Analysis
-
max time kernel
188s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 18:19
Static task
static1
Behavioral task
behavioral1
Sample
5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe
Resource
win7-20220718-en
General
-
Target
5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe
-
Size
1.3MB
-
MD5
7bedd0c5e4d5c7a6f5ad69898598b526
-
SHA1
c0263f12b942d370260cf23eddcbd34abaf8b08e
-
SHA256
5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f
-
SHA512
68e4e99155bc17e72b04ce5af4a6b86eab66ef6efae138dcdea420e93b2ccd3a01e5c1dfea278d37a0e6426c656fe5cacd008b983b24740595c647260808fc29
Malware Config
Signatures
-
Matrix Ransomware 34 IoCs
Targeted ransomware with information collection and encryption functionality.
description ioc Process File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kfbvpzxi.default-release\storage\default\moz-extension+++f33c61cb-462f-45ee-a51b-6c8ba98e60d1^userContextId=4294967295\idb\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\Documents\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\Downloads\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\All Users\Microsoft\Network\Downloader\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\All Users\Microsoft\Diagnosis\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\odt\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\All Users\Microsoft\SmsRouter\MessageStore\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kfbvpzxi.default-release\storage\permanent\chrome\idb\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\Pictures\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kfbvpzxi.default-release\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\AppData\Local\ConnectedDevicesPlatform\L.Admin\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\kfbvpzxi.default-release\OfflineCache\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\Music\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\All Users\Microsoft\Diagnosis\TenantStorage\P-ARIA\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\9D6F3958-24CA-4CA3-9088-F64E2437F0D5\x-none.16\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files\Java\jre1.8.0_66\lib\deploy\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\Desktop\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files\Java\jdk1.8.0_66\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\All Users\Microsoft\Diagnosis\ScenariosSqlStore\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\9D6F3958-24CA-4CA3-9088-F64E2437F0D5\en-us.16\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Users\Admin\AppData\Roaming\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe -
Executes dropped EXE 5 IoCs
pid Process 1944 NWKspFWj.exe 3752 1PG6CbfQ.exe 548 1PG6CbfQ.exe 2616 1PG6CbfQ64.exe 3520 1PG6CbfQ.exe -
resource yara_rule behavioral2/files/0x0008000000022e3a-151.dat upx behavioral2/files/0x0008000000022e3a-152.dat upx behavioral2/files/0x0008000000022e3a-153.dat upx behavioral2/memory/3752-154-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral2/memory/3752-157-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral2/memory/3520-162-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral2/files/0x0008000000022e3a-161.dat upx -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1500 takeown.exe 4740 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\F: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\W: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\V: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\X: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\U: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\O: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\N: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\M: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\L: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\Z: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\Y: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\G: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\J: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\H: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\P: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\I: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\Q: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\K: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\E: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\T: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened (read-only) \??\R: 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\zjkJr1is.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ml.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\dblook.bat 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\nacl_irt_x86_64.nexe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\scan_poster.jpg 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\id.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ru.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ja_JP.jar 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoCanary.png 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\nb.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\manifest.json 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\javafx-src.zip 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\gmail.crx 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\en-US.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\am.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\dblook 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_zh_CN.jar 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgePackages.h 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\javascript_poster.jpg 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\media_poster.jpg 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoBeta.png 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\nl.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pl.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoCanary.png 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\te.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_pt_BR.jar 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\external_extensions.json 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fil.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sw.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\tr.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fa.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\organize_poster.jpg 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-PT.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\el.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\resources.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\docs.crx 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\preloaded_data.pb 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\youtube.crx 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bg.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\Words.pdf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\eclipse_update_120.jpg 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\LICENSE 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\combine_poster.jpg 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\ClearSubmit.cmd 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\he.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\#MMTA_README#.rtf 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sr.pak 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4740 takeown.exe Token: SeTakeOwnershipPrivilege 1500 takeown.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1632 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 82 PID 2024 wrote to memory of 1632 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 82 PID 2024 wrote to memory of 1632 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 82 PID 2024 wrote to memory of 1944 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 84 PID 2024 wrote to memory of 1944 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 84 PID 2024 wrote to memory of 1944 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 84 PID 2024 wrote to memory of 1564 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 98 PID 2024 wrote to memory of 1564 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 98 PID 2024 wrote to memory of 1564 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 98 PID 2024 wrote to memory of 4540 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 100 PID 2024 wrote to memory of 4540 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 100 PID 2024 wrote to memory of 4540 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 100 PID 2024 wrote to memory of 4420 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 102 PID 2024 wrote to memory of 4420 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 102 PID 2024 wrote to memory of 4420 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 102 PID 1564 wrote to memory of 1648 1564 cmd.exe 104 PID 1564 wrote to memory of 1648 1564 cmd.exe 104 PID 1564 wrote to memory of 1648 1564 cmd.exe 104 PID 4540 wrote to memory of 5072 4540 cmd.exe 105 PID 4540 wrote to memory of 5072 4540 cmd.exe 105 PID 4540 wrote to memory of 5072 4540 cmd.exe 105 PID 2024 wrote to memory of 4344 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 106 PID 2024 wrote to memory of 4344 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 106 PID 2024 wrote to memory of 4344 2024 5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe 106 PID 1564 wrote to memory of 3704 1564 cmd.exe 109 PID 1564 wrote to memory of 3704 1564 cmd.exe 109 PID 1564 wrote to memory of 3704 1564 cmd.exe 109 PID 1564 wrote to memory of 5028 1564 cmd.exe 110 PID 1564 wrote to memory of 5028 1564 cmd.exe 110 PID 1564 wrote to memory of 5028 1564 cmd.exe 110 PID 4344 wrote to memory of 3448 4344 cmd.exe 112 PID 4344 wrote to memory of 3448 4344 cmd.exe 112 PID 4344 wrote to memory of 3448 4344 cmd.exe 112 PID 4420 wrote to memory of 4992 4420 cmd.exe 111 PID 4420 wrote to memory of 4992 4420 cmd.exe 111 PID 4420 wrote to memory of 4992 4420 cmd.exe 111 PID 4344 wrote to memory of 1500 4344 cmd.exe 113 PID 4344 wrote to memory of 1500 4344 cmd.exe 113 PID 4344 wrote to memory of 1500 4344 cmd.exe 113 PID 4420 wrote to memory of 4740 4420 cmd.exe 114 PID 4420 wrote to memory of 4740 4420 cmd.exe 114 PID 4420 wrote to memory of 4740 4420 cmd.exe 114 PID 4420 wrote to memory of 4452 4420 cmd.exe 117 PID 4420 wrote to memory of 4452 4420 cmd.exe 117 PID 4420 wrote to memory of 4452 4420 cmd.exe 117 PID 4344 wrote to memory of 1428 4344 cmd.exe 116 PID 4344 wrote to memory of 1428 4344 cmd.exe 116 PID 4344 wrote to memory of 1428 4344 cmd.exe 116 PID 1428 wrote to memory of 548 1428 cmd.exe 118 PID 1428 wrote to memory of 548 1428 cmd.exe 118 PID 1428 wrote to memory of 548 1428 cmd.exe 118 PID 4452 wrote to memory of 3752 4452 cmd.exe 119 PID 4452 wrote to memory of 3752 4452 cmd.exe 119 PID 4452 wrote to memory of 3752 4452 cmd.exe 119 PID 548 wrote to memory of 2616 548 1PG6CbfQ.exe 120 PID 548 wrote to memory of 2616 548 1PG6CbfQ.exe 120 PID 4420 wrote to memory of 3520 4420 cmd.exe 121 PID 4420 wrote to memory of 3520 4420 cmd.exe 121 PID 4420 wrote to memory of 3520 4420 cmd.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe"C:\Users\Admin\AppData\Local\Temp\5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe"1⤵
- Matrix Ransomware
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\5f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f.exe" "C:\Users\Admin\AppData\Local\Temp\NWKspFWj.exe"2⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\NWKspFWj.exe"C:\Users\Admin\AppData\Local\Temp\NWKspFWj.exe" -n2⤵
- Executes dropped EXE
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\zjkJr1is.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\zjkJr1is.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:1648
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:3704
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\iEe3PkA2.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\iEe3PkA2.vbs"3⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WX8RF1wD.bat" "C:\ProgramData\USOPrivate\UpdateStore\store.db""2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\cacls.execacls "C:\ProgramData\USOPrivate\UpdateStore\store.db" /E /G Admin:F /C3⤵PID:4992
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\ProgramData\USOPrivate\UpdateStore\store.db"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 1PG6CbfQ.exe -accepteula "store.db" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\1PG6CbfQ.exe1PG6CbfQ.exe -accepteula "store.db" -nobanner4⤵
- Executes dropped EXE
PID:3752
-
-
-
C:\Users\Admin\AppData\Local\Temp\1PG6CbfQ.exe1PG6CbfQ.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WX8RF1wD.bat" "C:\Users\All Users\USOPrivate\UpdateStore\store.db""2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\USOPrivate\UpdateStore\store.db" /E /G Admin:F /C3⤵PID:3448
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\USOPrivate\UpdateStore\store.db"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 1PG6CbfQ.exe -accepteula "store.db" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\1PG6CbfQ.exe1PG6CbfQ.exe -accepteula "store.db" -nobanner4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\1PG6CbfQ64.exe1PG6CbfQ.exe -accepteula "store.db" -nobanner5⤵
- Executes dropped EXE
PID:2616
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD52f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
Filesize
181KB
MD52f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
Filesize
181KB
MD52f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
Filesize
181KB
MD52f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
Filesize
221KB
MD53026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6
-
Filesize
221KB
MD53026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6
-
Filesize
1.3MB
MD57bedd0c5e4d5c7a6f5ad69898598b526
SHA1c0263f12b942d370260cf23eddcbd34abaf8b08e
SHA2565f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f
SHA51268e4e99155bc17e72b04ce5af4a6b86eab66ef6efae138dcdea420e93b2ccd3a01e5c1dfea278d37a0e6426c656fe5cacd008b983b24740595c647260808fc29
-
Filesize
1.3MB
MD57bedd0c5e4d5c7a6f5ad69898598b526
SHA1c0263f12b942d370260cf23eddcbd34abaf8b08e
SHA2565f156e7a8c86f7760b4448e314394c8e6e98cad8e385ec32a047c5b86ead953f
SHA51268e4e99155bc17e72b04ce5af4a6b86eab66ef6efae138dcdea420e93b2ccd3a01e5c1dfea278d37a0e6426c656fe5cacd008b983b24740595c647260808fc29
-
Filesize
226B
MD569de1257b4e682dcf3edd6ce32d99812
SHA142d326403865984ca89ae67635fcd419ecfb904b
SHA256b306fb565414bb939ab732e58bbf00a882e768d073c1180b5fed93b39b0cb61f
SHA51225db4553e5a633383035ac439519403af14e82bed57097676ecf9685581be7f4237b31d72404161fcf1a0eff714f82701e06e01824af9040565076ea459373f5
-
Filesize
260B
MD559778bf8167d89eeb9680495af67106c
SHA15276d2d25878e13572b6ddb22408b90106534604
SHA256fdf3eeebab0362476be3b4f02247f186a5710cb8d8be2bbd2683969968c0de0a
SHA512770bbeb59a7b465a21254e16db4f723fa36a28c67377d77295dc68be122b9b8d4edb2bb2dae418294d3064154b6cc8fccd25bda56fbbf5e1d95c9242c2beb916