Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
01-08-2022 17:20
Static task
static1
Behavioral task
behavioral1
Sample
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe
Resource
win10v2004-20220721-en
General
-
Target
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe
-
Size
340KB
-
MD5
7cf1f9588008ca0012c13ae2a6687400
-
SHA1
78a52c48fe13018238a01b9c751bcdb3512c4c5e
-
SHA256
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70
-
SHA512
69d2ba889902e46e575f4819cf12421c9b78ecc96242db2265c17bb51903966fe992aec78c68b3fa0141e6d198bb688c0bc8436e17c99d080dad13a1ac01a6c3
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\Recovery+sruph.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/94748E314FD3DD5
http://tes543berda73i48fsdfsd.keratadze.at/94748E314FD3DD5
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/94748E314FD3DD5
http://xlowfznrg4wf7dli.ONION/94748E314FD3DD5
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
ioackvcgmeqr.exeioackvcgmeqr.exepid process 2040 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1672 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ioackvcgmeqr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run ioackvcgmeqr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\datnrfmfdxnt = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\ioackvcgmeqr.exe\"" ioackvcgmeqr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exeioackvcgmeqr.exedescription pid process target process PID 1940 set thread context of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 2040 set thread context of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ioackvcgmeqr.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\fr-FR\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Memories_buttonClear.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_ButtonGraphic.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\en-US\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-next-static.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg ioackvcgmeqr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jre7\lib\images\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\README.TXT ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\hprof-16.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationUp_ButtonGraphic.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Google\Recovery+sruph.txt ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\Recovery+sruph.png ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\Recovery+sruph.html ioackvcgmeqr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\Recovery+sruph.txt ioackvcgmeqr.exe -
Drops file in Windows directory 2 IoCs
Processes:
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exedescription ioc process File opened for modification C:\Windows\ioackvcgmeqr.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe File created C:\Windows\ioackvcgmeqr.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
ioackvcgmeqr.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ioackvcgmeqr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ioackvcgmeqr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 ioackvcgmeqr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ioackvcgmeqr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ioackvcgmeqr.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ioackvcgmeqr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ioackvcgmeqr.exepid process 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe 1064 ioackvcgmeqr.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exeioackvcgmeqr.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe Token: SeDebugPrivilege 1064 ioackvcgmeqr.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe Token: SeBackupPrivilege 1628 vssvc.exe Token: SeRestorePrivilege 1628 vssvc.exe Token: SeAuditPrivilege 1628 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exeioackvcgmeqr.exeioackvcgmeqr.exedescription pid process target process PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1940 wrote to memory of 1076 1940 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe PID 1076 wrote to memory of 2040 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe ioackvcgmeqr.exe PID 1076 wrote to memory of 2040 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe ioackvcgmeqr.exe PID 1076 wrote to memory of 2040 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe ioackvcgmeqr.exe PID 1076 wrote to memory of 2040 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe ioackvcgmeqr.exe PID 1076 wrote to memory of 1672 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe cmd.exe PID 1076 wrote to memory of 1672 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe cmd.exe PID 1076 wrote to memory of 1672 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe cmd.exe PID 1076 wrote to memory of 1672 1076 5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe cmd.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 2040 wrote to memory of 1064 2040 ioackvcgmeqr.exe ioackvcgmeqr.exe PID 1064 wrote to memory of 2012 1064 ioackvcgmeqr.exe WMIC.exe PID 1064 wrote to memory of 2012 1064 ioackvcgmeqr.exe WMIC.exe PID 1064 wrote to memory of 2012 1064 ioackvcgmeqr.exe WMIC.exe PID 1064 wrote to memory of 2012 1064 ioackvcgmeqr.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
ioackvcgmeqr.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ioackvcgmeqr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ioackvcgmeqr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe"C:\Users\Admin\AppData\Local\Temp\5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe"C:\Users\Admin\AppData\Local\Temp\5b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\ioackvcgmeqr.exeC:\Windows\ioackvcgmeqr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\ioackvcgmeqr.exeC:\Windows\ioackvcgmeqr.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1064 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5B9494~1.EXE3⤵
- Deletes itself
PID:1672
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD57cf1f9588008ca0012c13ae2a6687400
SHA178a52c48fe13018238a01b9c751bcdb3512c4c5e
SHA2565b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70
SHA51269d2ba889902e46e575f4819cf12421c9b78ecc96242db2265c17bb51903966fe992aec78c68b3fa0141e6d198bb688c0bc8436e17c99d080dad13a1ac01a6c3
-
Filesize
340KB
MD57cf1f9588008ca0012c13ae2a6687400
SHA178a52c48fe13018238a01b9c751bcdb3512c4c5e
SHA2565b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70
SHA51269d2ba889902e46e575f4819cf12421c9b78ecc96242db2265c17bb51903966fe992aec78c68b3fa0141e6d198bb688c0bc8436e17c99d080dad13a1ac01a6c3
-
Filesize
340KB
MD57cf1f9588008ca0012c13ae2a6687400
SHA178a52c48fe13018238a01b9c751bcdb3512c4c5e
SHA2565b9494ac1ef444fc8cbfaf4f097ca6de8be465025928bf71a3d8ad4d09e66c70
SHA51269d2ba889902e46e575f4819cf12421c9b78ecc96242db2265c17bb51903966fe992aec78c68b3fa0141e6d198bb688c0bc8436e17c99d080dad13a1ac01a6c3