Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 01:37
Static task
static1
Behavioral task
behavioral1
Sample
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe
Resource
win10v2004-20220721-en
General
-
Target
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe
-
Size
368KB
-
MD5
4e826024050255ddf739c2656f2d9a77
-
SHA1
856eca0fb51d6994d9d472dfe5358b4c9b5293d7
-
SHA256
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab
-
SHA512
fb25c55a9710133214b97bbd9492f39df0f2f43ea9e056cf05f6f4943d9f26031e7832d77df5dd2f69f49c97de92b3d9fbb2d3477215d9f405dcf178488ea8ff
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+apref.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7D90FD1AB292CD64
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7D90FD1AB292CD64
http://yyre45dbvn2nhbefbmh.begumvelic.at/7D90FD1AB292CD64
http://xlowfznrg4wf7dli.ONION/7D90FD1AB292CD64
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\_ReCoVeRy_+apref.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
fvncjgdhqmhl.exefvncjgdhqmhl.exepid Process 1992 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 936 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fvncjgdhqmhl.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN fvncjgdhqmhl.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\hamtqka = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\fvncjgdhqmhl.exe" fvncjgdhqmhl.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exefvncjgdhqmhl.exedescription pid Process procid_target PID 1376 set thread context of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1992 set thread context of 1736 1992 fvncjgdhqmhl.exe 30 -
Drops file in Program Files directory 64 IoCs
Processes:
fvncjgdhqmhl.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\Lang\ba.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\colorcycle.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_ButtonGraphic.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-ImageMask.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\title_stripe.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_btn-back-static.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask.wmv fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\notes-static.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\ExpandAssert.rar fvncjgdhqmhl.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ca.pak fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonInset_Alpha2.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_ReCoVeRy_+apref.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\System\ado\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\userContent_16x9_imagemask.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_ReCoVeRy_+apref.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\System\msadc\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_selectionsubpicture.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\_ReCoVeRy_+apref.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page_PAL.wmv fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\License.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\en-US\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-overlay.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\_ReCoVeRy_+apref.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\System\msadc\_ReCoVeRy_+apref.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_ButtonGraphic.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_ReCoVeRy_+apref.html fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\_ReCoVeRy_+apref.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\Common Files\System\msadc\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-foreground.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_videoinset.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\7-Zip\Lang\_ReCoVeRy_+apref.txt fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_videoinset.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png fvncjgdhqmhl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationLeft_SelectionSubpicture.png fvncjgdhqmhl.exe -
Drops file in Windows directory 2 IoCs
Processes:
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exedescription ioc Process File created C:\Windows\fvncjgdhqmhl.exe 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe File opened for modification C:\Windows\fvncjgdhqmhl.exe 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fvncjgdhqmhl.exepid Process 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe 1736 fvncjgdhqmhl.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exefvncjgdhqmhl.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe Token: SeDebugPrivilege 1736 fvncjgdhqmhl.exe Token: SeIncreaseQuotaPrivilege 1312 WMIC.exe Token: SeSecurityPrivilege 1312 WMIC.exe Token: SeTakeOwnershipPrivilege 1312 WMIC.exe Token: SeLoadDriverPrivilege 1312 WMIC.exe Token: SeSystemProfilePrivilege 1312 WMIC.exe Token: SeSystemtimePrivilege 1312 WMIC.exe Token: SeProfSingleProcessPrivilege 1312 WMIC.exe Token: SeIncBasePriorityPrivilege 1312 WMIC.exe Token: SeCreatePagefilePrivilege 1312 WMIC.exe Token: SeBackupPrivilege 1312 WMIC.exe Token: SeRestorePrivilege 1312 WMIC.exe Token: SeShutdownPrivilege 1312 WMIC.exe Token: SeDebugPrivilege 1312 WMIC.exe Token: SeSystemEnvironmentPrivilege 1312 WMIC.exe Token: SeRemoteShutdownPrivilege 1312 WMIC.exe Token: SeUndockPrivilege 1312 WMIC.exe Token: SeManageVolumePrivilege 1312 WMIC.exe Token: 33 1312 WMIC.exe Token: 34 1312 WMIC.exe Token: 35 1312 WMIC.exe Token: SeIncreaseQuotaPrivilege 1312 WMIC.exe Token: SeSecurityPrivilege 1312 WMIC.exe Token: SeTakeOwnershipPrivilege 1312 WMIC.exe Token: SeLoadDriverPrivilege 1312 WMIC.exe Token: SeSystemProfilePrivilege 1312 WMIC.exe Token: SeSystemtimePrivilege 1312 WMIC.exe Token: SeProfSingleProcessPrivilege 1312 WMIC.exe Token: SeIncBasePriorityPrivilege 1312 WMIC.exe Token: SeCreatePagefilePrivilege 1312 WMIC.exe Token: SeBackupPrivilege 1312 WMIC.exe Token: SeRestorePrivilege 1312 WMIC.exe Token: SeShutdownPrivilege 1312 WMIC.exe Token: SeDebugPrivilege 1312 WMIC.exe Token: SeSystemEnvironmentPrivilege 1312 WMIC.exe Token: SeRemoteShutdownPrivilege 1312 WMIC.exe Token: SeUndockPrivilege 1312 WMIC.exe Token: SeManageVolumePrivilege 1312 WMIC.exe Token: 33 1312 WMIC.exe Token: 34 1312 WMIC.exe Token: 35 1312 WMIC.exe Token: SeBackupPrivilege 1280 vssvc.exe Token: SeRestorePrivilege 1280 vssvc.exe Token: SeAuditPrivilege 1280 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exefvncjgdhqmhl.exefvncjgdhqmhl.exedescription pid Process procid_target PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1376 wrote to memory of 1652 1376 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 26 PID 1652 wrote to memory of 1992 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 27 PID 1652 wrote to memory of 1992 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 27 PID 1652 wrote to memory of 1992 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 27 PID 1652 wrote to memory of 1992 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 27 PID 1652 wrote to memory of 936 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 28 PID 1652 wrote to memory of 936 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 28 PID 1652 wrote to memory of 936 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 28 PID 1652 wrote to memory of 936 1652 56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe 28 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1992 wrote to memory of 1736 1992 fvncjgdhqmhl.exe 30 PID 1736 wrote to memory of 1312 1736 fvncjgdhqmhl.exe 31 PID 1736 wrote to memory of 1312 1736 fvncjgdhqmhl.exe 31 PID 1736 wrote to memory of 1312 1736 fvncjgdhqmhl.exe 31 PID 1736 wrote to memory of 1312 1736 fvncjgdhqmhl.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
fvncjgdhqmhl.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fvncjgdhqmhl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fvncjgdhqmhl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe"C:\Users\Admin\AppData\Local\Temp\56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe"C:\Users\Admin\AppData\Local\Temp\56cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\fvncjgdhqmhl.exeC:\Windows\fvncjgdhqmhl.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\fvncjgdhqmhl.exeC:\Windows\fvncjgdhqmhl.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1736 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\56CF19~1.EXE3⤵
- Deletes itself
PID:936
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD54e826024050255ddf739c2656f2d9a77
SHA1856eca0fb51d6994d9d472dfe5358b4c9b5293d7
SHA25656cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab
SHA512fb25c55a9710133214b97bbd9492f39df0f2f43ea9e056cf05f6f4943d9f26031e7832d77df5dd2f69f49c97de92b3d9fbb2d3477215d9f405dcf178488ea8ff
-
Filesize
368KB
MD54e826024050255ddf739c2656f2d9a77
SHA1856eca0fb51d6994d9d472dfe5358b4c9b5293d7
SHA25656cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab
SHA512fb25c55a9710133214b97bbd9492f39df0f2f43ea9e056cf05f6f4943d9f26031e7832d77df5dd2f69f49c97de92b3d9fbb2d3477215d9f405dcf178488ea8ff
-
Filesize
368KB
MD54e826024050255ddf739c2656f2d9a77
SHA1856eca0fb51d6994d9d472dfe5358b4c9b5293d7
SHA25656cf195bd7fc140caef4a59132cca2d1499783d473633c0384d1b350606731ab
SHA512fb25c55a9710133214b97bbd9492f39df0f2f43ea9e056cf05f6f4943d9f26031e7832d77df5dd2f69f49c97de92b3d9fbb2d3477215d9f405dcf178488ea8ff