Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 06:33
Static task
static1
Behavioral task
behavioral1
Sample
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe
Resource
win10v2004-20220721-en
General
-
Target
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe
-
Size
373KB
-
MD5
132a309ee40f95380edf8a1a4f39446a
-
SHA1
558ee4fa421a85978e8e6bb29a305b0a8f65f552
-
SHA256
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5
-
SHA512
ecb754d75a47ff800e9755055ce264244ec52c73ef947c762956f035d01f086d446e9b71fa5baeca35a310735646ba9d54c341512f660ca9d895ae5df2effa5b
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+jqawq.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7B36807477819965
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7B36807477819965
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/7B36807477819965
http://xlowfznrg4wf7dli.ONION/7B36807477819965
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
qbeewmtfmhsj.exeqbeewmtfmhsj.exepid Process 2020 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1316 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
qbeewmtfmhsj.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\ecinsyebtagw = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\qbeewmtfmhsj.exe\"" qbeewmtfmhsj.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run qbeewmtfmhsj.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exeqbeewmtfmhsj.exedescription pid Process procid_target PID 1432 set thread context of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 2020 set thread context of 1752 2020 qbeewmtfmhsj.exe 31 -
Drops file in Program Files directory 64 IoCs
Processes:
qbeewmtfmhsj.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\background.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_SelectionSubpicture.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\_RECoVERY_+jqawq.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\Google\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_ButtonGraphic.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sl.pak qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\play-background.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_SelectionSubpicture.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_SelectionSubpicture.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_RECoVERY_+jqawq.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-back-static.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_ButtonGraphic.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\_RECoVERY_+jqawq.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_RECoVERY_+jqawq.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Services\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_SelectionSubpicture.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_ButtonGraphic.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop.wmv qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\README.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\System\de-DE\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_RECoVERY_+jqawq.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationUp_ButtonGraphic.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask.wmv qbeewmtfmhsj.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Internet Explorer\en-US\eula.rtf qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_RECoVERY_+jqawq.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\System\de-DE\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_scene.wmv qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\1047x576black.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_RECoVERY_+jqawq.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_RECoVERY_+jqawq.html qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_ButtonGraphic.png qbeewmtfmhsj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bg.pak qbeewmtfmhsj.exe -
Drops file in Windows directory 2 IoCs
Processes:
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exedescription ioc Process File created C:\Windows\qbeewmtfmhsj.exe 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe File opened for modification C:\Windows\qbeewmtfmhsj.exe 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
qbeewmtfmhsj.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 qbeewmtfmhsj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 qbeewmtfmhsj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 qbeewmtfmhsj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 qbeewmtfmhsj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 qbeewmtfmhsj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 qbeewmtfmhsj.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
qbeewmtfmhsj.exepid Process 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe 1752 qbeewmtfmhsj.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exeqbeewmtfmhsj.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe Token: SeDebugPrivilege 1752 qbeewmtfmhsj.exe Token: SeIncreaseQuotaPrivilege 1104 WMIC.exe Token: SeSecurityPrivilege 1104 WMIC.exe Token: SeTakeOwnershipPrivilege 1104 WMIC.exe Token: SeLoadDriverPrivilege 1104 WMIC.exe Token: SeSystemProfilePrivilege 1104 WMIC.exe Token: SeSystemtimePrivilege 1104 WMIC.exe Token: SeProfSingleProcessPrivilege 1104 WMIC.exe Token: SeIncBasePriorityPrivilege 1104 WMIC.exe Token: SeCreatePagefilePrivilege 1104 WMIC.exe Token: SeBackupPrivilege 1104 WMIC.exe Token: SeRestorePrivilege 1104 WMIC.exe Token: SeShutdownPrivilege 1104 WMIC.exe Token: SeDebugPrivilege 1104 WMIC.exe Token: SeSystemEnvironmentPrivilege 1104 WMIC.exe Token: SeRemoteShutdownPrivilege 1104 WMIC.exe Token: SeUndockPrivilege 1104 WMIC.exe Token: SeManageVolumePrivilege 1104 WMIC.exe Token: 33 1104 WMIC.exe Token: 34 1104 WMIC.exe Token: 35 1104 WMIC.exe Token: SeIncreaseQuotaPrivilege 1104 WMIC.exe Token: SeSecurityPrivilege 1104 WMIC.exe Token: SeTakeOwnershipPrivilege 1104 WMIC.exe Token: SeLoadDriverPrivilege 1104 WMIC.exe Token: SeSystemProfilePrivilege 1104 WMIC.exe Token: SeSystemtimePrivilege 1104 WMIC.exe Token: SeProfSingleProcessPrivilege 1104 WMIC.exe Token: SeIncBasePriorityPrivilege 1104 WMIC.exe Token: SeCreatePagefilePrivilege 1104 WMIC.exe Token: SeBackupPrivilege 1104 WMIC.exe Token: SeRestorePrivilege 1104 WMIC.exe Token: SeShutdownPrivilege 1104 WMIC.exe Token: SeDebugPrivilege 1104 WMIC.exe Token: SeSystemEnvironmentPrivilege 1104 WMIC.exe Token: SeRemoteShutdownPrivilege 1104 WMIC.exe Token: SeUndockPrivilege 1104 WMIC.exe Token: SeManageVolumePrivilege 1104 WMIC.exe Token: 33 1104 WMIC.exe Token: 34 1104 WMIC.exe Token: 35 1104 WMIC.exe Token: SeBackupPrivilege 1364 vssvc.exe Token: SeRestorePrivilege 1364 vssvc.exe Token: SeAuditPrivilege 1364 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exeqbeewmtfmhsj.exeqbeewmtfmhsj.exedescription pid Process procid_target PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1432 wrote to memory of 1080 1432 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 27 PID 1080 wrote to memory of 2020 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 28 PID 1080 wrote to memory of 2020 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 28 PID 1080 wrote to memory of 2020 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 28 PID 1080 wrote to memory of 2020 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 28 PID 1080 wrote to memory of 1316 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 29 PID 1080 wrote to memory of 1316 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 29 PID 1080 wrote to memory of 1316 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 29 PID 1080 wrote to memory of 1316 1080 60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe 29 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 2020 wrote to memory of 1752 2020 qbeewmtfmhsj.exe 31 PID 1752 wrote to memory of 1104 1752 qbeewmtfmhsj.exe 32 PID 1752 wrote to memory of 1104 1752 qbeewmtfmhsj.exe 32 PID 1752 wrote to memory of 1104 1752 qbeewmtfmhsj.exe 32 PID 1752 wrote to memory of 1104 1752 qbeewmtfmhsj.exe 32 -
System policy modification 1 TTPs 2 IoCs
Processes:
qbeewmtfmhsj.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qbeewmtfmhsj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qbeewmtfmhsj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe"C:\Users\Admin\AppData\Local\Temp\60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe"C:\Users\Admin\AppData\Local\Temp\60264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\qbeewmtfmhsj.exeC:\Windows\qbeewmtfmhsj.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\qbeewmtfmhsj.exeC:\Windows\qbeewmtfmhsj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\60264A~1.EXE3⤵
- Deletes itself
PID:1316
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5132a309ee40f95380edf8a1a4f39446a
SHA1558ee4fa421a85978e8e6bb29a305b0a8f65f552
SHA25660264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5
SHA512ecb754d75a47ff800e9755055ce264244ec52c73ef947c762956f035d01f086d446e9b71fa5baeca35a310735646ba9d54c341512f660ca9d895ae5df2effa5b
-
Filesize
373KB
MD5132a309ee40f95380edf8a1a4f39446a
SHA1558ee4fa421a85978e8e6bb29a305b0a8f65f552
SHA25660264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5
SHA512ecb754d75a47ff800e9755055ce264244ec52c73ef947c762956f035d01f086d446e9b71fa5baeca35a310735646ba9d54c341512f660ca9d895ae5df2effa5b
-
Filesize
373KB
MD5132a309ee40f95380edf8a1a4f39446a
SHA1558ee4fa421a85978e8e6bb29a305b0a8f65f552
SHA25660264a110c0358e85f141e4aa18bf90c52429c8dcadc869751e92b20984872d5
SHA512ecb754d75a47ff800e9755055ce264244ec52c73ef947c762956f035d01f086d446e9b71fa5baeca35a310735646ba9d54c341512f660ca9d895ae5df2effa5b