Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 13:38
Static task
static1
Behavioral task
behavioral1
Sample
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe
Resource
win7-20220718-en
General
-
Target
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe
-
Size
1.1MB
-
MD5
52b6bdaa9639ae7c4364b447a792da59
-
SHA1
f2ecf16b4eaf6b05f90c41238beac45d8201bbb9
-
SHA256
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232
-
SHA512
28604f93bb2d1132cb5ae9820c7ef63cb2f1de1f159bdd978b8c71d9a6f068c00ae1843c78210a873e7e6be21ccbc72a86626e009df34480c9e19b621453a5ba
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Processes:
resource yara_rule behavioral2/memory/3632-133-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/3632-134-0x0000000000810000-0x000000000189E000-memory.dmp upx behavioral2/memory/3632-153-0x0000000000810000-0x000000000189E000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3196 regsvr32.exe 3196 regsvr32.exe 2844 regsvr32.exe -
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process File opened (read-only) \??\E: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\J: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\M: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\T: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\X: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\Y: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\K: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\L: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\N: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\S: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\V: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\F: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\G: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\H: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\I: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\O: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\P: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\Q: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\R: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\U: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\W: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened (read-only) \??\Z: d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process File opened for modification C:\autorun.inf d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Drops file in System32 directory 14 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ecologyplugin\iWebOffice\uninstall.bat cmd.exe File created C:\Windows\SysWOW64\ecologyplugin\iWebOffice\iWebOffice2003.ocx cmd.exe File created C:\Windows\SysWOW64\ecologyplugin\iWebOffice\LOGO.ico cmd.exe File opened for modification C:\Windows\SysWOW64\ecologyplugin\iWebOffice\iWebOffice2003.ocx cmd.exe File opened for modification C:\Windows\SysWOW64\ecologyplugin\iWebOffice\LOGO.ico cmd.exe File opened for modification C:\Windows\SysWOW64\ecologyplugin\iWebOffice\PDF417Manager.dll cmd.exe File created C:\Windows\SysWOW64\ecologyplugin\iWebOffice\rar.bmp cmd.exe File opened for modification C:\Windows\SysWOW64\ecologyplugin\iWebOffice\rar.bmp cmd.exe File opened for modification C:\Windows\SysWOW64\ecologyplugin\iWebOffice\readme.txt cmd.exe File created C:\Windows\SysWOW64\ecologyplugin\iWebOffice\setup.bat cmd.exe File opened for modification C:\Windows\SysWOW64\ecologyplugin\iWebOffice\setup.bat cmd.exe File created C:\Windows\SysWOW64\ecologyplugin\iWebOffice\uninstall.bat cmd.exe File created C:\Windows\SysWOW64\ecologyplugin\iWebOffice\PDF417Manager.dll cmd.exe File created C:\Windows\SysWOW64\ecologyplugin\iWebOffice\readme.txt cmd.exe -
Drops file in Program Files directory 11 IoCs
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Drops file in Windows directory 1 IoCs
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
regsvr32.exeregsvr32.execmd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C01A9E2E-66D1-4B2E-95E2-68A529EE0B07}\ = "IiWebOffice" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{343DED4C-FCD6-4018-A468-7135435F4D48}\TypeLib\ = "{D3C98026-41F8-40CA-BCAB-5A7B10328926}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3C98026-41F8-40CA-BCAB-5A7B10328926}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{343DED4C-FCD6-4018-A468-7135435F4D48}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\InprocServer32\ = "C:\\Windows\\SysWow64\\ecologyplugin\\iWebOffice\\iWebOffice2003.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AA64ECD-DFCB-4B88-A2B0-6A5C465D3F15}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{343DED4C-FCD6-4018-A468-7135435F4D48} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\TypeLib regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{98C68055-BF65-49FF-9BF1-3971CBDCD3E4}\ = "IPDF417Manager" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3C98026-41F8-40CA-BCAB-5A7B10328926}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3C98026-41F8-40CA-BCAB-5A7B10328926}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F7FA98B-AAA1-4D45-83B8-98E95ECADCF4}\ = "IiWebOfficeEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\MiscStatus\1\ = "205201" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AA64ECD-DFCB-4B88-A2B0-6A5C465D3F15}\MiscStatus\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AA64ECD-DFCB-4B88-A2B0-6A5C465D3F15}\TypeLib\ = "{2F5BF1DC-C7D9-4EE6-9792-AE9FCCC32565}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{98C68055-BF65-49FF-9BF1-3971CBDCD3E4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C01A9E2E-66D1-4B2E-95E2-68A529EE0B07}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\Verb regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{869D767C-835B-4521-AB59-906D0AF6A74C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BarCodeManager.PDF417Manager.1\ = "PDF417Manager Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AA64ECD-DFCB-4B88-A2B0-6A5C465D3F15}\MiscStatus\1\ = "131473" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F7FA98B-AAA1-4D45-83B8-98E95ECADCF4}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F7FA98B-AAA1-4D45-83B8-98E95ECADCF4}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBCDD82F-1447-4721-9313-934B9E5CB416}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBCDD82F-1447-4721-9313-934B9E5CB416}\TypeLib\ = "{D3C98026-41F8-40CA-BCAB-5A7B10328926}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C01A9E2E-66D1-4B2E-95E2-68A529EE0B07}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{343DED4C-FCD6-4018-A468-7135435F4D48}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iWebOffice2003.iWebOffice regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2F5BF1DC-C7D9-4EE6-9792-AE9FCCC32565}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2F5BF1DC-C7D9-4EE6-9792-AE9FCCC32565}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C01A9E2E-66D1-4B2E-95E2-68A529EE0B07}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C01A9E2E-66D1-4B2E-95E2-68A529EE0B07}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{343DED4C-FCD6-4018-A468-7135435F4D48} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iWebOffice2003.iWebOffice\ = "iWebOffice Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\BarCodeManager.DLL\AppID = "{869D767C-835B-4521-AB59-906D0AF6A74C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AA64ECD-DFCB-4B88-A2B0-6A5C465D3F15}\VersionIndependentProgID\ = "BarCodeManager.PDF417Manager" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3C98026-41F8-40CA-BCAB-5A7B10328926}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23739A7E-5741-4D1C-88D5-D50B18F7C347}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BarCodeManager.PDF417Manager\ = "PDF417Manager Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{98C68055-BF65-49FF-9BF1-3971CBDCD3E4}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{98C68055-BF65-49FF-9BF1-3971CBDCD3E4}\TypeLib\ = "{2F5BF1DC-C7D9-4EE6-9792-AE9FCCC32565}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{98C68055-BF65-49FF-9BF1-3971CBDCD3E4}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D3C98026-41F8-40CA-BCAB-5A7B10328926}\1.0\ = "iWebOffice2003 Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBCDD82F-1447-4721-9313-934B9E5CB416}\InprocServer32\ = "C:\\Windows\\SysWow64\\ecologyplugin\\iWebOffice\\iWebOffice2003.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBCDD82F-1447-4721-9313-934B9E5CB416}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BarCodeManager.PDF417Manager\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2F5BF1DC-C7D9-4EE6-9792-AE9FCCC32565}\1.0\ = "BarCodeManager 1.0 ÀàÐÍ¿â" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2F5BF1DC-C7D9-4EE6-9792-AE9FCCC32565}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C01A9E2E-66D1-4B2E-95E2-68A529EE0B07}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F7FA98B-AAA1-4D45-83B8-98E95ECADCF4}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iWebOffice2003.iWebOffice\Clsid\ = "{23739A7E-5741-4D1C-88D5-D50B18F7C347}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CBCDD82F-1447-4721-9313-934B9E5CB416}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AA64ECD-DFCB-4B88-A2B0-6A5C465D3F15}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F7FA98B-AAA1-4D45-83B8-98E95ECADCF4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iWebOffice2003.OfficeAddins\Clsid\ = "{CBCDD82F-1447-4721-9313-934B9E5CB416}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AA64ECD-DFCB-4B88-A2B0-6A5C465D3F15}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2F5BF1DC-C7D9-4EE6-9792-AE9FCCC32565}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C01A9E2E-66D1-4B2E-95E2-68A529EE0B07}\ProxyStubClsid32 regsvr32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4240 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exepid process 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription pid process Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Token: SeDebugPrivilege 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.execmd.exedescription pid process target process PID 3632 wrote to memory of 800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 804 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 1016 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe dwm.exe PID 3632 wrote to memory of 2800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe sihost.exe PID 3632 wrote to memory of 2828 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe svchost.exe PID 3632 wrote to memory of 2904 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe taskhostw.exe PID 3632 wrote to memory of 696 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Explorer.EXE PID 3632 wrote to memory of 3104 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe svchost.exe PID 3632 wrote to memory of 3324 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe DllHost.exe PID 3632 wrote to memory of 3420 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe StartMenuExperienceHost.exe PID 3632 wrote to memory of 3488 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 3572 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe SearchApp.exe PID 3632 wrote to memory of 3812 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 4708 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 3044 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe cmd.exe PID 3632 wrote to memory of 3044 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe cmd.exe PID 3632 wrote to memory of 3044 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe cmd.exe PID 3044 wrote to memory of 3196 3044 cmd.exe regsvr32.exe PID 3044 wrote to memory of 3196 3044 cmd.exe regsvr32.exe PID 3044 wrote to memory of 3196 3044 cmd.exe regsvr32.exe PID 3044 wrote to memory of 2844 3044 cmd.exe regsvr32.exe PID 3044 wrote to memory of 2844 3044 cmd.exe regsvr32.exe PID 3044 wrote to memory of 2844 3044 cmd.exe regsvr32.exe PID 3044 wrote to memory of 4240 3044 cmd.exe NOTEPAD.EXE PID 3044 wrote to memory of 4240 3044 cmd.exe NOTEPAD.EXE PID 3044 wrote to memory of 4240 3044 cmd.exe NOTEPAD.EXE PID 3632 wrote to memory of 800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 804 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 1016 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe dwm.exe PID 3632 wrote to memory of 2800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe sihost.exe PID 3632 wrote to memory of 2828 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe svchost.exe PID 3632 wrote to memory of 2904 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe taskhostw.exe PID 3632 wrote to memory of 696 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Explorer.EXE PID 3632 wrote to memory of 3104 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe svchost.exe PID 3632 wrote to memory of 3324 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe DllHost.exe PID 3632 wrote to memory of 3420 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe StartMenuExperienceHost.exe PID 3632 wrote to memory of 3488 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 3572 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe SearchApp.exe PID 3632 wrote to memory of 3812 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 4708 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 3044 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe cmd.exe PID 3632 wrote to memory of 3044 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe cmd.exe PID 3632 wrote to memory of 1436 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Conhost.exe PID 3632 wrote to memory of 4240 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe NOTEPAD.EXE PID 3632 wrote to memory of 4240 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe NOTEPAD.EXE PID 3632 wrote to memory of 800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 804 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 1016 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe dwm.exe PID 3632 wrote to memory of 2800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe sihost.exe PID 3632 wrote to memory of 2828 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe svchost.exe PID 3632 wrote to memory of 2904 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe taskhostw.exe PID 3632 wrote to memory of 696 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Explorer.EXE PID 3632 wrote to memory of 3104 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe svchost.exe PID 3632 wrote to memory of 3324 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe DllHost.exe PID 3632 wrote to memory of 3420 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe StartMenuExperienceHost.exe PID 3632 wrote to memory of 3488 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 3572 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe SearchApp.exe PID 3632 wrote to memory of 3812 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 4708 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe RuntimeBroker.exe PID 3632 wrote to memory of 1436 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe Conhost.exe PID 3632 wrote to memory of 800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 804 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe fontdrvhost.exe PID 3632 wrote to memory of 1016 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe dwm.exe PID 3632 wrote to memory of 2800 3632 d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe sihost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe"C:\Users\Admin\AppData\Local\Temp\d70fe2be98249d3eae1bb2826aa6f71205e40bd40442481c3ea92b0e8fbbc232.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.bat" "3⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\System32\ecologyplugin\iWebOffice\iWebOffice2003.ocx /s4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\System32\ecologyplugin\iWebOffice\PDF417Manager.dll /s4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\System32\ecologyplugin\iWebOffice\readme.txt4⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\LOGO.icoFilesize
2KB
MD541eca7a9245394106a09b2534d8030df
SHA1b38e19173aea521d2fb00ef706abb0df7d076b0c
SHA256f1a9670d5b4ee0fed36b7370193e4aa052f916ee038d91b6fd041cbc4dbb3683
SHA512cd2fdc7b063e986278e463af34d040d5bd6851bfa1893841df6fadf428e740cf3555950186e98e533038d3588b97a66933c3f1564d9afec14750bd442c2dfdfe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PDF417Manager.dllFilesize
325KB
MD557025bb5e54588020b62dc2245bb286c
SHA1a1da892174ffc7441be22531a939b82a69083ee9
SHA25615214e339a330d0b0779bb700a099a84d5b6179a9280b776fd198fbc1450e093
SHA5124ed75c96cb0d56fe50e7f8a8ee1a011b907f39605a9f9f6af733c29a75ace0820a52dc1ccdea5978de3500ff5fc7b3ec249c195b73b47dc2d435c50ccb2729ad
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\iWebOffice2003.ocxFilesize
2.2MB
MD5476e64ed0990e6175f2f175fa1c28c0e
SHA13a72b83d53032385974dfe37abaf1ce3e29ffa2e
SHA256fdbabe1f81cdc87d23e67e94ad5e81852ea31eee75169a5f3e98b1ee4308b2bf
SHA5120ffe70c91b6a6770f147c938448f916d2f359c467a7b769d4a5dabb7ad90422416dfe2814d54fc8a25099b992ab9090d678237666eba5cb902f067da2b0f07f9
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rar.bmpFilesize
2KB
MD5a9fabad349a7121db3c799ede8f74d6e
SHA1d13448fc14fa6a1e0ab7c995f319faa84750dff4
SHA2566647c05a05cf81458ab13bbfaf98a78ea30171d8497d0b79b6dbcece8af6d993
SHA512269b95c2ed60f65998e7a2aa0b18e3ffb08dbdb05f2bdce2070a5731bdf23b911f9a812c06879c999fee25d0dd72cac04b5026165b34fe3093414fffac641e2b
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\readme.txtFilesize
322B
MD54aacb7ccfd4d8149e49c4b52aa2a2a81
SHA162cd6181d6fa376027416bcf2d9cc2d63da2fdb5
SHA256a9b2f74367f34691ae4e2e413a5a3abcb8fa532db441be4aa809cb52f0f7b7cb
SHA5129391655e17ed2c764ee34c6214379686e4fbf7d6cd0b697a3d90321781194adfeb610f67eff793744cb766163c0c6b2b953653b75ab71ffff5c763db06796860
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.batFilesize
679B
MD5901cb2b3ccce248eb9808b97bd2a67c5
SHA17fa6acca13720226cf6c281ca5887d3be78bde78
SHA2563ccd147481258b2e81e17b02ae79bd76e73e0c8a7f6a90109cd357248dc0228c
SHA512fca803eb79a1e895221405e518114c6538a7fc4c0429853165c9bebf64c6fa3b8c15ead66809372402c6e896c8f307f9130d9e270d40cff10ff30748aae7a27a
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\uninstall.batFilesize
431B
MD5415feabca35ebef1a5c3f3863b1d3e39
SHA18116cc1f0733012da9da940bff842d44ae52b725
SHA256d6bfa605d38b20fdf5ce042956afdd4e8fc3822897f99140a60f6b5581b3224d
SHA5121910e6b3f6928cde188cfcc59e791f725b70bda0c731d322f53581d41f1afc267a5630dfdbbf67f34cbff2ba35d0f75fd2d9bf126f36d0b0ab5624db798cef2b
-
C:\Windows\SysWOW64\ecologyplugin\iWebOffice\PDF417Manager.dllFilesize
325KB
MD557025bb5e54588020b62dc2245bb286c
SHA1a1da892174ffc7441be22531a939b82a69083ee9
SHA25615214e339a330d0b0779bb700a099a84d5b6179a9280b776fd198fbc1450e093
SHA5124ed75c96cb0d56fe50e7f8a8ee1a011b907f39605a9f9f6af733c29a75ace0820a52dc1ccdea5978de3500ff5fc7b3ec249c195b73b47dc2d435c50ccb2729ad
-
C:\Windows\SysWOW64\ecologyplugin\iWebOffice\PDF417Manager.dllFilesize
325KB
MD557025bb5e54588020b62dc2245bb286c
SHA1a1da892174ffc7441be22531a939b82a69083ee9
SHA25615214e339a330d0b0779bb700a099a84d5b6179a9280b776fd198fbc1450e093
SHA5124ed75c96cb0d56fe50e7f8a8ee1a011b907f39605a9f9f6af733c29a75ace0820a52dc1ccdea5978de3500ff5fc7b3ec249c195b73b47dc2d435c50ccb2729ad
-
C:\Windows\SysWOW64\ecologyplugin\iWebOffice\iWebOffice2003.ocxFilesize
2.2MB
MD5476e64ed0990e6175f2f175fa1c28c0e
SHA13a72b83d53032385974dfe37abaf1ce3e29ffa2e
SHA256fdbabe1f81cdc87d23e67e94ad5e81852ea31eee75169a5f3e98b1ee4308b2bf
SHA5120ffe70c91b6a6770f147c938448f916d2f359c467a7b769d4a5dabb7ad90422416dfe2814d54fc8a25099b992ab9090d678237666eba5cb902f067da2b0f07f9
-
C:\Windows\SysWOW64\ecologyplugin\iWebOffice\iWebOffice2003.ocxFilesize
2.2MB
MD5476e64ed0990e6175f2f175fa1c28c0e
SHA13a72b83d53032385974dfe37abaf1ce3e29ffa2e
SHA256fdbabe1f81cdc87d23e67e94ad5e81852ea31eee75169a5f3e98b1ee4308b2bf
SHA5120ffe70c91b6a6770f147c938448f916d2f359c467a7b769d4a5dabb7ad90422416dfe2814d54fc8a25099b992ab9090d678237666eba5cb902f067da2b0f07f9
-
C:\Windows\SysWOW64\ecologyplugin\iWebOffice\iWebOffice2003.ocxFilesize
2.2MB
MD5476e64ed0990e6175f2f175fa1c28c0e
SHA13a72b83d53032385974dfe37abaf1ce3e29ffa2e
SHA256fdbabe1f81cdc87d23e67e94ad5e81852ea31eee75169a5f3e98b1ee4308b2bf
SHA5120ffe70c91b6a6770f147c938448f916d2f359c467a7b769d4a5dabb7ad90422416dfe2814d54fc8a25099b992ab9090d678237666eba5cb902f067da2b0f07f9
-
C:\Windows\SysWOW64\ecologyplugin\iWebOffice\readme.txtFilesize
322B
MD54aacb7ccfd4d8149e49c4b52aa2a2a81
SHA162cd6181d6fa376027416bcf2d9cc2d63da2fdb5
SHA256a9b2f74367f34691ae4e2e413a5a3abcb8fa532db441be4aa809cb52f0f7b7cb
SHA5129391655e17ed2c764ee34c6214379686e4fbf7d6cd0b697a3d90321781194adfeb610f67eff793744cb766163c0c6b2b953653b75ab71ffff5c763db06796860
-
memory/2844-148-0x0000000000000000-mapping.dmp
-
memory/3044-135-0x0000000000000000-mapping.dmp
-
memory/3196-147-0x00000000022B0000-0x00000000024E0000-memory.dmpFilesize
2.2MB
-
memory/3196-143-0x0000000000000000-mapping.dmp
-
memory/3632-133-0x0000000000810000-0x000000000189E000-memory.dmpFilesize
16.6MB
-
memory/3632-132-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/3632-134-0x0000000000810000-0x000000000189E000-memory.dmpFilesize
16.6MB
-
memory/3632-153-0x0000000000810000-0x000000000189E000-memory.dmpFilesize
16.6MB
-
memory/3632-154-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/4240-151-0x0000000000000000-mapping.dmp