Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe
Resource
win10v2004-20220721-en
General
-
Target
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe
-
Size
340KB
-
MD5
668c2c58a444c028fbd491bc9afded1d
-
SHA1
c2cd569613182b71066af0b605f01dc6be8e8508
-
SHA256
58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
-
SHA512
14f39f3eb2511724d2ac2cc3f33c332920be5626c34de52894adf59a2c003db713cb882d34169f24bc4797d0db5ce77d80e569194b303cb21baeca5dacf63175
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\_RECOVERY_+mwvge.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DED8BF88E6254092
http://tes543berda73i48fsdfsd.keratadze.at/DED8BF88E6254092
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DED8BF88E6254092
http://xlowfznrg4wf7dli.ONION/DED8BF88E6254092
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1304 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe -
Deletes itself 1 IoCs
pid Process 900 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run eljuqfjaxkdj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsrmosxaxinb = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\eljuqfjaxkdj.exe\"" eljuqfjaxkdj.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1428 set thread context of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1304 set thread context of 1884 1304 eljuqfjaxkdj.exe 32 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\System\msadc\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_SelectionSubpicture.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_ButtonGraphic.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_SelectionSubpicture.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ru.pak eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\203x8subpicture.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Internet Explorer\en-US\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\_RECOVERY_+mwvge.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lv.pak eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_SelectionSubpicture.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECOVERY_+mwvge.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_VideoInset.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ml.pak eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_ButtonGraphic.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-highlight.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_RECOVERY_+mwvge.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_RECOVERY_+mwvge.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_ButtonGraphic.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\nl.pak eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Services\_RECOVERY_+mwvge.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\System\msadc\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\layers.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\_RECOVERY_+mwvge.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ko.pak eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lt.pak eljuqfjaxkdj.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\background.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG.wmv eljuqfjaxkdj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\_RECOVERY_+mwvge.html eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\bear_formatted_matte2.wmv eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoBeta.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv eljuqfjaxkdj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_title.png eljuqfjaxkdj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoCanary.png eljuqfjaxkdj.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\eljuqfjaxkdj.exe 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe File opened for modification C:\Windows\eljuqfjaxkdj.exe 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 eljuqfjaxkdj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 eljuqfjaxkdj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 eljuqfjaxkdj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 eljuqfjaxkdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 eljuqfjaxkdj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 eljuqfjaxkdj.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe 1884 eljuqfjaxkdj.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe Token: SeDebugPrivilege 1884 eljuqfjaxkdj.exe Token: SeIncreaseQuotaPrivilege 1708 WMIC.exe Token: SeSecurityPrivilege 1708 WMIC.exe Token: SeTakeOwnershipPrivilege 1708 WMIC.exe Token: SeLoadDriverPrivilege 1708 WMIC.exe Token: SeSystemProfilePrivilege 1708 WMIC.exe Token: SeSystemtimePrivilege 1708 WMIC.exe Token: SeProfSingleProcessPrivilege 1708 WMIC.exe Token: SeIncBasePriorityPrivilege 1708 WMIC.exe Token: SeCreatePagefilePrivilege 1708 WMIC.exe Token: SeBackupPrivilege 1708 WMIC.exe Token: SeRestorePrivilege 1708 WMIC.exe Token: SeShutdownPrivilege 1708 WMIC.exe Token: SeDebugPrivilege 1708 WMIC.exe Token: SeSystemEnvironmentPrivilege 1708 WMIC.exe Token: SeRemoteShutdownPrivilege 1708 WMIC.exe Token: SeUndockPrivilege 1708 WMIC.exe Token: SeManageVolumePrivilege 1708 WMIC.exe Token: 33 1708 WMIC.exe Token: 34 1708 WMIC.exe Token: 35 1708 WMIC.exe Token: SeIncreaseQuotaPrivilege 1708 WMIC.exe Token: SeSecurityPrivilege 1708 WMIC.exe Token: SeTakeOwnershipPrivilege 1708 WMIC.exe Token: SeLoadDriverPrivilege 1708 WMIC.exe Token: SeSystemProfilePrivilege 1708 WMIC.exe Token: SeSystemtimePrivilege 1708 WMIC.exe Token: SeProfSingleProcessPrivilege 1708 WMIC.exe Token: SeIncBasePriorityPrivilege 1708 WMIC.exe Token: SeCreatePagefilePrivilege 1708 WMIC.exe Token: SeBackupPrivilege 1708 WMIC.exe Token: SeRestorePrivilege 1708 WMIC.exe Token: SeShutdownPrivilege 1708 WMIC.exe Token: SeDebugPrivilege 1708 WMIC.exe Token: SeSystemEnvironmentPrivilege 1708 WMIC.exe Token: SeRemoteShutdownPrivilege 1708 WMIC.exe Token: SeUndockPrivilege 1708 WMIC.exe Token: SeManageVolumePrivilege 1708 WMIC.exe Token: 33 1708 WMIC.exe Token: 34 1708 WMIC.exe Token: 35 1708 WMIC.exe Token: SeBackupPrivilege 1288 vssvc.exe Token: SeRestorePrivilege 1288 vssvc.exe Token: SeAuditPrivilege 1288 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1428 wrote to memory of 1324 1428 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 28 PID 1324 wrote to memory of 1304 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 29 PID 1324 wrote to memory of 1304 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 29 PID 1324 wrote to memory of 1304 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 29 PID 1324 wrote to memory of 1304 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 29 PID 1324 wrote to memory of 900 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 30 PID 1324 wrote to memory of 900 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 30 PID 1324 wrote to memory of 900 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 30 PID 1324 wrote to memory of 900 1324 58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe 30 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1304 wrote to memory of 1884 1304 eljuqfjaxkdj.exe 32 PID 1884 wrote to memory of 1708 1884 eljuqfjaxkdj.exe 33 PID 1884 wrote to memory of 1708 1884 eljuqfjaxkdj.exe 33 PID 1884 wrote to memory of 1708 1884 eljuqfjaxkdj.exe 33 PID 1884 wrote to memory of 1708 1884 eljuqfjaxkdj.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System eljuqfjaxkdj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" eljuqfjaxkdj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe"C:\Users\Admin\AppData\Local\Temp\58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe"C:\Users\Admin\AppData\Local\Temp\58061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\eljuqfjaxkdj.exeC:\Windows\eljuqfjaxkdj.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\eljuqfjaxkdj.exeC:\Windows\eljuqfjaxkdj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1884 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\58061C~1.EXE3⤵
- Deletes itself
PID:900
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5668c2c58a444c028fbd491bc9afded1d
SHA1c2cd569613182b71066af0b605f01dc6be8e8508
SHA25658061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
SHA51214f39f3eb2511724d2ac2cc3f33c332920be5626c34de52894adf59a2c003db713cb882d34169f24bc4797d0db5ce77d80e569194b303cb21baeca5dacf63175
-
Filesize
340KB
MD5668c2c58a444c028fbd491bc9afded1d
SHA1c2cd569613182b71066af0b605f01dc6be8e8508
SHA25658061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
SHA51214f39f3eb2511724d2ac2cc3f33c332920be5626c34de52894adf59a2c003db713cb882d34169f24bc4797d0db5ce77d80e569194b303cb21baeca5dacf63175
-
Filesize
340KB
MD5668c2c58a444c028fbd491bc9afded1d
SHA1c2cd569613182b71066af0b605f01dc6be8e8508
SHA25658061c1909f91911679bd27a57c19110396ee63a83014bac98ad4bd493234a89
SHA51214f39f3eb2511724d2ac2cc3f33c332920be5626c34de52894adf59a2c003db713cb882d34169f24bc4797d0db5ce77d80e569194b303cb21baeca5dacf63175