Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
01-08-2022 05:15
Static task
static1
Behavioral task
behavioral1
Sample
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe
Resource
win10v2004-20220721-en
General
-
Target
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe
-
Size
374KB
-
MD5
66cf2f53a28aa0f168abb241dc6467d2
-
SHA1
7709554dbfcab5afe50d2a94d6c94d7913337368
-
SHA256
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021
-
SHA512
92f4e85ebc70bf3d625cf3a672c42a50ac105fe1498d4a2078c2bb1757f50b59b84ce0c68443e68a5d113f9ed90eca53c195016b85461a8f75f34baf552633b8
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+eeffq.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/C0B18E9813B8BE95
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/C0B18E9813B8BE95
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/C0B18E9813B8BE95
http://xlowfznrg4wf7dli.ONION/C0B18E9813B8BE95
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
ppfjenmhxjor.exeppfjenmhxjor.exepid process 1112 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1756 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ppfjenmhxjor.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run ppfjenmhxjor.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\ywplafsrxvko = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\ppfjenmhxjor.exe\"" ppfjenmhxjor.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exeppfjenmhxjor.exedescription pid process target process PID 1832 set thread context of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1112 set thread context of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ppfjenmhxjor.exedescription ioc process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationLeft_SelectionSubpicture.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\hu.pak ppfjenmhxjor.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\zh-CN.pak ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\en-US\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\GoldRing.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Google\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_ButtonGraphic.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\asl-v20.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\System\it-IT\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_200_percent.pak ppfjenmhxjor.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ml.pak ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\1047x576_91n92.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_RECoVERY_+eeffq.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_videoinset.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_ButtonGraphic.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonInset_Alpha2.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png ppfjenmhxjor.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_RECoVERY_+eeffq.png ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECoVERY_+eeffq.html ppfjenmhxjor.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_RECoVERY_+eeffq.txt ppfjenmhxjor.exe -
Drops file in Windows directory 2 IoCs
Processes:
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exedescription ioc process File created C:\Windows\ppfjenmhxjor.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe File opened for modification C:\Windows\ppfjenmhxjor.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
ppfjenmhxjor.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ppfjenmhxjor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 ppfjenmhxjor.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 ppfjenmhxjor.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ppfjenmhxjor.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ppfjenmhxjor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ppfjenmhxjor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ppfjenmhxjor.exepid process 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe 1912 ppfjenmhxjor.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exeppfjenmhxjor.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe Token: SeDebugPrivilege 1912 ppfjenmhxjor.exe Token: SeIncreaseQuotaPrivilege 460 WMIC.exe Token: SeSecurityPrivilege 460 WMIC.exe Token: SeTakeOwnershipPrivilege 460 WMIC.exe Token: SeLoadDriverPrivilege 460 WMIC.exe Token: SeSystemProfilePrivilege 460 WMIC.exe Token: SeSystemtimePrivilege 460 WMIC.exe Token: SeProfSingleProcessPrivilege 460 WMIC.exe Token: SeIncBasePriorityPrivilege 460 WMIC.exe Token: SeCreatePagefilePrivilege 460 WMIC.exe Token: SeBackupPrivilege 460 WMIC.exe Token: SeRestorePrivilege 460 WMIC.exe Token: SeShutdownPrivilege 460 WMIC.exe Token: SeDebugPrivilege 460 WMIC.exe Token: SeSystemEnvironmentPrivilege 460 WMIC.exe Token: SeRemoteShutdownPrivilege 460 WMIC.exe Token: SeUndockPrivilege 460 WMIC.exe Token: SeManageVolumePrivilege 460 WMIC.exe Token: 33 460 WMIC.exe Token: 34 460 WMIC.exe Token: 35 460 WMIC.exe Token: SeIncreaseQuotaPrivilege 460 WMIC.exe Token: SeSecurityPrivilege 460 WMIC.exe Token: SeTakeOwnershipPrivilege 460 WMIC.exe Token: SeLoadDriverPrivilege 460 WMIC.exe Token: SeSystemProfilePrivilege 460 WMIC.exe Token: SeSystemtimePrivilege 460 WMIC.exe Token: SeProfSingleProcessPrivilege 460 WMIC.exe Token: SeIncBasePriorityPrivilege 460 WMIC.exe Token: SeCreatePagefilePrivilege 460 WMIC.exe Token: SeBackupPrivilege 460 WMIC.exe Token: SeRestorePrivilege 460 WMIC.exe Token: SeShutdownPrivilege 460 WMIC.exe Token: SeDebugPrivilege 460 WMIC.exe Token: SeSystemEnvironmentPrivilege 460 WMIC.exe Token: SeRemoteShutdownPrivilege 460 WMIC.exe Token: SeUndockPrivilege 460 WMIC.exe Token: SeManageVolumePrivilege 460 WMIC.exe Token: 33 460 WMIC.exe Token: 34 460 WMIC.exe Token: 35 460 WMIC.exe Token: SeBackupPrivilege 1988 vssvc.exe Token: SeRestorePrivilege 1988 vssvc.exe Token: SeAuditPrivilege 1988 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exeppfjenmhxjor.exeppfjenmhxjor.exedescription pid process target process PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1832 wrote to memory of 1408 1832 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe PID 1408 wrote to memory of 1112 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe ppfjenmhxjor.exe PID 1408 wrote to memory of 1112 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe ppfjenmhxjor.exe PID 1408 wrote to memory of 1112 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe ppfjenmhxjor.exe PID 1408 wrote to memory of 1112 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe ppfjenmhxjor.exe PID 1408 wrote to memory of 1756 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe cmd.exe PID 1408 wrote to memory of 1756 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe cmd.exe PID 1408 wrote to memory of 1756 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe cmd.exe PID 1408 wrote to memory of 1756 1408 5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe cmd.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1112 wrote to memory of 1912 1112 ppfjenmhxjor.exe ppfjenmhxjor.exe PID 1912 wrote to memory of 460 1912 ppfjenmhxjor.exe WMIC.exe PID 1912 wrote to memory of 460 1912 ppfjenmhxjor.exe WMIC.exe PID 1912 wrote to memory of 460 1912 ppfjenmhxjor.exe WMIC.exe PID 1912 wrote to memory of 460 1912 ppfjenmhxjor.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
ppfjenmhxjor.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ppfjenmhxjor.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ppfjenmhxjor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe"C:\Users\Admin\AppData\Local\Temp\5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe"C:\Users\Admin\AppData\Local\Temp\5ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\ppfjenmhxjor.exeC:\Windows\ppfjenmhxjor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\ppfjenmhxjor.exeC:\Windows\ppfjenmhxjor.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1912 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5CCD79~1.EXE3⤵
- Deletes itself
PID:1756
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD566cf2f53a28aa0f168abb241dc6467d2
SHA17709554dbfcab5afe50d2a94d6c94d7913337368
SHA2565ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021
SHA51292f4e85ebc70bf3d625cf3a672c42a50ac105fe1498d4a2078c2bb1757f50b59b84ce0c68443e68a5d113f9ed90eca53c195016b85461a8f75f34baf552633b8
-
Filesize
374KB
MD566cf2f53a28aa0f168abb241dc6467d2
SHA17709554dbfcab5afe50d2a94d6c94d7913337368
SHA2565ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021
SHA51292f4e85ebc70bf3d625cf3a672c42a50ac105fe1498d4a2078c2bb1757f50b59b84ce0c68443e68a5d113f9ed90eca53c195016b85461a8f75f34baf552633b8
-
Filesize
374KB
MD566cf2f53a28aa0f168abb241dc6467d2
SHA17709554dbfcab5afe50d2a94d6c94d7913337368
SHA2565ccd792bd2288d32bf5ab28b6be3aa6ba5c0a74fdecc236c8f64abcbbf5b2021
SHA51292f4e85ebc70bf3d625cf3a672c42a50ac105fe1498d4a2078c2bb1757f50b59b84ce0c68443e68a5d113f9ed90eca53c195016b85461a8f75f34baf552633b8