Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 15:00
Static task
static1
Behavioral task
behavioral1
Sample
97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe
Resource
win10v2004-20220721-en
General
-
Target
97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe
-
Size
624KB
-
MD5
e2c9e21bc2d59273ad13144b10e082f8
-
SHA1
0fd4b5d955122d84552626d2634c62c78e800b7c
-
SHA256
97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433
-
SHA512
393ca8e5bf98120a4e0a8b6bab6f4f9582f3283ded401d7942ac8089a9b65d87b63ee66ac43f85de6b08ab914035e08c9b348dbd594688d2a8fee7df08dd7349
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
suricata: ET MALWARE Buran Ransomware Activity M1
suricata: ET MALWARE Buran Ransomware Activity M1
-
suricata: ET MALWARE Observed Buran Ransomware UA (BURAN)
suricata: ET MALWARE Observed Buran Ransomware UA (BURAN)
-
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2492 wevtutil.exe 2344 wevtutil.exe 3976 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 3 IoCs
pid Process 3140 lsass.exe 3840 lsass.exe 2436 lsass.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Local Security Authority Subsystem Service = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\lsass.exe\" -start" reg.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: lsass.exe File opened (read-only) \??\E: lsass.exe File opened (read-only) \??\B: lsass.exe File opened (read-only) \??\Y: lsass.exe File opened (read-only) \??\W: lsass.exe File opened (read-only) \??\V: lsass.exe File opened (read-only) \??\I: lsass.exe File opened (read-only) \??\F: lsass.exe File opened (read-only) \??\Z: lsass.exe File opened (read-only) \??\U: lsass.exe File opened (read-only) \??\T: lsass.exe File opened (read-only) \??\Q: lsass.exe File opened (read-only) \??\A: lsass.exe File opened (read-only) \??\X: lsass.exe File opened (read-only) \??\R: lsass.exe File opened (read-only) \??\N: lsass.exe File opened (read-only) \??\J: lsass.exe File opened (read-only) \??\L: lsass.exe File opened (read-only) \??\K: lsass.exe File opened (read-only) \??\H: lsass.exe File opened (read-only) \??\S: lsass.exe File opened (read-only) \??\P: lsass.exe File opened (read-only) \??\O: lsass.exe File opened (read-only) \??\M: lsass.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 geoiptool.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PowerPointNaiveBayesCommandRanker.txt.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-180.png lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui_3.106.0.v20140812-1751.jar.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\psfontj2d.properties lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-pl.xrm-ms.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.intro_3.4.200.v20130326-1254.jar.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTrial-pl.xrm-ms.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\TellMeWord.nrr.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.jobs_3.6.0.v20140424-0053.jar lsass.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\management\jmxremote.access lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Grace-ppd.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN096.XML.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sampler.xml lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-execution.xml lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Retail-ul-phn.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-100.png lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ja_5.5.0.165303.jar.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-140.png lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-tabcontrol_ja.jar.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-queries.jar lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-140.png.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\epl-v10.html.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-phn.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-80.png.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-pl.xrm-ms.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_ja_4.4.0.v20140623020002.jar lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_KMS_Client-ul-oob.xrm-ms lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director_2.3.100.v20140224-1921.jar lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe.config lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-100.png.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial3-ul-oob.xrm-ms.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\java.policy.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Tw Cen MT.xml.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-pl.xrm-ms lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_KMS_Client-ul.xrm-ms.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected].[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-awt.jar lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription2-ppd.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ul-oob.xrm-ms.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-oob.xrm-ms.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ul.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Retail-ul-phn.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-black_scale-80.png.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.properties.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.annotation_1.2.0.v201401042248.jar.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt_1.1.1.v20140903-0821.jar lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedback.gif.[1B66E625-D369-D1F2-8A29-1BDFEEB54369] lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Grace-ppd.xrm-ms lsass.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp2-ul-oob.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_COL.HXT lsass.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1860 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 500 PING.EXE -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 3140 lsass.exe Token: SeIncreaseQuotaPrivilege 3080 WMIC.exe Token: SeSecurityPrivilege 3080 WMIC.exe Token: SeTakeOwnershipPrivilege 3080 WMIC.exe Token: SeLoadDriverPrivilege 3080 WMIC.exe Token: SeSystemProfilePrivilege 3080 WMIC.exe Token: SeSystemtimePrivilege 3080 WMIC.exe Token: SeProfSingleProcessPrivilege 3080 WMIC.exe Token: SeIncBasePriorityPrivilege 3080 WMIC.exe Token: SeCreatePagefilePrivilege 3080 WMIC.exe Token: SeBackupPrivilege 3080 WMIC.exe Token: SeRestorePrivilege 3080 WMIC.exe Token: SeShutdownPrivilege 3080 WMIC.exe Token: SeDebugPrivilege 3080 WMIC.exe Token: SeSystemEnvironmentPrivilege 3080 WMIC.exe Token: SeRemoteShutdownPrivilege 3080 WMIC.exe Token: SeUndockPrivilege 3080 WMIC.exe Token: SeManageVolumePrivilege 3080 WMIC.exe Token: 33 3080 WMIC.exe Token: 34 3080 WMIC.exe Token: 35 3080 WMIC.exe Token: 36 3080 WMIC.exe Token: SeIncreaseQuotaPrivilege 3080 WMIC.exe Token: SeSecurityPrivilege 3080 WMIC.exe Token: SeTakeOwnershipPrivilege 3080 WMIC.exe Token: SeLoadDriverPrivilege 3080 WMIC.exe Token: SeSystemProfilePrivilege 3080 WMIC.exe Token: SeSystemtimePrivilege 3080 WMIC.exe Token: SeProfSingleProcessPrivilege 3080 WMIC.exe Token: SeIncBasePriorityPrivilege 3080 WMIC.exe Token: SeCreatePagefilePrivilege 3080 WMIC.exe Token: SeBackupPrivilege 3080 WMIC.exe Token: SeRestorePrivilege 3080 WMIC.exe Token: SeShutdownPrivilege 3080 WMIC.exe Token: SeDebugPrivilege 3080 WMIC.exe Token: SeSystemEnvironmentPrivilege 3080 WMIC.exe Token: SeRemoteShutdownPrivilege 3080 WMIC.exe Token: SeUndockPrivilege 3080 WMIC.exe Token: SeManageVolumePrivilege 3080 WMIC.exe Token: 33 3080 WMIC.exe Token: 34 3080 WMIC.exe Token: 35 3080 WMIC.exe Token: 36 3080 WMIC.exe Token: SeBackupPrivilege 2432 vssvc.exe Token: SeRestorePrivilege 2432 vssvc.exe Token: SeAuditPrivilege 2432 vssvc.exe Token: SeSecurityPrivilege 2492 wevtutil.exe Token: SeBackupPrivilege 2492 wevtutil.exe Token: SeSecurityPrivilege 2344 wevtutil.exe Token: SeBackupPrivilege 2344 wevtutil.exe Token: SeSecurityPrivilege 3976 wevtutil.exe Token: SeBackupPrivilege 3976 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 3204 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 82 PID 3496 wrote to memory of 3204 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 82 PID 3496 wrote to memory of 3204 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 82 PID 3204 wrote to memory of 2268 3204 cmd.exe 84 PID 3204 wrote to memory of 2268 3204 cmd.exe 84 PID 3204 wrote to memory of 2268 3204 cmd.exe 84 PID 3496 wrote to memory of 3140 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 85 PID 3496 wrote to memory of 3140 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 85 PID 3496 wrote to memory of 3140 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 85 PID 3496 wrote to memory of 3636 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 86 PID 3496 wrote to memory of 3636 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 86 PID 3496 wrote to memory of 3636 3496 97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe 86 PID 3636 wrote to memory of 500 3636 cmd.exe 88 PID 3636 wrote to memory of 500 3636 cmd.exe 88 PID 3636 wrote to memory of 500 3636 cmd.exe 88 PID 3140 wrote to memory of 1216 3140 lsass.exe 89 PID 3140 wrote to memory of 1216 3140 lsass.exe 89 PID 3140 wrote to memory of 1216 3140 lsass.exe 89 PID 3140 wrote to memory of 1920 3140 lsass.exe 91 PID 3140 wrote to memory of 1920 3140 lsass.exe 91 PID 3140 wrote to memory of 1920 3140 lsass.exe 91 PID 3140 wrote to memory of 1624 3140 lsass.exe 93 PID 3140 wrote to memory of 1624 3140 lsass.exe 93 PID 3140 wrote to memory of 1624 3140 lsass.exe 93 PID 3140 wrote to memory of 3068 3140 lsass.exe 95 PID 3140 wrote to memory of 3068 3140 lsass.exe 95 PID 3140 wrote to memory of 3068 3140 lsass.exe 95 PID 3140 wrote to memory of 1664 3140 lsass.exe 97 PID 3140 wrote to memory of 1664 3140 lsass.exe 97 PID 3140 wrote to memory of 1664 3140 lsass.exe 97 PID 3140 wrote to memory of 2336 3140 lsass.exe 99 PID 3140 wrote to memory of 2336 3140 lsass.exe 99 PID 3140 wrote to memory of 2336 3140 lsass.exe 99 PID 3140 wrote to memory of 216 3140 lsass.exe 101 PID 3140 wrote to memory of 216 3140 lsass.exe 101 PID 3140 wrote to memory of 216 3140 lsass.exe 101 PID 216 wrote to memory of 3080 216 cmd.exe 103 PID 216 wrote to memory of 3080 216 cmd.exe 103 PID 216 wrote to memory of 3080 216 cmd.exe 103 PID 3140 wrote to memory of 3388 3140 lsass.exe 106 PID 3140 wrote to memory of 3388 3140 lsass.exe 106 PID 3140 wrote to memory of 3388 3140 lsass.exe 106 PID 3140 wrote to memory of 2324 3140 lsass.exe 108 PID 3140 wrote to memory of 2324 3140 lsass.exe 108 PID 3140 wrote to memory of 2324 3140 lsass.exe 108 PID 2324 wrote to memory of 1720 2324 cmd.exe 110 PID 2324 wrote to memory of 1720 2324 cmd.exe 110 PID 2324 wrote to memory of 1720 2324 cmd.exe 110 PID 3140 wrote to memory of 3908 3140 lsass.exe 111 PID 3140 wrote to memory of 3908 3140 lsass.exe 111 PID 3140 wrote to memory of 3908 3140 lsass.exe 111 PID 3908 wrote to memory of 3236 3908 cmd.exe 113 PID 3908 wrote to memory of 3236 3908 cmd.exe 113 PID 3908 wrote to memory of 3236 3908 cmd.exe 113 PID 3140 wrote to memory of 1528 3140 lsass.exe 114 PID 3140 wrote to memory of 1528 3140 lsass.exe 114 PID 3140 wrote to memory of 1528 3140 lsass.exe 114 PID 1528 wrote to memory of 3840 1528 cmd.exe 116 PID 1528 wrote to memory of 3840 1528 cmd.exe 116 PID 1528 wrote to memory of 3840 1528 cmd.exe 116 PID 3140 wrote to memory of 3504 3140 lsass.exe 117 PID 3140 wrote to memory of 3504 3140 lsass.exe 117 PID 3140 wrote to memory of 3504 3140 lsass.exe 117 PID 3504 wrote to memory of 3784 3504 cmd.exe 119 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3784 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe"C:\Users\Admin\AppData\Local\Temp\97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /e:on /c md "C:\Users\Admin\AppData\Roaming\Microsoft\Windows" & copy "C:\Users\Admin\AppData\Local\Temp\97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" & reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Local Security Authority Subsystem Service" /t REG_SZ /F /D "\"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe\" -start"2⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Local Security Authority Subsystem Service" /t REG_SZ /F /D "\"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe\" -start"3⤵
- Adds Run key to start application
PID:2268
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:1216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:1920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup3⤵PID:3068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete systemstatebackup -keepversions:03⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete backup3⤵PID:2336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:3388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f3⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f4⤵PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f4⤵PID:3236
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"3⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"4⤵PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C attrib "%userprofile%\documents\Default.rdp" -s -h3⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\documents\Default.rdp" -s -h4⤵
- Views/modifies file attributes
PID:3784
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C del "%userprofile%\documents\Default.rdp"3⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wevtutil.exe clear-log Application3⤵PID:1884
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log Application4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wevtutil.exe clear-log Security3⤵PID:2132
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log Security4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wevtutil.exe clear-log System3⤵PID:3244
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log System4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C sc config eventlog start=disabled3⤵PID:472
-
C:\Windows\SysWOW64\sc.exesc config eventlog start=disabled4⤵
- Launches sc.exe
PID:1860
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3840
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 13⤵
- Executes dropped EXE
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c for /l %x in (1,1,999) do ( ping -n 3 127.1 & del "C:\Users\Admin\AppData\Local\Temp\97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe" & if not exist "C:\Users\Admin\AppData\Local\Temp\97f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433.exe" exit )2⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:500
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize2KB
MD51699855cd5e006d467193f752c958899
SHA111af036e632ecfb1d99c908529663597d2795786
SHA256bcb990f29d151ab7ea6dc20723f8d065ea534f1320f6c383758ea7831a30a7ea
SHA512e3f66f158b81426b62bd6aff0da13401acaa7b639686ad8ac589a8f22dfbf6d039d67ccffa2aee482b23176b9d19b7a256808e2d6037584725aadb26e7cf263b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_8AE57F9FAAC778EA4099F469BEEE4C46
Filesize472B
MD5f219eb248728be0747ada8ad649b75d8
SHA1ab0f9fd79995b2328bd4d996e60b0065f5bf30d5
SHA256a7af1395352b84f79a6ada41b92029bd542d2d8b74bb2713a5aaf49163d47076
SHA5125ce63a21ef03d583b563df5d03d613562b84068de20a8b1664bcdb73bee42380032d46b49c64210722f29653e25e5deff596b4b7f8f0206996f032bcdcdb36d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5f4e1c365e4b6e84ff1528e7a463c8707
SHA15063468bc9d5e373d5c5437d1642da7183cf5b3f
SHA256ac9297a6aec50883aceb8b0e5ef3de6ce98746288a25ef39d3101fc5fb042253
SHA5127b3540b87c2d2e6bd24b7541f572067b983a48ca10b9f927957020ea89719758ce196be91799245fa5d7f1461e2ecafcc5e5c7d1ecd1a6557d5754aed21dd356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize398B
MD5725816828d55bdf4f89c37f7be9f32fb
SHA12b9700858d56bbf0dc910c3cff0d2a03bfd623c2
SHA2563bb57dd1f0795bccc6265cd39bb7da8c4f757333aa55ed8e2f84cf769683aed2
SHA512017d16db393f8f44e1d27d125e100180efc113c762b84e4ae872905e8f9fbec0e792311001fe9ab34fcdb178107b832c011ea6732e3cafa755fa5ee0e59daf43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_8AE57F9FAAC778EA4099F469BEEE4C46
Filesize402B
MD5e8b745c457ce6d29fcde00d3264336af
SHA118595c4d08917ca7727dbd69fb8f98a7748ca768
SHA2560ff3eb897f28c7316118a2e44904b2511f25eb649ef72b518378df44f64569a7
SHA512318ad6a9bf1a30d4156a8cb9ffd24d466d8ef2044cc74d9ecb1c33fea10f134e8247d18864204d8545d77bb86e2099fc19c4f164c8f68e04a4af2e8f40374b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize396B
MD550a75e6e00e3c152523b29f7f848ead7
SHA15a0927b36ad91744945f0f613fbc39e44e2b1d4f
SHA256534783431effb2dce35bc7091277bfaa8ca635818c99812a1ccfa957966b5e0c
SHA5121379e05b31127e2e1ee182c4cd7a13dcce62e3a93c585a8e99154972571f76a3c4e2c01fc63042ab341551af0903c47b5df10d50f0ccf08cbeaffec8174f22a1
-
Filesize
18KB
MD519cb5295e21160d78213d3ccc33b8f75
SHA1d70bc890627b2dd33479eff5d2ffc8aff40a534b
SHA2567810c957fdddcb7e1477957c0b1f6e90cbaf2bec084ede2a9aa5190d131084c8
SHA5125b437b9055cdb29e0074fe493c2281af5f6bc4697e6f60d22329fa606c09bd4ffe8c0e50f98c2a12233eac00c480bc38ded1d8431ed771a4495955d865607c5e
-
Filesize
184B
MD5b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
Filesize
624KB
MD5e2c9e21bc2d59273ad13144b10e082f8
SHA10fd4b5d955122d84552626d2634c62c78e800b7c
SHA25697f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433
SHA512393ca8e5bf98120a4e0a8b6bab6f4f9582f3283ded401d7942ac8089a9b65d87b63ee66ac43f85de6b08ab914035e08c9b348dbd594688d2a8fee7df08dd7349
-
Filesize
624KB
MD5e2c9e21bc2d59273ad13144b10e082f8
SHA10fd4b5d955122d84552626d2634c62c78e800b7c
SHA25697f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433
SHA512393ca8e5bf98120a4e0a8b6bab6f4f9582f3283ded401d7942ac8089a9b65d87b63ee66ac43f85de6b08ab914035e08c9b348dbd594688d2a8fee7df08dd7349
-
Filesize
624KB
MD5e2c9e21bc2d59273ad13144b10e082f8
SHA10fd4b5d955122d84552626d2634c62c78e800b7c
SHA25697f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433
SHA512393ca8e5bf98120a4e0a8b6bab6f4f9582f3283ded401d7942ac8089a9b65d87b63ee66ac43f85de6b08ab914035e08c9b348dbd594688d2a8fee7df08dd7349
-
Filesize
624KB
MD5e2c9e21bc2d59273ad13144b10e082f8
SHA10fd4b5d955122d84552626d2634c62c78e800b7c
SHA25697f9cd7c0791ecc4a5bd2ed4e79b8966e46cdcdf55287e43abf317ced4792433
SHA512393ca8e5bf98120a4e0a8b6bab6f4f9582f3283ded401d7942ac8089a9b65d87b63ee66ac43f85de6b08ab914035e08c9b348dbd594688d2a8fee7df08dd7349