Analysis
-
max time kernel
95s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe
Resource
win10v2004-20220901-en
General
-
Target
d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe
-
Size
158KB
-
MD5
3c4fa896e819cb8fada88a6fdd7b2cc7
-
SHA1
0ebf10867534cb472bb98344f80e3a8aac0aa507
-
SHA256
d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333
-
SHA512
e4486c33fc7bf99700fabec50ead10a6159758603d50eabe650436098a977b8c9dc728d0e8dbc3e3718393a7ba67cca8ea2799ef83e9194f178f04ae9784473e
-
SSDEEP
3072:Wkb6bwPcmQ1mbTw8Gt189VTG079sTGyAzbnuvXdIR:WkTPcmscw/1ETGgWGy0uvC
Malware Config
Extracted
C:\Program Files\Microsoft Office\root\Integration\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt
Signatures
-
Koxic
A C++ written ransomware first seen in late 2021.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe -
Disables taskbar notifications via registry modification
-
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertSearch.tiff.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\RestoreComplete.raw.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\OptimizeSave.tiff.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\InvokeSwitch.tif => C:\Users\Admin\Pictures\InvokeSwitch.tif.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\DisableBlock.tiff.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\BackupUnlock.tif => C:\Users\Admin\Pictures\BackupUnlock.tif.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\SkipSend.crw.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\ReadRepair.raw => C:\Users\Admin\Pictures\ReadRepair.raw.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\OptimizeSave.tiff => C:\Users\Admin\Pictures\OptimizeSave.tiff.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\ConvertSearch.tiff => C:\Users\Admin\Pictures\ConvertSearch.tiff.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\UndoSend.tif => C:\Users\Admin\Pictures\UndoSend.tif.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\SkipSend.crw => C:\Users\Admin\Pictures\SkipSend.crw.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\BackupUnlock.tif.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\DisableBlock.tiff => C:\Users\Admin\Pictures\DisableBlock.tiff.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\UndoSend.tif.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File renamed C:\Users\Admin\Pictures\RestoreComplete.raw => C:\Users\Admin\Pictures\RestoreComplete.raw.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\ReadRepair.raw.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Users\Admin\Pictures\InvokeSwitch.tif.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtectione = "0" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\DisableBlockAtFirstSeen = "1" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\LocalSettingOverrideSpynetReporting = "0" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "2" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\UX Configuration d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\UX Configuration\NotificationSuppress = "1" d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\download.svg.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\adobepdf.xdc.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-pl.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\locale\jfluid-server_ja.jar.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\flags.png.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\main.css.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\selection-actions2x.png.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\et_get.svg.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Subscription-pl.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft.NET\ADOMD.NET\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\officemuiset.msi.16.en-us.vreg.dat.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_remove_18.svg.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-pl.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\ui-strings.js.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\Confirmation.png.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileScanCard_Light.pdf.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalDemoR_BypassTrial180-ul-oob.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\js\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\Resources\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\es-es\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected]_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ppd.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\METCONV.TXT.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\AppxMetadata\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\close.svg.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_MAKC2R-ul-phn.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\et-EE\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\css\main.css.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\hu-hu\ui-strings.js.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ko-kr\ui-strings.js.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ppd.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\PAPYRUS.ELM.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ro-ro\ui-strings.js.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-ul-phn.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-ppd.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Grace-ppd.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\CAPSULES.ELM.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.MSOUC.16.1033.hxn.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-gb\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-fr\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-gb\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application_ja.jar.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-lib-profiler-charts.jar.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\mobile_reader_logo.svg.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_OEM_Perp-ul-phn.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_pt_BR.jar.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_download_audit_report_18.svg.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\meta-index.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_KMS_Client-ul-oob.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-pl.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-pl.xrm-ms.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-util-enumerations_ja.jar.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\tl.gif.KOXIC_LNELD d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1860 ipconfig.exe -
Kills process with taskkill 1 IoCs
pid Process 1276 taskkill.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\ui-strings.jsC:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe File created C:\Users\Admin\AppData\Local\Temp\ui-strings.jsC:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ja-jp\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3664 notepad.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4852 PING.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1276 taskkill.exe Token: SeBackupPrivilege 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Token: SeRestorePrivilege 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Token: SeManageVolumePrivilege 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Token: SeTakeOwnershipPrivilege 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe Token: SeIncreaseQuotaPrivilege 2368 WMIC.exe Token: SeSecurityPrivilege 2368 WMIC.exe Token: SeTakeOwnershipPrivilege 2368 WMIC.exe Token: SeLoadDriverPrivilege 2368 WMIC.exe Token: SeSystemProfilePrivilege 2368 WMIC.exe Token: SeSystemtimePrivilege 2368 WMIC.exe Token: SeProfSingleProcessPrivilege 2368 WMIC.exe Token: SeIncBasePriorityPrivilege 2368 WMIC.exe Token: SeCreatePagefilePrivilege 2368 WMIC.exe Token: SeBackupPrivilege 2368 WMIC.exe Token: SeRestorePrivilege 2368 WMIC.exe Token: SeShutdownPrivilege 2368 WMIC.exe Token: SeDebugPrivilege 2368 WMIC.exe Token: SeSystemEnvironmentPrivilege 2368 WMIC.exe Token: SeRemoteShutdownPrivilege 2368 WMIC.exe Token: SeUndockPrivilege 2368 WMIC.exe Token: SeManageVolumePrivilege 2368 WMIC.exe Token: 33 2368 WMIC.exe Token: 34 2368 WMIC.exe Token: 35 2368 WMIC.exe Token: 36 2368 WMIC.exe Token: SeIncreaseQuotaPrivilege 2368 WMIC.exe Token: SeSecurityPrivilege 2368 WMIC.exe Token: SeTakeOwnershipPrivilege 2368 WMIC.exe Token: SeLoadDriverPrivilege 2368 WMIC.exe Token: SeSystemProfilePrivilege 2368 WMIC.exe Token: SeSystemtimePrivilege 2368 WMIC.exe Token: SeProfSingleProcessPrivilege 2368 WMIC.exe Token: SeIncBasePriorityPrivilege 2368 WMIC.exe Token: SeCreatePagefilePrivilege 2368 WMIC.exe Token: SeBackupPrivilege 2368 WMIC.exe Token: SeRestorePrivilege 2368 WMIC.exe Token: SeShutdownPrivilege 2368 WMIC.exe Token: SeDebugPrivilege 2368 WMIC.exe Token: SeSystemEnvironmentPrivilege 2368 WMIC.exe Token: SeRemoteShutdownPrivilege 2368 WMIC.exe Token: SeUndockPrivilege 2368 WMIC.exe Token: SeManageVolumePrivilege 2368 WMIC.exe Token: 33 2368 WMIC.exe Token: 34 2368 WMIC.exe Token: 35 2368 WMIC.exe Token: 36 2368 WMIC.exe Token: SeIncreaseQuotaPrivilege 1388 WMIC.exe Token: SeSecurityPrivilege 1388 WMIC.exe Token: SeTakeOwnershipPrivilege 1388 WMIC.exe Token: SeLoadDriverPrivilege 1388 WMIC.exe Token: SeSystemProfilePrivilege 1388 WMIC.exe Token: SeSystemtimePrivilege 1388 WMIC.exe Token: SeProfSingleProcessPrivilege 1388 WMIC.exe Token: SeIncBasePriorityPrivilege 1388 WMIC.exe Token: SeCreatePagefilePrivilege 1388 WMIC.exe Token: SeBackupPrivilege 1388 WMIC.exe Token: SeRestorePrivilege 1388 WMIC.exe Token: SeShutdownPrivilege 1388 WMIC.exe Token: SeDebugPrivilege 1388 WMIC.exe Token: SeSystemEnvironmentPrivilege 1388 WMIC.exe Token: SeRemoteShutdownPrivilege 1388 WMIC.exe Token: SeUndockPrivilege 1388 WMIC.exe Token: SeManageVolumePrivilege 1388 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 800 wrote to memory of 1876 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 83 PID 800 wrote to memory of 1876 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 83 PID 800 wrote to memory of 1876 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 83 PID 1876 wrote to memory of 1276 1876 cmd.exe 85 PID 1876 wrote to memory of 1276 1876 cmd.exe 85 PID 1876 wrote to memory of 1276 1876 cmd.exe 85 PID 800 wrote to memory of 3416 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 86 PID 800 wrote to memory of 3416 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 86 PID 800 wrote to memory of 3416 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 86 PID 800 wrote to memory of 2600 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 88 PID 800 wrote to memory of 2600 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 88 PID 800 wrote to memory of 2600 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 88 PID 800 wrote to memory of 3780 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 90 PID 800 wrote to memory of 3780 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 90 PID 800 wrote to memory of 3780 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 90 PID 3780 wrote to memory of 2368 3780 cmd.exe 92 PID 3780 wrote to memory of 2368 3780 cmd.exe 92 PID 3780 wrote to memory of 2368 3780 cmd.exe 92 PID 800 wrote to memory of 936 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 93 PID 800 wrote to memory of 936 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 93 PID 800 wrote to memory of 936 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 93 PID 800 wrote to memory of 3660 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 95 PID 800 wrote to memory of 3660 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 95 PID 800 wrote to memory of 3660 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 95 PID 3660 wrote to memory of 1388 3660 cmd.exe 97 PID 3660 wrote to memory of 1388 3660 cmd.exe 97 PID 3660 wrote to memory of 1388 3660 cmd.exe 97 PID 800 wrote to memory of 3724 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 98 PID 800 wrote to memory of 3724 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 98 PID 800 wrote to memory of 3724 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 98 PID 800 wrote to memory of 3604 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 100 PID 800 wrote to memory of 3604 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 100 PID 800 wrote to memory of 3604 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 100 PID 3604 wrote to memory of 3816 3604 cmd.exe 102 PID 3604 wrote to memory of 3816 3604 cmd.exe 102 PID 3604 wrote to memory of 3816 3604 cmd.exe 102 PID 800 wrote to memory of 928 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 103 PID 800 wrote to memory of 928 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 103 PID 800 wrote to memory of 928 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 103 PID 800 wrote to memory of 2080 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 105 PID 800 wrote to memory of 2080 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 105 PID 800 wrote to memory of 2080 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 105 PID 2080 wrote to memory of 4872 2080 cmd.exe 107 PID 2080 wrote to memory of 4872 2080 cmd.exe 107 PID 2080 wrote to memory of 4872 2080 cmd.exe 107 PID 800 wrote to memory of 2912 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 108 PID 800 wrote to memory of 2912 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 108 PID 800 wrote to memory of 2912 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 108 PID 800 wrote to memory of 752 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 110 PID 800 wrote to memory of 752 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 110 PID 800 wrote to memory of 752 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 110 PID 752 wrote to memory of 2552 752 cmd.exe 112 PID 752 wrote to memory of 2552 752 cmd.exe 112 PID 752 wrote to memory of 2552 752 cmd.exe 112 PID 800 wrote to memory of 1880 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 113 PID 800 wrote to memory of 1880 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 113 PID 800 wrote to memory of 1880 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 113 PID 800 wrote to memory of 4800 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 115 PID 800 wrote to memory of 4800 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 115 PID 800 wrote to memory of 4800 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 115 PID 4800 wrote to memory of 1248 4800 cmd.exe 117 PID 4800 wrote to memory of 1248 4800 cmd.exe 117 PID 4800 wrote to memory of 1248 4800 cmd.exe 117 PID 800 wrote to memory of 4636 800 d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe"C:\Users\Admin\AppData\Local\Temp\d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies extensions of user files
- Windows security modification
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM MSASCuiL.exe taskkill /F /IM MSMpeng.exe taskkill /F /IM msseces.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM MSASCuiL.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin delete shadows /all /quiet sc config browser sc config browser start=enabled sc stop vss sc config vss start=disabled sc stop MongoDB sc config MongoDB start=disabled sc stop SQLWriter sc config SQLWriter start=disabled sc stop MSSQLServerOLAPService sc config MSSQLServerOLAPService start=disabled sc stop MSSQLSERVER sc config MSSQLSERVER start=disabled sc stop MSSQL$SQLEXPRESS sc config MSSQL$SQLEXPRESS start=disabled sc stop ReportServer sc config ReportServer start=disabled sc stop OracleServiceORCL sc config OracleServiceORCL start=disabled sc stop OracleDBConsoleorcl sc config OracleDBConsoleorcl start=disabled sc stop OracleMTSRecoveryService sc config OracleMTSRecoveryService start=disabled sc stop OracleVssWriterORCL sc config OracleVssWriterORCL start=disabled sc stop MySQL sc config MySQL start=disabled2⤵PID:3416
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo OS INFO: > %TEMP%\GBGILUCKL"2⤵PID:2600
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic OS get Caption,CSDVersion,OSArchitecture,Version >> %TEMP%\GBGILUCKL"2⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic OS get Caption,CSDVersion,OSArchitecture,Version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo BIOS INFO: >> %TEMP%\GBGILUCKL"2⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic BIOS get Manufacturer, Name, SMBIOSBIOSVersion, Version >> %TEMP%\GBGILUCKL"2⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic BIOS get Manufacturer, Name, SMBIOSBIOSVersion, Version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo CPU INFO: >> %TEMP%\GBGILUCKL"2⤵PID:3724
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic CPU get Name, NumberOfCores, NumberOfLogicalProcessors >> %TEMP%\GBGILUCKL"2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic CPU get Name, NumberOfCores, NumberOfLogicalProcessors3⤵PID:3816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo MEMPHYSICAL INFO: >> %TEMP%\GBGILUCKL"2⤵PID:928
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic MEMPHYSICAL get MaxCapacity >> %TEMP%\GBGILUCKL"2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic MEMPHYSICAL get MaxCapacity3⤵PID:4872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo MEMORYCHIP: INFO >> %TEMP%\GBGILUCKL"2⤵PID:2912
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic MEMORYCHIP get Capacity, DeviceLocator, PartNumber, Tag >> %TEMP%\GBGILUCKL"2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic MEMORYCHIP get Capacity, DeviceLocator, PartNumber, Tag3⤵PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo NIC INFO: >> %TEMP%\GBGILUCKL"2⤵PID:1880
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic NIC get Description, MACAddress, NetEnabled, Speed >> %TEMP%\GBGILUCKL"2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic NIC get Description, MACAddress, NetEnabled, Speed3⤵PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo DISKDRIVE INFO: >> %TEMP%\GBGILUCKL"2⤵PID:4636
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic DISKDRIVE get InterfaceType, Name, Size, Status >> %TEMP%\GBGILUCKL"2⤵PID:996
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic DISKDRIVE get InterfaceType, Name, Size, Status3⤵PID:3748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo USERACCOUNT INFO: >> %TEMP%\GBGILUCKL"2⤵PID:3644
-
-
C:\Windows\SysWOW64\cmd.execmd /c "wmic USERACCOUNT get Caption, Name, PasswordRequired, Status >> %TEMP%\GBGILUCKL"2⤵PID:484
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic USERACCOUNT get Caption, Name, PasswordRequired, Status3⤵PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo IPCONFIG: >> %TEMP%\GBGILUCKL"2⤵PID:4756
-
-
C:\Windows\SysWOW64\cmd.execmd /c "ipconfig >> %TEMP%\GBGILUCKL"2⤵PID:2672
-
C:\Windows\SysWOW64\ipconfig.exeipconfig3⤵
- Gathers network information
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "echo DATABASES FILES: >> %TEMP%\GBGILUCKL"2⤵PID:3464
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\Users\Admin\AppData\Local\Temp\WANNA_RECOVER_KOXIC_FILEZ_LNELD.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3664
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\d2203b6d272d44b7abc66e290c3b79767428168b077a16ded1db0babbe34f333.exe"2⤵PID:1036
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:4852
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11B
MD5887ae0db192785398c154a027c858317
SHA19e1258a3444e7f54d4a2b23bec0c020d67f285b6
SHA2569841fc54844c86d073907913cfd2fccc49d13db491e790c6aeb30b7159e62bf5
SHA51265364e8797ecc23d9eac18cfe0c1393e9429ee15cde33b7b936c917608196da7bf53ba7c21d9bb637c9a91797eb58a4dbb2346dc4bd9e6c947a711b381dfcb76
-
Filesize
296B
MD5e771e08346c6a2bc73c2a372cba333d8
SHA158a23e4ce4c758212d9cef74045c31dba35d4923
SHA25612846bff5586d9a89874c612d9269e2ba1e5a730438373ce9a08919b58a0df6f
SHA5120611c1d8f71ef330812f72ce0d7416253caf3a5feab48545dcd26f4b242949fd7f7fc58da069bec8bc2600c52d8df6d9b43012a429b1d96a88749951dd461c15
-
Filesize
296B
MD5e771e08346c6a2bc73c2a372cba333d8
SHA158a23e4ce4c758212d9cef74045c31dba35d4923
SHA25612846bff5586d9a89874c612d9269e2ba1e5a730438373ce9a08919b58a0df6f
SHA5120611c1d8f71ef330812f72ce0d7416253caf3a5feab48545dcd26f4b242949fd7f7fc58da069bec8bc2600c52d8df6d9b43012a429b1d96a88749951dd461c15
-
Filesize
668B
MD5fc4dd1d0772fb154de31953c2b421a26
SHA1f8273a9f46597ef98632d8082a24210c5b0d1158
SHA25617e67d6439097c6b6cb5105e6661d18678921cc5ae4d03f31d1ed950df738b1b
SHA512605cd1b8d10b64e3ad0388e753c658bc0ee6a3c6262952705b9516f9df3a59b50aac01fe0d0da7193aa16d12dfcff3126a71485414818593a2d6fbed1edd162f
-
Filesize
668B
MD5fc4dd1d0772fb154de31953c2b421a26
SHA1f8273a9f46597ef98632d8082a24210c5b0d1158
SHA25617e67d6439097c6b6cb5105e6661d18678921cc5ae4d03f31d1ed950df738b1b
SHA512605cd1b8d10b64e3ad0388e753c658bc0ee6a3c6262952705b9516f9df3a59b50aac01fe0d0da7193aa16d12dfcff3126a71485414818593a2d6fbed1edd162f
-
Filesize
1KB
MD5c71e901a4f65c7a50a11a3b836622873
SHA1162f9bfcc801e7db8da1eb8ce42b21b1f50a09e9
SHA256f33353dd1816be2913e1950ddc935aa9e70010a15abdbf7d1001a55edc82e52a
SHA512b0de60436bea2d756e350b44be69252fd744f435a5b7e119452230eaf57a7ff339071be29eaa4b501eb01bf227bde590c36ef17683e090ddad745ceb4c4ed681
-
Filesize
1KB
MD5c71e901a4f65c7a50a11a3b836622873
SHA1162f9bfcc801e7db8da1eb8ce42b21b1f50a09e9
SHA256f33353dd1816be2913e1950ddc935aa9e70010a15abdbf7d1001a55edc82e52a
SHA512b0de60436bea2d756e350b44be69252fd744f435a5b7e119452230eaf57a7ff339071be29eaa4b501eb01bf227bde590c36ef17683e090ddad745ceb4c4ed681
-
Filesize
1KB
MD569844fa8296e4e4e2b29f921141ae838
SHA1e161644d7ba0c4ffc86be06abf77ff390ec85676
SHA25653031d7b21762222ab98e3f9ef68b2fa902ddcb0bc4d4c0dbbe8bfbb09e0dc96
SHA512bda825eceb2c58081b192058199ef67c60e4177ae36ba69b0ead3e77b2e6d96d2444638989bd975947c78741a04f94a220c1a5cce4b32fb57685d27cf5b93396
-
Filesize
1KB
MD5f4b09ff7e0b9d684242f02f3bfc973d2
SHA106572016df2cc5f83e1e29f28ca08ccd6adbcf31
SHA2563a72d27644968b8c776cb9f865570eb038415fabb1acba749a88f39c5ca5a86c
SHA512e02ddc00772434e25e98387afe56a5ec45d89ad98ee9dd204ca9d67458ec9f00bf5840b09bcdee090e507360f699903e402bb4c585c205eaa57dc67418ee3229
-
Filesize
1KB
MD565c1247c68ad9d85a3b2d66beb9cea42
SHA171d429cf2722b43109a8823d06633c46e52c2a54
SHA2569f08c7a43c50b013aff9ae8d8ad86520d55ddb4ac61b63b08380101ece9b00fb
SHA512bfb9877a702b7cd7d53bf1d2ca5ddef36052048c6b832e00298cd32d259cfda8ccd2662d7e449a55334e738009b820a71fc955f758baf055f521aab527f7b658
-
Filesize
1KB
MD565c1247c68ad9d85a3b2d66beb9cea42
SHA171d429cf2722b43109a8823d06633c46e52c2a54
SHA2569f08c7a43c50b013aff9ae8d8ad86520d55ddb4ac61b63b08380101ece9b00fb
SHA512bfb9877a702b7cd7d53bf1d2ca5ddef36052048c6b832e00298cd32d259cfda8ccd2662d7e449a55334e738009b820a71fc955f758baf055f521aab527f7b658
-
Filesize
1KB
MD5994116f6b0501c491a7621d5048e9f4b
SHA1b482af1cbf5e45f396afb9bb00ae7d0446d72985
SHA2561976076a5ec60e9815da5b1f2ae12ded3f5d55ce108a403308b4d4bd4fd5b642
SHA51290bf00a88b8a7873914143547b0065a4eea65aec4d0919a19450038e4a142cedfdc7f371bc12133f8455dbd7e25b8e783cc8806a42034369057e23c2b34b22e0
-
Filesize
1KB
MD5994116f6b0501c491a7621d5048e9f4b
SHA1b482af1cbf5e45f396afb9bb00ae7d0446d72985
SHA2561976076a5ec60e9815da5b1f2ae12ded3f5d55ce108a403308b4d4bd4fd5b642
SHA51290bf00a88b8a7873914143547b0065a4eea65aec4d0919a19450038e4a142cedfdc7f371bc12133f8455dbd7e25b8e783cc8806a42034369057e23c2b34b22e0
-
Filesize
2KB
MD5ce7dbb26acb257e9fb24d80fc2311a67
SHA16948d5334109bc48a5476c34ccd7ccf528b23203
SHA25680aa6c0403a492445f4272ffc8263bd58185e6648521c4c1421ab1fa5852b79d
SHA512025709adfb06ee002d87e0d0b8d333c9ec571aef9a01d5ac0e1e1bd56c3c6ac34838f4538d70fc9580b8d99f81706a2d6f0b7d414ad1996a191efac29c54c8c2
-
Filesize
2KB
MD5476d314c9ed62e476f624619c149a65e
SHA1610f7959e8947a41f79a0d8b9df0b3e86c49886b
SHA25646b1b0709a9d8c2387ac239a195120dbc8d0d7e94065785d4e25c4cb4a89cd43
SHA5123873122f804ba2825215cd1b610b43a03e1ec284e411cff5a61a9c73c16ff67a58764305f2895f8f4db058f77f2ba2c907b4446ef5121bedd42eaad0326f6f58
-
Filesize
3KB
MD5ec767b3c764ac91ed6475074a8e0ac94
SHA1082309bf9fd1fa5a602d542053578b43775d49c3
SHA256fc3d110288f112ad4c5d0cb13b26c113f58376476066d2ae70db762ff7e68969
SHA51216ca8f760a854d8cbc052d82ead09a893cc29307dc1ad84020ffb80949ad47049a12dec2a4829137aa457d8d0393c7b2d6f28d140ded83ebaafadc6fa4ab7a8e
-
Filesize
3KB
MD5ec767b3c764ac91ed6475074a8e0ac94
SHA1082309bf9fd1fa5a602d542053578b43775d49c3
SHA256fc3d110288f112ad4c5d0cb13b26c113f58376476066d2ae70db762ff7e68969
SHA51216ca8f760a854d8cbc052d82ead09a893cc29307dc1ad84020ffb80949ad47049a12dec2a4829137aa457d8d0393c7b2d6f28d140ded83ebaafadc6fa4ab7a8e
-
Filesize
3KB
MD56a2fd4a61d25fa28772cf3d084906724
SHA11bd33d88a3f4b35697698dc139b77ca7c7fd3ae6
SHA25674a69674c90f2f05400fffe28aede58da013ba80f006325f52925ea25ef42c19
SHA5126c349665ab5ad99ce73ad1e19aea207c790ba7ee95a2afce5a50ca03577d46954ffd153d9c373ae97694a40262e6b748d6767ef0e018a1af6756442cbdadbfc7
-
Filesize
11KB
MD5ec25a0ebcaeea5e3ea5d70290ac119b3
SHA132bc2578b420b2fb161483721f44aa63675f3508
SHA256148926f474d924e64cde5e4113bb157a9392ed96cd2d872353deb84c0b0159e3
SHA512717a862cd7f49e8e6b5584fb7f771141f4fb601c66732e21121c59e3490d8a8e1568871295828e90c4ae635fb771f31de4e2aa7b85dfda64bc4be11fbe17ca3a