Analysis
-
max time kernel
170s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
02-08-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe
Resource
win10v2004-20220721-en
General
-
Target
5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe
-
Size
328KB
-
MD5
452e6b32cf0172170701558e2333d016
-
SHA1
a9aa39a0765947e12a1475a59740c6de5bb5e7ec
-
SHA256
5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634
-
SHA512
993b3147e0e45444c6f38f917e2bb92d8c63097b1276e6087df19d7396bc06e07d2bd1e9a823649a1d4a1e4037b7845bc8ca7205d8ace8dae07a298116a850e3
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3762437355-3468409815-1164039494-1000\Recovery+okdnr.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/BBE25A1B3739428
http://kkd47eh4hdjshb5t.angortra.at/BBE25A1B3739428
http://ytrest84y5i456hghadefdsd.pontogrot.com/BBE25A1B3739428
http://xlowfznrg4wf7dli.ONION/BBE25A1B3739428
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
gpdbqxpbmvgj.exepid Process 1952 gpdbqxpbmvgj.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1064 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gpdbqxpbmvgj.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run gpdbqxpbmvgj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\qqbcrvkdatex = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\gpdbqxpbmvgj.exe\"" gpdbqxpbmvgj.exe -
Drops file in Program Files directory 64 IoCs
Processes:
gpdbqxpbmvgj.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\es-ES\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_ButtonGraphic.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport_PAL.wmv gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\softedges.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\de-DE\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_ButtonGraphic.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\curtains.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\es-ES\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\header-background.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\System\ado\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\play-static.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_ButtonGraphic.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-highlight.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\Recovery+okdnr.txt gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_ButtonGraphic.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\Recovery+okdnr.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_ButtonGraphic.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\Recovery+okdnr.html gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_ButtonGraphic.png gpdbqxpbmvgj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-over-select.png gpdbqxpbmvgj.exe -
Drops file in Windows directory 2 IoCs
Processes:
5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exedescription ioc Process File created C:\Windows\gpdbqxpbmvgj.exe 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe File opened for modification C:\Windows\gpdbqxpbmvgj.exe 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
gpdbqxpbmvgj.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e gpdbqxpbmvgj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e gpdbqxpbmvgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 gpdbqxpbmvgj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 gpdbqxpbmvgj.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gpdbqxpbmvgj.exepid Process 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe 1952 gpdbqxpbmvgj.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exegpdbqxpbmvgj.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe Token: SeDebugPrivilege 1952 gpdbqxpbmvgj.exe Token: SeIncreaseQuotaPrivilege 620 WMIC.exe Token: SeSecurityPrivilege 620 WMIC.exe Token: SeTakeOwnershipPrivilege 620 WMIC.exe Token: SeLoadDriverPrivilege 620 WMIC.exe Token: SeSystemProfilePrivilege 620 WMIC.exe Token: SeSystemtimePrivilege 620 WMIC.exe Token: SeProfSingleProcessPrivilege 620 WMIC.exe Token: SeIncBasePriorityPrivilege 620 WMIC.exe Token: SeCreatePagefilePrivilege 620 WMIC.exe Token: SeBackupPrivilege 620 WMIC.exe Token: SeRestorePrivilege 620 WMIC.exe Token: SeShutdownPrivilege 620 WMIC.exe Token: SeDebugPrivilege 620 WMIC.exe Token: SeSystemEnvironmentPrivilege 620 WMIC.exe Token: SeRemoteShutdownPrivilege 620 WMIC.exe Token: SeUndockPrivilege 620 WMIC.exe Token: SeManageVolumePrivilege 620 WMIC.exe Token: 33 620 WMIC.exe Token: 34 620 WMIC.exe Token: 35 620 WMIC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exegpdbqxpbmvgj.exedescription pid Process procid_target PID 1188 wrote to memory of 1952 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 28 PID 1188 wrote to memory of 1952 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 28 PID 1188 wrote to memory of 1952 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 28 PID 1188 wrote to memory of 1952 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 28 PID 1188 wrote to memory of 1064 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 29 PID 1188 wrote to memory of 1064 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 29 PID 1188 wrote to memory of 1064 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 29 PID 1188 wrote to memory of 1064 1188 5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe 29 PID 1952 wrote to memory of 620 1952 gpdbqxpbmvgj.exe 31 PID 1952 wrote to memory of 620 1952 gpdbqxpbmvgj.exe 31 PID 1952 wrote to memory of 620 1952 gpdbqxpbmvgj.exe 31 PID 1952 wrote to memory of 620 1952 gpdbqxpbmvgj.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
gpdbqxpbmvgj.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gpdbqxpbmvgj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gpdbqxpbmvgj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe"C:\Users\Admin\AppData\Local\Temp\5a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\gpdbqxpbmvgj.exeC:\Windows\gpdbqxpbmvgj.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1952 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5A48D5~1.EXE2⤵
- Deletes itself
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD5452e6b32cf0172170701558e2333d016
SHA1a9aa39a0765947e12a1475a59740c6de5bb5e7ec
SHA2565a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634
SHA512993b3147e0e45444c6f38f917e2bb92d8c63097b1276e6087df19d7396bc06e07d2bd1e9a823649a1d4a1e4037b7845bc8ca7205d8ace8dae07a298116a850e3
-
Filesize
328KB
MD5452e6b32cf0172170701558e2333d016
SHA1a9aa39a0765947e12a1475a59740c6de5bb5e7ec
SHA2565a48d53f00afd3a50f06138ba37ca6bb5ff38011801879bdb94215ab8bfdf634
SHA512993b3147e0e45444c6f38f917e2bb92d8c63097b1276e6087df19d7396bc06e07d2bd1e9a823649a1d4a1e4037b7845bc8ca7205d8ace8dae07a298116a850e3