Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 04:50
Static task
static1
Behavioral task
behavioral1
Sample
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe
Resource
win10v2004-20220721-en
General
-
Target
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe
-
Size
416KB
-
MD5
121e0d2c092d76e599e925f0b96746a3
-
SHA1
6b0311750c7e712b4de156dda496bb88705c8e1b
-
SHA256
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b
-
SHA512
b9fd5ceb2b8ef2375dbd6698fa12e98e8ce184801dcbfa7bcf9196aaf91ac875b3b8972f686801c9988d543d423adbd46bd8a6dd616238db47aeb9a96ba324a4
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\Recovery+oetxw.txt
http://p57gest54celltraf743knjf.mottesapo.com/BF6A638F93F05150
http://k4restportgonst34d23r.oftpony.at/BF6A638F93F05150
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/BF6A638F93F05150
http://fwgrhsao3aoml7ej.onion/BF6A638F93F05150
http://fwgrhsao3aoml7ej.ONION/BF6A638F93F05150
Signatures
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 3 IoCs
Processes:
gfuvlpmofebw.exegfuvlpmofebw.exehebtt.exepid process 1208 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1508 hebtt.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1288 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
gfuvlpmofebw.exepid process 1632 gfuvlpmofebw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gfuvlpmofebw.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run gfuvlpmofebw.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\12_23-dst = "C:\\Windows\\gfuvlpmofebw.exe" gfuvlpmofebw.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exegfuvlpmofebw.exedescription pid process target process PID 1360 set thread context of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1208 set thread context of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe -
Drops file in Program Files directory 64 IoCs
Processes:
gfuvlpmofebw.exedescription ioc process File opened for modification C:\Program Files\7-Zip\License.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\readme.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\ado\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\it-IT\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\Recovery+oetxw.html gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\Recovery+oetxw.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\Recovery+oetxw.png gfuvlpmofebw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\Recovery+oetxw.html gfuvlpmofebw.exe -
Drops file in Windows directory 2 IoCs
Processes:
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exedescription ioc process File created C:\Windows\gfuvlpmofebw.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe File opened for modification C:\Windows\gfuvlpmofebw.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2044 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gfuvlpmofebw.exepid process 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe 1632 gfuvlpmofebw.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exegfuvlpmofebw.exevssvc.exedescription pid process Token: SeDebugPrivilege 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe Token: SeDebugPrivilege 1632 gfuvlpmofebw.exe Token: SeBackupPrivilege 1700 vssvc.exe Token: SeRestorePrivilege 1700 vssvc.exe Token: SeAuditPrivilege 1700 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exegfuvlpmofebw.exepid process 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 1208 gfuvlpmofebw.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exegfuvlpmofebw.exegfuvlpmofebw.exehebtt.exedescription pid process target process PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 1360 wrote to memory of 2004 1360 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe PID 2004 wrote to memory of 1208 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe gfuvlpmofebw.exe PID 2004 wrote to memory of 1208 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe gfuvlpmofebw.exe PID 2004 wrote to memory of 1208 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe gfuvlpmofebw.exe PID 2004 wrote to memory of 1208 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe gfuvlpmofebw.exe PID 2004 wrote to memory of 1288 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe cmd.exe PID 2004 wrote to memory of 1288 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe cmd.exe PID 2004 wrote to memory of 1288 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe cmd.exe PID 2004 wrote to memory of 1288 2004 5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe cmd.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1208 wrote to memory of 1632 1208 gfuvlpmofebw.exe gfuvlpmofebw.exe PID 1632 wrote to memory of 1508 1632 gfuvlpmofebw.exe hebtt.exe PID 1632 wrote to memory of 1508 1632 gfuvlpmofebw.exe hebtt.exe PID 1632 wrote to memory of 1508 1632 gfuvlpmofebw.exe hebtt.exe PID 1632 wrote to memory of 1508 1632 gfuvlpmofebw.exe hebtt.exe PID 1508 wrote to memory of 2044 1508 hebtt.exe vssadmin.exe PID 1508 wrote to memory of 2044 1508 hebtt.exe vssadmin.exe PID 1508 wrote to memory of 2044 1508 hebtt.exe vssadmin.exe PID 1508 wrote to memory of 2044 1508 hebtt.exe vssadmin.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
gfuvlpmofebw.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gfuvlpmofebw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gfuvlpmofebw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe"C:\Users\Admin\AppData\Local\Temp\5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe"C:\Users\Admin\AppData\Local\Temp\5638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\gfuvlpmofebw.exeC:\Windows\gfuvlpmofebw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\gfuvlpmofebw.exeC:\Windows\gfuvlpmofebw.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\Documents\hebtt.exeC:\Users\Admin\Documents\hebtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5638C4~1.EXE3⤵
- Deletes itself
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\hebtt.exeFilesize
5KB
MD534d3f2e3fd92cd38a103d415dbb22936
SHA1abdcf16a82cf8d3109ec39203181d839f2154a68
SHA2565119839eaaf7dfc670c7d2c8a83e74f895e07fab5f22c379185769eed07ece25
SHA512bc76ed0fe69ab38f66217f4b4aec79947e706136aecc5a42840ccd963799c8c175dc796d92be678b2b1e55d22c3a97fb4b9e00f6879958ae5a5bb2081ae7ad92
-
C:\Windows\gfuvlpmofebw.exeFilesize
416KB
MD5121e0d2c092d76e599e925f0b96746a3
SHA16b0311750c7e712b4de156dda496bb88705c8e1b
SHA2565638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b
SHA512b9fd5ceb2b8ef2375dbd6698fa12e98e8ce184801dcbfa7bcf9196aaf91ac875b3b8972f686801c9988d543d423adbd46bd8a6dd616238db47aeb9a96ba324a4
-
C:\Windows\gfuvlpmofebw.exeFilesize
416KB
MD5121e0d2c092d76e599e925f0b96746a3
SHA16b0311750c7e712b4de156dda496bb88705c8e1b
SHA2565638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b
SHA512b9fd5ceb2b8ef2375dbd6698fa12e98e8ce184801dcbfa7bcf9196aaf91ac875b3b8972f686801c9988d543d423adbd46bd8a6dd616238db47aeb9a96ba324a4
-
C:\Windows\gfuvlpmofebw.exeFilesize
416KB
MD5121e0d2c092d76e599e925f0b96746a3
SHA16b0311750c7e712b4de156dda496bb88705c8e1b
SHA2565638c4d8dc87ed5a2ea5bf600bb3c90a01c742fa09973e9bfdb066a94836490b
SHA512b9fd5ceb2b8ef2375dbd6698fa12e98e8ce184801dcbfa7bcf9196aaf91ac875b3b8972f686801c9988d543d423adbd46bd8a6dd616238db47aeb9a96ba324a4
-
\Users\Admin\Documents\hebtt.exeFilesize
5KB
MD534d3f2e3fd92cd38a103d415dbb22936
SHA1abdcf16a82cf8d3109ec39203181d839f2154a68
SHA2565119839eaaf7dfc670c7d2c8a83e74f895e07fab5f22c379185769eed07ece25
SHA512bc76ed0fe69ab38f66217f4b4aec79947e706136aecc5a42840ccd963799c8c175dc796d92be678b2b1e55d22c3a97fb4b9e00f6879958ae5a5bb2081ae7ad92
-
memory/1208-73-0x0000000000000000-mapping.dmp
-
memory/1288-76-0x0000000000000000-mapping.dmp
-
memory/1360-54-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB
-
memory/1360-69-0x00000000003E0000-0x00000000003E3000-memory.dmpFilesize
12KB
-
memory/1360-55-0x00000000003E0000-0x00000000003E3000-memory.dmpFilesize
12KB
-
memory/1508-98-0x0000000000000000-mapping.dmp
-
memory/1632-94-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/1632-95-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/1632-90-0x000000000041A920-mapping.dmp
-
memory/1632-96-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-63-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-77-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-72-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-71-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-67-0x000000000041A920-mapping.dmp
-
memory/2004-66-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-64-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-61-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-59-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-57-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2004-56-0x0000000000400000-0x0000000000487000-memory.dmpFilesize
540KB
-
memory/2044-101-0x0000000000000000-mapping.dmp