: SeProfSingleProcessPrivilege 1676 WMIC.exe Token: SeIncBasePriorityPrivilege 1676 WMIC.exe Token: SeCreatePagefilePrivilege 1676 WMIC.exe Token: SeBackupPrivilege 1676 WMIC.exe Token: SeRestorePrivilege 1676 WMIC.exe Token: SeShutdownPrivilege 1676 WMIC.exe Token: SeDebugPrivilege 1676 WMIC.exe Token: SeSystemEnvironmentPrivilege 1676 WMIC.exe Token: SeRemoteShutdownPrivilege 1676 WMIC.exe Token: SeUndockPrivilege 1676 WMIC.exe Token: SeManageVolumePrivilege 1676 WMIC.exe Token: 33 1676 WMIC.exe Token: 34 1676 WMIC.exe Token: 35 1676 WMIC.exe Token: SeIncreaseQuotaPrivilege 1676 WMIC.exe Token: SeSecurityPrivilege 1676 WMIC.exe Token: SeTakeOwnershipPrivilege 1676 WMIC.exe Token: SeLoadDriverPrivilege 1676 WMIC.exe Token: SeSystemProfilePrivilege 1676 WMIC.exe Token: SeSystemtimePrivilege 1676 WMIC.exe Token: SeProfSingleProcessPrivilege 1676 WMIC.exe Token: SeIncBasePriorityPrivilege 1676 WMIC.exe Token: SeCreatePagefilePrivilege 1676 WMIC.exe Token: SeBackupPrivilege 1676 WMIC.exe Token: SeRestorePrivilege 1676 WMIC.exe Token: SeShutdownPrivilege 1676 WMIC.exe Token: SeDebugPrivilege 1676 WMIC.exe Token: SeSystemEnvironmentPrivilege 1676 WMIC.exe Token: SeRemoteShutdownPrivilege 1676 WMIC.exe Token: SeUndockPrivilege 1676 WMIC.exe Token: SeManageVolumePrivilege 1676 WMIC.exe Token: 33 1676 WMIC.exe Token: 34 1676 WMIC.exe Token: 35 1676 WMIC.exe Token: SeBackupPrivilege 1828 vssvc.exe Token: SeRestorePrivilege 1828 vssvc.exe Token: SeAuditPrivilege 1828 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1500 wrote to memory of 1104 1500 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 28 PID 1104 wrote to memory of 1404 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 29 PID 1104 wrote to memory of 1404 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 29 PID 1104 wrote to memory of 1404 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 29 PID 1104 wrote to memory of 1404 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 29 PID 1104 wrote to memory of 1768 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 30 PID 1104 wrote to memory of 1768 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 30 PID 1104 wrote to memory of 1768 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 30 PID 1104 wrote to memory of 1768 1104 4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe 30 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1404 wrote to memory of 1184 1404 gtobgufcjfab.exe 32 PID 1184 wrote to memory of 1676 1184 gtobgufcjfab.exe 33 PID 1184 wrote to memory of 1676 1184 gtobgufcjfab.exe 33 PID 1184 wrote to memory of 1676 1184 gtobgufcjfab.exe 33 PID 1184 wrote to memory of 1676 1184 gtobgufcjfab.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gtobgufcjfab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gtobgufcjfab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe"C:\Users\Admin\AppData\Local\Temp\4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe"C:\Users\Admin\AppData\Local\Temp\4e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\gtobgufcjfab.exeC:\Windows\gtobgufcjfab.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\gtobgufcjfab.exeC:\Windows\gtobgufcjfab.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1184 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\4E90AB~1.EXE3⤵
- Deletes itself
PID:1768
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD547a349dd2ab3dde3fa0ec7c7364dd794
SHA184f7080c82e16ff7ad72e86f949fefe6af567625
SHA2564e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69
SHA5120fd9e1ce3ac5c89c69d268f981f7171a70dace77c1ec83bd1454312ab4cb3c7fd34e1e83853fff16c1395bacbd8c63a583eecc3ca9fbe7b4b406b4d6c3c8aa59
-
Filesize
375KB
MD547a349dd2ab3dde3fa0ec7c7364dd794
SHA184f7080c82e16ff7ad72e86f949fefe6af567625
SHA2564e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69
SHA5120fd9e1ce3ac5c89c69d268f981f7171a70dace77c1ec83bd1454312ab4cb3c7fd34e1e83853fff16c1395bacbd8c63a583eecc3ca9fbe7b4b406b4d6c3c8aa59
-
Filesize
375KB
MD547a349dd2ab3dde3fa0ec7c7364dd794
SHA184f7080c82e16ff7ad72e86f949fefe6af567625
SHA2564e90abdfc99b858205724c854478d92cca84194a5809f8a75e77a1694df19d69
SHA5120fd9e1ce3ac5c89c69d268f981f7171a70dace77c1ec83bd1454312ab4cb3c7fd34e1e83853fff16c1395bacbd8c63a583eecc3ca9fbe7b4b406b4d6c3c8aa59