Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24/07/2022, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe
Resource
win10v2004-20220721-en
General
-
Target
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe
-
Size
360KB
-
MD5
7ef2ee7c53fe41db4e1b17674ceab984
-
SHA1
e961deef333563a226b7214799e92d1f51895c5a
-
SHA256
58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
-
SHA512
d122530a31fe196711a12bfd458b211662a0fb44cc1eadaf97c91160ad9e0de094660bc93c3e05b1be15b9ed3ffffd2c915ad4b934c43b69b442c4c455b99dbb
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_RECoVERY_+amciw.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BAE18F32BA89A3C6
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BAE18F32BA89A3C6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BAE18F32BA89A3C6
http://xlowfznrg4wf7dli.ONION/BAE18F32BA89A3C6
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 956 mxcniswhoeru.exe 520 mxcniswhoeru.exe -
Deletes itself 1 IoCs
pid Process 1672 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run mxcniswhoeru.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\isoyfufirrpe = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\mxcniswhoeru.exe\"" mxcniswhoeru.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2044 set thread context of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 956 set thread context of 520 956 mxcniswhoeru.exe 32 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-border.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\203x8subpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png mxcniswhoeru.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\1047x576black.png mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\_RECoVERY_+amciw.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\_RECoVERY_+amciw.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_RECoVERY_+amciw.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_RECoVERY_+amciw.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\_RECoVERY_+amciw.txt mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fr.pak mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pl.pak mxcniswhoeru.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Scene_PAL.wmv mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain.wmv mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\_RECoVERY_+amciw.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\_RECoVERY_+amciw.html mxcniswhoeru.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bn.pak mxcniswhoeru.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\nb.pak mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECoVERY_+amciw.png mxcniswhoeru.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_RECoVERY_+amciw.txt mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_SelectionSubpicture.png mxcniswhoeru.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_RECoVERY_+amciw.txt mxcniswhoeru.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mxcniswhoeru.exe 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe File opened for modification C:\Windows\mxcniswhoeru.exe 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 mxcniswhoeru.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 mxcniswhoeru.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 mxcniswhoeru.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 mxcniswhoeru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 mxcniswhoeru.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 mxcniswhoeru.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe 520 mxcniswhoeru.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe Token: SeDebugPrivilege 520 mxcniswhoeru.exe Token: SeIncreaseQuotaPrivilege 2036 WMIC.exe Token: SeSecurityPrivilege 2036 WMIC.exe Token: SeTakeOwnershipPrivilege 2036 WMIC.exe Token: SeLoadDriverPrivilege 2036 WMIC.exe Token: SeSystemProfilePrivilege 2036 WMIC.exe Token: SeSystemtimePrivilege 2036 WMIC.exe Token: SeProfSingleProcessPrivilege 2036 WMIC.exe Token: SeIncBasePriorityPrivilege 2036 WMIC.exe Token: SeCreatePagefilePrivilege 2036 WMIC.exe Token: SeBackupPrivilege 2036 WMIC.exe Token: SeRestorePrivilege 2036 WMIC.exe Token: SeShutdownPrivilege 2036 WMIC.exe Token: SeDebugPrivilege 2036 WMIC.exe Token: SeSystemEnvironmentPrivilege 2036 WMIC.exe Token: SeRemoteShutdownPrivilege 2036 WMIC.exe Token: SeUndockPrivilege 2036 WMIC.exe Token: SeManageVolumePrivilege 2036 WMIC.exe Token: 33 2036 WMIC.exe Token: 34 2036 WMIC.exe Token: 35 2036 WMIC.exe Token: SeIncreaseQuotaPrivilege 2036 WMIC.exe Token: SeSecurityPrivilege 2036 WMIC.exe Token: SeTakeOwnershipPrivilege 2036 WMIC.exe Token: SeLoadDriverPrivilege 2036 WMIC.exe Token: SeSystemProfilePrivilege 2036 WMIC.exe Token: SeSystemtimePrivilege 2036 WMIC.exe Token: SeProfSingleProcessPrivilege 2036 WMIC.exe Token: SeIncBasePriorityPrivilege 2036 WMIC.exe Token: SeCreatePagefilePrivilege 2036 WMIC.exe Token: SeBackupPrivilege 2036 WMIC.exe Token: SeRestorePrivilege 2036 WMIC.exe Token: SeShutdownPrivilege 2036 WMIC.exe Token: SeDebugPrivilege 2036 WMIC.exe Token: SeSystemEnvironmentPrivilege 2036 WMIC.exe Token: SeRemoteShutdownPrivilege 2036 WMIC.exe Token: SeUndockPrivilege 2036 WMIC.exe Token: SeManageVolumePrivilege 2036 WMIC.exe Token: 33 2036 WMIC.exe Token: 34 2036 WMIC.exe Token: 35 2036 WMIC.exe Token: SeBackupPrivilege 2028 vssvc.exe Token: SeRestorePrivilege 2028 vssvc.exe Token: SeAuditPrivilege 2028 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 2044 wrote to memory of 1712 2044 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 28 PID 1712 wrote to memory of 956 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 29 PID 1712 wrote to memory of 956 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 29 PID 1712 wrote to memory of 956 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 29 PID 1712 wrote to memory of 956 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 29 PID 1712 wrote to memory of 1672 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 30 PID 1712 wrote to memory of 1672 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 30 PID 1712 wrote to memory of 1672 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 30 PID 1712 wrote to memory of 1672 1712 58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe 30 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 956 wrote to memory of 520 956 mxcniswhoeru.exe 32 PID 520 wrote to memory of 2036 520 mxcniswhoeru.exe 33 PID 520 wrote to memory of 2036 520 mxcniswhoeru.exe 33 PID 520 wrote to memory of 2036 520 mxcniswhoeru.exe 33 PID 520 wrote to memory of 2036 520 mxcniswhoeru.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mxcniswhoeru.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mxcniswhoeru.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe"C:\Users\Admin\AppData\Local\Temp\58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe"C:\Users\Admin\AppData\Local\Temp\58ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\mxcniswhoeru.exeC:\Windows\mxcniswhoeru.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\mxcniswhoeru.exeC:\Windows\mxcniswhoeru.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:520 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\58FF23~1.EXE3⤵
- Deletes itself
PID:1672
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD57ef2ee7c53fe41db4e1b17674ceab984
SHA1e961deef333563a226b7214799e92d1f51895c5a
SHA25658ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
SHA512d122530a31fe196711a12bfd458b211662a0fb44cc1eadaf97c91160ad9e0de094660bc93c3e05b1be15b9ed3ffffd2c915ad4b934c43b69b442c4c455b99dbb
-
Filesize
360KB
MD57ef2ee7c53fe41db4e1b17674ceab984
SHA1e961deef333563a226b7214799e92d1f51895c5a
SHA25658ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
SHA512d122530a31fe196711a12bfd458b211662a0fb44cc1eadaf97c91160ad9e0de094660bc93c3e05b1be15b9ed3ffffd2c915ad4b934c43b69b442c4c455b99dbb
-
Filesize
360KB
MD57ef2ee7c53fe41db4e1b17674ceab984
SHA1e961deef333563a226b7214799e92d1f51895c5a
SHA25658ff230560bfeb0c5bd9d3fb7654e4ad5d38ce3962782da698331c8ecfa459db
SHA512d122530a31fe196711a12bfd458b211662a0fb44cc1eadaf97c91160ad9e0de094660bc93c3e05b1be15b9ed3ffffd2c915ad4b934c43b69b442c4c455b99dbb