Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
01-08-2022 05:40
Static task
static1
Behavioral task
behavioral1
Sample
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe
Resource
win10v2004-20220721-en
General
-
Target
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe
-
Size
356KB
-
MD5
831b9546c2de09e223f29dc01e6c1e12
-
SHA1
c222fda0c29096b9d5356e010d830e8217ac845f
-
SHA256
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df
-
SHA512
3cd8e7978c4462a8f342623415a31c07151360be29fcab37482f6accd33d6ae9dff9b9654afa036328fb6b61fbfa87f5fcef0ecf9815f01d6ae497b393491b27
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\Recovery+kowce.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/174627B83598AE4A
http://tes543berda73i48fsdfsd.keratadze.at/174627B83598AE4A
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/174627B83598AE4A
http://xlowfznrg4wf7dli.ONION/174627B83598AE4A
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
axvqtscvgnsg.exeaxvqtscvgnsg.exepid process 1976 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1968 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axvqtscvgnsg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run axvqtscvgnsg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpnmdbqpnceg = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\axvqtscvgnsg.exe\"" axvqtscvgnsg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exeaxvqtscvgnsg.exedescription pid process target process PID 956 set thread context of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 1976 set thread context of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
axvqtscvgnsg.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\Recovery+kowce.html axvqtscvgnsg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\resources.pak axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sk.pak axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\Recovery+kowce.html axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\Panel_Mask_PAL.wmv axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\Recovery+kowce.html axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationUp_ButtonGraphic.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\Recovery+kowce.html axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\Recovery+kowce.html axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\de-DE\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Internet Explorer\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationLeft_ButtonGraphic.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\More Games\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\th.pak axvqtscvgnsg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\Recovery+kowce.html axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIcon.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ta.pak axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_ButtonGraphic.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Google\Chrome\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\Recovery+kowce.html axvqtscvgnsg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\Recovery+kowce.png axvqtscvgnsg.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\Recovery+kowce.txt axvqtscvgnsg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Recovery+kowce.html axvqtscvgnsg.exe -
Drops file in Windows directory 2 IoCs
Processes:
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exedescription ioc process File created C:\Windows\axvqtscvgnsg.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe File opened for modification C:\Windows\axvqtscvgnsg.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
axvqtscvgnsg.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 axvqtscvgnsg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 axvqtscvgnsg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 axvqtscvgnsg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 axvqtscvgnsg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 axvqtscvgnsg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 axvqtscvgnsg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
axvqtscvgnsg.exepid process 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe 108 axvqtscvgnsg.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exeaxvqtscvgnsg.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe Token: SeDebugPrivilege 108 axvqtscvgnsg.exe Token: SeIncreaseQuotaPrivilege 1936 WMIC.exe Token: SeSecurityPrivilege 1936 WMIC.exe Token: SeTakeOwnershipPrivilege 1936 WMIC.exe Token: SeLoadDriverPrivilege 1936 WMIC.exe Token: SeSystemProfilePrivilege 1936 WMIC.exe Token: SeSystemtimePrivilege 1936 WMIC.exe Token: SeProfSingleProcessPrivilege 1936 WMIC.exe Token: SeIncBasePriorityPrivilege 1936 WMIC.exe Token: SeCreatePagefilePrivilege 1936 WMIC.exe Token: SeBackupPrivilege 1936 WMIC.exe Token: SeRestorePrivilege 1936 WMIC.exe Token: SeShutdownPrivilege 1936 WMIC.exe Token: SeDebugPrivilege 1936 WMIC.exe Token: SeSystemEnvironmentPrivilege 1936 WMIC.exe Token: SeRemoteShutdownPrivilege 1936 WMIC.exe Token: SeUndockPrivilege 1936 WMIC.exe Token: SeManageVolumePrivilege 1936 WMIC.exe Token: 33 1936 WMIC.exe Token: 34 1936 WMIC.exe Token: 35 1936 WMIC.exe Token: SeIncreaseQuotaPrivilege 1936 WMIC.exe Token: SeSecurityPrivilege 1936 WMIC.exe Token: SeTakeOwnershipPrivilege 1936 WMIC.exe Token: SeLoadDriverPrivilege 1936 WMIC.exe Token: SeSystemProfilePrivilege 1936 WMIC.exe Token: SeSystemtimePrivilege 1936 WMIC.exe Token: SeProfSingleProcessPrivilege 1936 WMIC.exe Token: SeIncBasePriorityPrivilege 1936 WMIC.exe Token: SeCreatePagefilePrivilege 1936 WMIC.exe Token: SeBackupPrivilege 1936 WMIC.exe Token: SeRestorePrivilege 1936 WMIC.exe Token: SeShutdownPrivilege 1936 WMIC.exe Token: SeDebugPrivilege 1936 WMIC.exe Token: SeSystemEnvironmentPrivilege 1936 WMIC.exe Token: SeRemoteShutdownPrivilege 1936 WMIC.exe Token: SeUndockPrivilege 1936 WMIC.exe Token: SeManageVolumePrivilege 1936 WMIC.exe Token: 33 1936 WMIC.exe Token: 34 1936 WMIC.exe Token: 35 1936 WMIC.exe Token: SeBackupPrivilege 320 vssvc.exe Token: SeRestorePrivilege 320 vssvc.exe Token: SeAuditPrivilege 320 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exeaxvqtscvgnsg.exeaxvqtscvgnsg.exedescription pid process target process PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 956 wrote to memory of 1232 956 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe PID 1232 wrote to memory of 1976 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe axvqtscvgnsg.exe PID 1232 wrote to memory of 1976 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe axvqtscvgnsg.exe PID 1232 wrote to memory of 1976 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe axvqtscvgnsg.exe PID 1232 wrote to memory of 1976 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe axvqtscvgnsg.exe PID 1232 wrote to memory of 1968 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe cmd.exe PID 1232 wrote to memory of 1968 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe cmd.exe PID 1232 wrote to memory of 1968 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe cmd.exe PID 1232 wrote to memory of 1968 1232 5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe cmd.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 1976 wrote to memory of 108 1976 axvqtscvgnsg.exe axvqtscvgnsg.exe PID 108 wrote to memory of 1936 108 axvqtscvgnsg.exe WMIC.exe PID 108 wrote to memory of 1936 108 axvqtscvgnsg.exe WMIC.exe PID 108 wrote to memory of 1936 108 axvqtscvgnsg.exe WMIC.exe PID 108 wrote to memory of 1936 108 axvqtscvgnsg.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
axvqtscvgnsg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System axvqtscvgnsg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" axvqtscvgnsg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe"C:\Users\Admin\AppData\Local\Temp\5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe"C:\Users\Admin\AppData\Local\Temp\5caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\axvqtscvgnsg.exeC:\Windows\axvqtscvgnsg.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\axvqtscvgnsg.exeC:\Windows\axvqtscvgnsg.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:108 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5CAAFC~1.EXE3⤵
- Deletes itself
PID:1968
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5831b9546c2de09e223f29dc01e6c1e12
SHA1c222fda0c29096b9d5356e010d830e8217ac845f
SHA2565caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df
SHA5123cd8e7978c4462a8f342623415a31c07151360be29fcab37482f6accd33d6ae9dff9b9654afa036328fb6b61fbfa87f5fcef0ecf9815f01d6ae497b393491b27
-
Filesize
356KB
MD5831b9546c2de09e223f29dc01e6c1e12
SHA1c222fda0c29096b9d5356e010d830e8217ac845f
SHA2565caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df
SHA5123cd8e7978c4462a8f342623415a31c07151360be29fcab37482f6accd33d6ae9dff9b9654afa036328fb6b61fbfa87f5fcef0ecf9815f01d6ae497b393491b27
-
Filesize
356KB
MD5831b9546c2de09e223f29dc01e6c1e12
SHA1c222fda0c29096b9d5356e010d830e8217ac845f
SHA2565caafc32f56e19289b2668cf28ff7f2b73b01ecaa6ab8500850fa8618b59e0df
SHA5123cd8e7978c4462a8f342623415a31c07151360be29fcab37482f6accd33d6ae9dff9b9654afa036328fb6b61fbfa87f5fcef0ecf9815f01d6ae497b393491b27