Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 14:04
Static task
static1
Behavioral task
behavioral1
Sample
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe
Resource
win10v2004-20220721-en
General
-
Target
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe
-
Size
356KB
-
MD5
83cbd6efc32c6d96c9497712452d3857
-
SHA1
61c1910fe8cf2577ae3350f9481947158ed1c176
-
SHA256
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165
-
SHA512
514212048ea534281e8bbdf6ad537092e13a73ba93ceca7b9258cbd2d42337bf21831ed0bc3a8fa7b5d5fc8ac4beb2a8b1d14088f4abc08bd6aea1ec42d31489
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_ReCoVeRy_+ywdnh.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F1DD40D4627628AA
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F1DD40D4627628AA
http://yyre45dbvn2nhbefbmh.begumvelic.at/F1DD40D4627628AA
http://xlowfznrg4wf7dli.ONION/F1DD40D4627628AA
Extracted
C:\$Recycle.Bin\S-1-5-21-2660308776-3705150086-26593515-1000\_ReCoVeRy_+ywdnh.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
sbkaljlybllw.exesbkaljlybllw.exepid Process 4992 sbkaljlybllw.exe 4304 sbkaljlybllw.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exesbkaljlybllw.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation sbkaljlybllw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
sbkaljlybllw.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN sbkaljlybllw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nakbtbg = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\sbkaljlybllw.exe" sbkaljlybllw.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exesbkaljlybllw.exedescription pid Process procid_target PID 4028 set thread context of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4992 set thread context of 4304 4992 sbkaljlybllw.exe 85 -
Drops file in Program Files directory 64 IoCs
Processes:
sbkaljlybllw.exedescription ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SmallTile.scale-100.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\HoloAssets\HoloLens_HandTracking.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\WideTile.scale-200.png sbkaljlybllw.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\W2.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalStoreLogo.scale-200_contrast-white.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\StoreLogo\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\StopwatchSmallTile.contrast-black_scale-200.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-72_altform-unplated_contrast-black.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Exchange.scale-250.png sbkaljlybllw.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\System\ole db\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\Utilities\Styling\css\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Microsoft.Support.SDK\Assets\VALoading.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-200_contrast-white.png sbkaljlybllw.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppPackageLargeTile.scale-100.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorLargeTile.contrast-white_scale-125.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSmallTile.scale-400.png sbkaljlybllw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-30_contrast-white.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\Logo.scale-200_contrast-black.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-16_altform-unplated.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sl-SI\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\LargeTile.scale-125.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\W6.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\LargeTile.scale-125_contrast-white.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\AppPackageStoreLogo.scale-125_contrast-white.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsSmallTile.contrast-white_scale-100.png sbkaljlybllw.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\6FD5A0C9-4153-4D83-B132-DA472BB9439B\root\vfs\Windows\assembly\GAC_MSIL\Microsoft.AnalysisServices.SPClient.Interfaces\13.0.0.0__89845DCD8080CC91\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\HelpAndFeedback\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxMediumTile.scale-200.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\Weather_SplashScreen.scale-100.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\Assets\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-96_altform-unplated_contrast-white.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeLogo.scale-200_contrast-black.png sbkaljlybllw.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageLargeTile.scale-150.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreLargeTile.scale-200.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-80_contrast-black.png sbkaljlybllw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\_ReCoVeRy_+ywdnh.png sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\index.txt sbkaljlybllw.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.1813.0_neutral_~_8wekyb3d8bbwe\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_ReCoVeRy_+ywdnh.html sbkaljlybllw.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_ReCoVeRy_+ywdnh.txt sbkaljlybllw.exe -
Drops file in Windows directory 2 IoCs
Processes:
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exedescription ioc Process File created C:\Windows\sbkaljlybllw.exe 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe File opened for modification C:\Windows\sbkaljlybllw.exe 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sbkaljlybllw.exepid Process 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe 4304 sbkaljlybllw.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exesbkaljlybllw.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 5000 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe Token: SeDebugPrivilege 4304 sbkaljlybllw.exe Token: SeIncreaseQuotaPrivilege 848 WMIC.exe Token: SeSecurityPrivilege 848 WMIC.exe Token: SeTakeOwnershipPrivilege 848 WMIC.exe Token: SeLoadDriverPrivilege 848 WMIC.exe Token: SeSystemProfilePrivilege 848 WMIC.exe Token: SeSystemtimePrivilege 848 WMIC.exe Token: SeProfSingleProcessPrivilege 848 WMIC.exe Token: SeIncBasePriorityPrivilege 848 WMIC.exe Token: SeCreatePagefilePrivilege 848 WMIC.exe Token: SeBackupPrivilege 848 WMIC.exe Token: SeRestorePrivilege 848 WMIC.exe Token: SeShutdownPrivilege 848 WMIC.exe Token: SeDebugPrivilege 848 WMIC.exe Token: SeSystemEnvironmentPrivilege 848 WMIC.exe Token: SeRemoteShutdownPrivilege 848 WMIC.exe Token: SeUndockPrivilege 848 WMIC.exe Token: SeManageVolumePrivilege 848 WMIC.exe Token: 33 848 WMIC.exe Token: 34 848 WMIC.exe Token: 35 848 WMIC.exe Token: 36 848 WMIC.exe Token: SeIncreaseQuotaPrivilege 848 WMIC.exe Token: SeSecurityPrivilege 848 WMIC.exe Token: SeTakeOwnershipPrivilege 848 WMIC.exe Token: SeLoadDriverPrivilege 848 WMIC.exe Token: SeSystemProfilePrivilege 848 WMIC.exe Token: SeSystemtimePrivilege 848 WMIC.exe Token: SeProfSingleProcessPrivilege 848 WMIC.exe Token: SeIncBasePriorityPrivilege 848 WMIC.exe Token: SeCreatePagefilePrivilege 848 WMIC.exe Token: SeBackupPrivilege 848 WMIC.exe Token: SeRestorePrivilege 848 WMIC.exe Token: SeShutdownPrivilege 848 WMIC.exe Token: SeDebugPrivilege 848 WMIC.exe Token: SeSystemEnvironmentPrivilege 848 WMIC.exe Token: SeRemoteShutdownPrivilege 848 WMIC.exe Token: SeUndockPrivilege 848 WMIC.exe Token: SeManageVolumePrivilege 848 WMIC.exe Token: 33 848 WMIC.exe Token: 34 848 WMIC.exe Token: 35 848 WMIC.exe Token: 36 848 WMIC.exe Token: SeBackupPrivilege 792 vssvc.exe Token: SeRestorePrivilege 792 vssvc.exe Token: SeAuditPrivilege 792 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exesbkaljlybllw.exesbkaljlybllw.exedescription pid Process procid_target PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 4028 wrote to memory of 5000 4028 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 80 PID 5000 wrote to memory of 4992 5000 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 81 PID 5000 wrote to memory of 4992 5000 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 81 PID 5000 wrote to memory of 4992 5000 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 81 PID 5000 wrote to memory of 3612 5000 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 82 PID 5000 wrote to memory of 3612 5000 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 82 PID 5000 wrote to memory of 3612 5000 587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe 82 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4992 wrote to memory of 4304 4992 sbkaljlybllw.exe 85 PID 4304 wrote to memory of 848 4304 sbkaljlybllw.exe 86 PID 4304 wrote to memory of 848 4304 sbkaljlybllw.exe 86 -
System policy modification 1 TTPs 2 IoCs
Processes:
sbkaljlybllw.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System sbkaljlybllw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" sbkaljlybllw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe"C:\Users\Admin\AppData\Local\Temp\587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe"C:\Users\Admin\AppData\Local\Temp\587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\sbkaljlybllw.exeC:\Windows\sbkaljlybllw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\sbkaljlybllw.exeC:\Windows\sbkaljlybllw.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4304 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\587C29~1.EXE3⤵PID:3612
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD583cbd6efc32c6d96c9497712452d3857
SHA161c1910fe8cf2577ae3350f9481947158ed1c176
SHA256587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165
SHA512514212048ea534281e8bbdf6ad537092e13a73ba93ceca7b9258cbd2d42337bf21831ed0bc3a8fa7b5d5fc8ac4beb2a8b1d14088f4abc08bd6aea1ec42d31489
-
Filesize
356KB
MD583cbd6efc32c6d96c9497712452d3857
SHA161c1910fe8cf2577ae3350f9481947158ed1c176
SHA256587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165
SHA512514212048ea534281e8bbdf6ad537092e13a73ba93ceca7b9258cbd2d42337bf21831ed0bc3a8fa7b5d5fc8ac4beb2a8b1d14088f4abc08bd6aea1ec42d31489
-
Filesize
356KB
MD583cbd6efc32c6d96c9497712452d3857
SHA161c1910fe8cf2577ae3350f9481947158ed1c176
SHA256587c297d767f0ceada22d981decf1972ae4e1d17bd7be2486f16323389fb8165
SHA512514212048ea534281e8bbdf6ad537092e13a73ba93ceca7b9258cbd2d42337bf21831ed0bc3a8fa7b5d5fc8ac4beb2a8b1d14088f4abc08bd6aea1ec42d31489