Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 07:48
Static task
static1
Behavioral task
behavioral1
Sample
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe
Resource
win10v2004-20220812-en
General
-
Target
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe
-
Size
314KB
-
MD5
201c52f6219061d02e59bb11988e2950
-
SHA1
f6825d6dcd8dfbbac5ca186818b15d4fcb18d77f
-
SHA256
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217
-
SHA512
02f6b69c6aef542e7facb67cc2a99fdb7f69d57209e215b41770faa6a46bc7ae1020872d8aad8659ceac1525c7e7dc542be5320d0aa8d249881f9a2e6b79c66e
-
SSDEEP
6144:Eyyzjg3u0rMoSc97kro4DtNxOaK9dAOBhmNnMOD:EyyQ3u0rMclZ0nME
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 42 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.com\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.com reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.com\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.com reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.com reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.pif reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.pif\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.pif\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.pif\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.com\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.com\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.pif reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.com reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.com reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.com reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.pif reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.pif\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.pif reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.pif reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.pif reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.com\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.pif reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.pif\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.com\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.com\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.pif\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.pif\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp /__RUNOFIMAGEFILE__" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.com reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BURSH = "C:\\Window\\bursh.exe" 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exedescription ioc process File opened for modification \??\PhysicalDrive0 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1764 2204 WerFault.exe 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 3660 2204 WerFault.exe 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 4204 notepad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exepid process 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exedescription pid process Token: SeDebugPrivilege 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe Token: SeDebugPrivilege 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exepid process 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exepid process 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exedescription pid process target process PID 2204 wrote to memory of 4244 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4244 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4244 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3304 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3304 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3304 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1684 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1684 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1684 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1000 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1000 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1000 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2016 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2016 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2016 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1932 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1932 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1932 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3056 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3056 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3056 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1944 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1944 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1944 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2068 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2068 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2068 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1336 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1336 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1336 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2256 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2256 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2256 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1692 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1692 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1692 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2272 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2272 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2272 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2180 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2180 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2180 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1764 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1764 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1764 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4528 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4528 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4528 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1352 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1352 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 1352 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3088 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3088 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3088 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4752 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4752 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4752 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2492 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2492 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 2492 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3176 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3176 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 3176 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe reg.exe PID 2204 wrote to memory of 4204 2204 8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe"C:\Users\Admin\AppData\Local\Temp\8d8478081d8f0b2173d1af6564b7e469a6528babda0761e282e0a5f9715d7217.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.pif" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.com" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.pif" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.com" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.pif" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.com" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.pif" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.com" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.exe" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.pif" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.com" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.pif" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.com" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.pif" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.com" /v Debugger /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp /__RUNOFIMAGEFILE__" /f2⤵
- Sets file execution options in registry
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\BURSH_VIRUS_MESSAGE.TXT2⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 14162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 24762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2204 -ip 22041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2204 -ip 22041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\BURSH_VIRUS_MESSAGE.TXTFilesize
275B
MD55afc0b443327ab8786295390a6d8b32e
SHA19980d1e7b611f4c590afca0cab6cdae9e45835a2
SHA256c0f207cd0143f37bc7e8c9474c42afeba851c9a277dc15b4887854064acd2eab
SHA5121955634295b2cd6504ab9a48adf822b8fec6297ba39c65ba291990cc1ae3db3ffb3efdb2bb5c380fce3d2314d8b1ebf06b778f8d9c31a50b1918ae69364cd555
-
memory/1000-135-0x0000000000000000-mapping.dmp
-
memory/1336-141-0x0000000000000000-mapping.dmp
-
memory/1352-148-0x0000000000000000-mapping.dmp
-
memory/1684-134-0x0000000000000000-mapping.dmp
-
memory/1692-143-0x0000000000000000-mapping.dmp
-
memory/1764-146-0x0000000000000000-mapping.dmp
-
memory/1932-137-0x0000000000000000-mapping.dmp
-
memory/1944-139-0x0000000000000000-mapping.dmp
-
memory/2016-136-0x0000000000000000-mapping.dmp
-
memory/2068-140-0x0000000000000000-mapping.dmp
-
memory/2180-145-0x0000000000000000-mapping.dmp
-
memory/2256-142-0x0000000000000000-mapping.dmp
-
memory/2272-144-0x0000000000000000-mapping.dmp
-
memory/2492-151-0x0000000000000000-mapping.dmp
-
memory/3056-138-0x0000000000000000-mapping.dmp
-
memory/3088-149-0x0000000000000000-mapping.dmp
-
memory/3176-152-0x0000000000000000-mapping.dmp
-
memory/3304-133-0x0000000000000000-mapping.dmp
-
memory/4204-153-0x0000000000000000-mapping.dmp
-
memory/4244-132-0x0000000000000000-mapping.dmp
-
memory/4528-147-0x0000000000000000-mapping.dmp
-
memory/4752-150-0x0000000000000000-mapping.dmp