Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
02-08-2022 02:21
Static task
static1
Behavioral task
behavioral1
Sample
5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe
Resource
win10v2004-20220722-en
General
-
Target
5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe
-
Size
364KB
-
MD5
133177107c86588123cc36624ba8a4f3
-
SHA1
cf472a1a5758f602cf6e9ca940d14e8709d3ea52
-
SHA256
5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17
-
SHA512
2d30007f2b47d72315d9864408bca75d14fca4b1c5fe37754263ca6a64129792c3db7cb7be8952f595b9a78288446a53645fb2382843dd2a3282729da5d409ec
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3440072777-2118400376-1759599358-1000\_RECoVERY_+ejrcn.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/6FECC19728485F3D
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/6FECC19728485F3D
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/6FECC19728485F3D
http://xlowfznrg4wf7dli.ONION/6FECC19728485F3D
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
ehwfxdmverca.exepid process 2040 ehwfxdmverca.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
ehwfxdmverca.exedescription ioc process File renamed C:\Users\Admin\Pictures\BlockComplete.crw => C:\Users\Admin\Pictures\BlockComplete.crw.mp3 ehwfxdmverca.exe File renamed C:\Users\Admin\Pictures\ShowMerge.raw => C:\Users\Admin\Pictures\ShowMerge.raw.mp3 ehwfxdmverca.exe File renamed C:\Users\Admin\Pictures\ApproveDebug.raw => C:\Users\Admin\Pictures\ApproveDebug.raw.mp3 ehwfxdmverca.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1328 cmd.exe -
Drops startup file 3 IoCs
Processes:
ehwfxdmverca.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+ejrcn.png ehwfxdmverca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+ejrcn.html ehwfxdmverca.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ehwfxdmverca.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run ehwfxdmverca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\uxmknhdtrraq = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\ehwfxdmverca.exe\"" ehwfxdmverca.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ehwfxdmverca.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-today.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\month.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sv.pak ehwfxdmverca.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt ehwfxdmverca.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_RECoVERY_+ejrcn.png ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\it-IT\_RECoVERY_+ejrcn.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\he.pak ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\hint_over.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_PreComp_MATTE_PAL.wmv ehwfxdmverca.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_RECoVERY_+ejrcn.png ehwfxdmverca.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_RECoVERY_+ejrcn.png ehwfxdmverca.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\_RECoVERY_+ejrcn.png ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\ExitDisconnect.pptx ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Internet Explorer\en-US\eula.rtf ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sw.pak ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Mail\en-US\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\settings.js ehwfxdmverca.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\notes-static.png ehwfxdmverca.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-image-inset.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_dot.png ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\_RECoVERY_+ejrcn.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\settings.js ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back_lrg.png ehwfxdmverca.exe File opened for modification C:\Program Files\Common Files\System\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png ehwfxdmverca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\localizedStrings.js ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_snow.png ehwfxdmverca.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\15x15dot.png ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png ehwfxdmverca.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\_RECoVERY_+ejrcn.html ehwfxdmverca.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_RECoVERY_+ejrcn.txt ehwfxdmverca.exe -
Drops file in Windows directory 2 IoCs
Processes:
5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exedescription ioc process File opened for modification C:\Windows\ehwfxdmverca.exe 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe File created C:\Windows\ehwfxdmverca.exe 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
ehwfxdmverca.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ehwfxdmverca.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 ehwfxdmverca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 ehwfxdmverca.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ehwfxdmverca.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ehwfxdmverca.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ehwfxdmverca.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ehwfxdmverca.exepid process 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe 2040 ehwfxdmverca.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exeehwfxdmverca.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe Token: SeDebugPrivilege 2040 ehwfxdmverca.exe Token: SeIncreaseQuotaPrivilege 696 WMIC.exe Token: SeSecurityPrivilege 696 WMIC.exe Token: SeTakeOwnershipPrivilege 696 WMIC.exe Token: SeLoadDriverPrivilege 696 WMIC.exe Token: SeSystemProfilePrivilege 696 WMIC.exe Token: SeSystemtimePrivilege 696 WMIC.exe Token: SeProfSingleProcessPrivilege 696 WMIC.exe Token: SeIncBasePriorityPrivilege 696 WMIC.exe Token: SeCreatePagefilePrivilege 696 WMIC.exe Token: SeBackupPrivilege 696 WMIC.exe Token: SeRestorePrivilege 696 WMIC.exe Token: SeShutdownPrivilege 696 WMIC.exe Token: SeDebugPrivilege 696 WMIC.exe Token: SeSystemEnvironmentPrivilege 696 WMIC.exe Token: SeRemoteShutdownPrivilege 696 WMIC.exe Token: SeUndockPrivilege 696 WMIC.exe Token: SeManageVolumePrivilege 696 WMIC.exe Token: 33 696 WMIC.exe Token: 34 696 WMIC.exe Token: 35 696 WMIC.exe Token: SeIncreaseQuotaPrivilege 696 WMIC.exe Token: SeSecurityPrivilege 696 WMIC.exe Token: SeTakeOwnershipPrivilege 696 WMIC.exe Token: SeLoadDriverPrivilege 696 WMIC.exe Token: SeSystemProfilePrivilege 696 WMIC.exe Token: SeSystemtimePrivilege 696 WMIC.exe Token: SeProfSingleProcessPrivilege 696 WMIC.exe Token: SeIncBasePriorityPrivilege 696 WMIC.exe Token: SeCreatePagefilePrivilege 696 WMIC.exe Token: SeBackupPrivilege 696 WMIC.exe Token: SeRestorePrivilege 696 WMIC.exe Token: SeShutdownPrivilege 696 WMIC.exe Token: SeDebugPrivilege 696 WMIC.exe Token: SeSystemEnvironmentPrivilege 696 WMIC.exe Token: SeRemoteShutdownPrivilege 696 WMIC.exe Token: SeUndockPrivilege 696 WMIC.exe Token: SeManageVolumePrivilege 696 WMIC.exe Token: 33 696 WMIC.exe Token: 34 696 WMIC.exe Token: 35 696 WMIC.exe Token: SeBackupPrivilege 980 vssvc.exe Token: SeRestorePrivilege 980 vssvc.exe Token: SeAuditPrivilege 980 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exeehwfxdmverca.exedescription pid process target process PID 1868 wrote to memory of 2040 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe ehwfxdmverca.exe PID 1868 wrote to memory of 2040 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe ehwfxdmverca.exe PID 1868 wrote to memory of 2040 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe ehwfxdmverca.exe PID 1868 wrote to memory of 2040 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe ehwfxdmverca.exe PID 1868 wrote to memory of 1328 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe cmd.exe PID 1868 wrote to memory of 1328 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe cmd.exe PID 1868 wrote to memory of 1328 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe cmd.exe PID 1868 wrote to memory of 1328 1868 5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe cmd.exe PID 2040 wrote to memory of 696 2040 ehwfxdmverca.exe WMIC.exe PID 2040 wrote to memory of 696 2040 ehwfxdmverca.exe WMIC.exe PID 2040 wrote to memory of 696 2040 ehwfxdmverca.exe WMIC.exe PID 2040 wrote to memory of 696 2040 ehwfxdmverca.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
ehwfxdmverca.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ehwfxdmverca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ehwfxdmverca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe"C:\Users\Admin\AppData\Local\Temp\5ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\ehwfxdmverca.exeC:\Windows\ehwfxdmverca.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2040 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5AC419~1.EXE2⤵
- Deletes itself
PID:1328
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5133177107c86588123cc36624ba8a4f3
SHA1cf472a1a5758f602cf6e9ca940d14e8709d3ea52
SHA2565ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17
SHA5122d30007f2b47d72315d9864408bca75d14fca4b1c5fe37754263ca6a64129792c3db7cb7be8952f595b9a78288446a53645fb2382843dd2a3282729da5d409ec
-
Filesize
364KB
MD5133177107c86588123cc36624ba8a4f3
SHA1cf472a1a5758f602cf6e9ca940d14e8709d3ea52
SHA2565ac4195efe073d84ea88603e45d77a692783aa3f24add4bb078229047fd18c17
SHA5122d30007f2b47d72315d9864408bca75d14fca4b1c5fe37754263ca6a64129792c3db7cb7be8952f595b9a78288446a53645fb2382843dd2a3282729da5d409ec