Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 00:59
Static task
static1
Behavioral task
behavioral1
Sample
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe
Resource
win10v2004-20220721-en
General
-
Target
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe
-
Size
356KB
-
MD5
9033eee5371a1f698df4fc10a809646f
-
SHA1
80f9cf201cfbeb89c67d69df7879c77db22b95ba
-
SHA256
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
-
SHA512
e4902f63b789cd9460a04fb3b704f53d1a6f1ecb2cd065c7a5bac9976fcef837edd3a3baa69fe1f4c19bee92ece1b3dffd475a6c75e2519260973de8e721cebb
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_ReCoVeRy_+mqtka.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/6BA45D4DA28C911D
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/6BA45D4DA28C911D
http://yyre45dbvn2nhbefbmh.begumvelic.at/6BA45D4DA28C911D
http://xlowfznrg4wf7dli.ONION/6BA45D4DA28C911D
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_ReCoVeRy_+mqtka.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
axseexqqmgwk.exeaxseexqqmgwk.exepid process 2044 axseexqqmgwk.exe 576 axseexqqmgwk.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1992 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axseexqqmgwk.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN axseexqqmgwk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\ltykbbx = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\axseexqqmgwk.exe" axseexqqmgwk.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exeaxseexqqmgwk.exedescription pid process target process PID 908 set thread context of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 2044 set thread context of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe -
Drops file in Program Files directory 64 IoCs
Processes:
axseexqqmgwk.exedescription ioc process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_rest.png axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single.png axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png axseexqqmgwk.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_down.png axseexqqmgwk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\init.js axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_cloudy.png axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\it-IT\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back_lrg.png axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\PreviousMenuButtonIcon.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref.wmv axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\drag.png axseexqqmgwk.exe File opened for modification C:\Program Files\7-Zip\History.txt axseexqqmgwk.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_SelectionSubpicture.png axseexqqmgwk.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ko.pak axseexqqmgwk.exe File opened for modification C:\Program Files\Internet Explorer\en-US\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Common Files\System\de-DE\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_rest.png axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\32.png axseexqqmgwk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Journal\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_ReCoVeRy_+mqtka.html axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv axseexqqmgwk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIcon.png axseexqqmgwk.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_ReCoVeRy_+mqtka.txt axseexqqmgwk.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_ReCoVeRy_+mqtka.png axseexqqmgwk.exe -
Drops file in Windows directory 2 IoCs
Processes:
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exedescription ioc process File created C:\Windows\axseexqqmgwk.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe File opened for modification C:\Windows\axseexqqmgwk.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
axseexqqmgwk.exepid process 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe 576 axseexqqmgwk.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exeaxseexqqmgwk.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe Token: SeDebugPrivilege 576 axseexqqmgwk.exe Token: SeIncreaseQuotaPrivilege 1008 WMIC.exe Token: SeSecurityPrivilege 1008 WMIC.exe Token: SeTakeOwnershipPrivilege 1008 WMIC.exe Token: SeLoadDriverPrivilege 1008 WMIC.exe Token: SeSystemProfilePrivilege 1008 WMIC.exe Token: SeSystemtimePrivilege 1008 WMIC.exe Token: SeProfSingleProcessPrivilege 1008 WMIC.exe Token: SeIncBasePriorityPrivilege 1008 WMIC.exe Token: SeCreatePagefilePrivilege 1008 WMIC.exe Token: SeBackupPrivilege 1008 WMIC.exe Token: SeRestorePrivilege 1008 WMIC.exe Token: SeShutdownPrivilege 1008 WMIC.exe Token: SeDebugPrivilege 1008 WMIC.exe Token: SeSystemEnvironmentPrivilege 1008 WMIC.exe Token: SeRemoteShutdownPrivilege 1008 WMIC.exe Token: SeUndockPrivilege 1008 WMIC.exe Token: SeManageVolumePrivilege 1008 WMIC.exe Token: 33 1008 WMIC.exe Token: 34 1008 WMIC.exe Token: 35 1008 WMIC.exe Token: SeIncreaseQuotaPrivilege 1008 WMIC.exe Token: SeSecurityPrivilege 1008 WMIC.exe Token: SeTakeOwnershipPrivilege 1008 WMIC.exe Token: SeLoadDriverPrivilege 1008 WMIC.exe Token: SeSystemProfilePrivilege 1008 WMIC.exe Token: SeSystemtimePrivilege 1008 WMIC.exe Token: SeProfSingleProcessPrivilege 1008 WMIC.exe Token: SeIncBasePriorityPrivilege 1008 WMIC.exe Token: SeCreatePagefilePrivilege 1008 WMIC.exe Token: SeBackupPrivilege 1008 WMIC.exe Token: SeRestorePrivilege 1008 WMIC.exe Token: SeShutdownPrivilege 1008 WMIC.exe Token: SeDebugPrivilege 1008 WMIC.exe Token: SeSystemEnvironmentPrivilege 1008 WMIC.exe Token: SeRemoteShutdownPrivilege 1008 WMIC.exe Token: SeUndockPrivilege 1008 WMIC.exe Token: SeManageVolumePrivilege 1008 WMIC.exe Token: 33 1008 WMIC.exe Token: 34 1008 WMIC.exe Token: 35 1008 WMIC.exe Token: SeBackupPrivilege 1548 vssvc.exe Token: SeRestorePrivilege 1548 vssvc.exe Token: SeAuditPrivilege 1548 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exeaxseexqqmgwk.exeaxseexqqmgwk.exedescription pid process target process PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 908 wrote to memory of 1228 908 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe PID 1228 wrote to memory of 2044 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe axseexqqmgwk.exe PID 1228 wrote to memory of 2044 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe axseexqqmgwk.exe PID 1228 wrote to memory of 2044 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe axseexqqmgwk.exe PID 1228 wrote to memory of 2044 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe axseexqqmgwk.exe PID 1228 wrote to memory of 1992 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe cmd.exe PID 1228 wrote to memory of 1992 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe cmd.exe PID 1228 wrote to memory of 1992 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe cmd.exe PID 1228 wrote to memory of 1992 1228 5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe cmd.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 2044 wrote to memory of 576 2044 axseexqqmgwk.exe axseexqqmgwk.exe PID 576 wrote to memory of 1008 576 axseexqqmgwk.exe WMIC.exe PID 576 wrote to memory of 1008 576 axseexqqmgwk.exe WMIC.exe PID 576 wrote to memory of 1008 576 axseexqqmgwk.exe WMIC.exe PID 576 wrote to memory of 1008 576 axseexqqmgwk.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
axseexqqmgwk.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System axseexqqmgwk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" axseexqqmgwk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe"C:\Users\Admin\AppData\Local\Temp\5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe"C:\Users\Admin\AppData\Local\Temp\5704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\axseexqqmgwk.exeC:\Windows\axseexqqmgwk.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\axseexqqmgwk.exeC:\Windows\axseexqqmgwk.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:576 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5704CC~1.EXE3⤵
- Deletes itself
PID:1992
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\axseexqqmgwk.exeFilesize
356KB
MD59033eee5371a1f698df4fc10a809646f
SHA180f9cf201cfbeb89c67d69df7879c77db22b95ba
SHA2565704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
SHA512e4902f63b789cd9460a04fb3b704f53d1a6f1ecb2cd065c7a5bac9976fcef837edd3a3baa69fe1f4c19bee92ece1b3dffd475a6c75e2519260973de8e721cebb
-
C:\Windows\axseexqqmgwk.exeFilesize
356KB
MD59033eee5371a1f698df4fc10a809646f
SHA180f9cf201cfbeb89c67d69df7879c77db22b95ba
SHA2565704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
SHA512e4902f63b789cd9460a04fb3b704f53d1a6f1ecb2cd065c7a5bac9976fcef837edd3a3baa69fe1f4c19bee92ece1b3dffd475a6c75e2519260973de8e721cebb
-
C:\Windows\axseexqqmgwk.exeFilesize
356KB
MD59033eee5371a1f698df4fc10a809646f
SHA180f9cf201cfbeb89c67d69df7879c77db22b95ba
SHA2565704ccbb2ad62e52a4e76e8f85ee50557472045165a43b77346c1fb8dbb58ca9
SHA512e4902f63b789cd9460a04fb3b704f53d1a6f1ecb2cd065c7a5bac9976fcef837edd3a3baa69fe1f4c19bee92ece1b3dffd475a6c75e2519260973de8e721cebb
-
memory/576-95-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/576-94-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/576-93-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/576-89-0x0000000000411AB0-mapping.dmp
-
memory/908-55-0x0000000000020000-0x0000000000023000-memory.dmpFilesize
12KB
-
memory/908-54-0x0000000000020000-0x0000000000023000-memory.dmpFilesize
12KB
-
memory/908-68-0x0000000000020000-0x0000000000023000-memory.dmpFilesize
12KB
-
memory/1008-96-0x0000000000000000-mapping.dmp
-
memory/1228-63-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-67-0x0000000000411AB0-mapping.dmp
-
memory/1228-72-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-56-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-70-0x0000000075D21000-0x0000000075D23000-memory.dmpFilesize
8KB
-
memory/1228-57-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-76-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-71-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-66-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-64-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-61-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1228-59-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/1992-75-0x0000000000000000-mapping.dmp
-
memory/2044-73-0x0000000000000000-mapping.dmp