Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe
Resource
win10v2004-20220812-en
General
-
Target
478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe
-
Size
660KB
-
MD5
affd7cfdd9720f8a044d5e9410923a78
-
SHA1
80ac3f86c3a31c4516f9077f8c5e990de2068032
-
SHA256
478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064
-
SHA512
5468ae683c5d5cf41ae8b961d40a02e827a226a2aa5845c74d20ef0f556145d737d3d8932b0dbae4ff69736c388a931f72a5f33a2775b1a9ac8717ce160b43de
-
SSDEEP
12288:1kr/10xl0PFS4jwbIsO/arlTT6zncVUJ7vndkrh:+r/10xl04EOIH/cTT6DNGrh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 3988 netsh.exe 1716 netsh.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\GroupCopy.tiff 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Pictures\ImportEnter.tiff 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Pictures\RepairWatch.tiff 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wvtymcow.bat 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Admin\3D Objects\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Links\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\Music\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\Videos\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\Documents\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Music\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Public\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1046 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ru-RU\tipresx.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\ECLIPSE_.SF 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\System\de-DE\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\splash.gif 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\SharedPerformance.man 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\tabskb.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\System\Ole DB\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derby.war 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\microsoft shared\ink\el-GR\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_zh_CN.jar 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\meta-index 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.properties 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msdaprsr.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setEmbeddedCP.bat 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach_5.5.0.165303.jar 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\US_export_policy.jar 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\en-US\wab32res.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcvbs.inc 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msadcor.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\AssertDisconnect.xml 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\am.pak 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\javaws.jar 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\feature.properties 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\System\msadc\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\et.pak 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\preloaded_data.pb 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msaddsr.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Internet Explorer\es-ES\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui_5.5.0.165303.jar 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\he.pak 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\feature.properties 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome.dll.sig 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_MoveNoDrop32x32.gif 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.xml 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.zh_CN_5.5.0.165303.jar 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\feature.xml 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\Restore-My-Files.txt 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winlogon.exe 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe File opened for modification C:\Windows\winlogon.exe 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1404 schtasks.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Loki\shell\open\command\ = "C:\\ProgramData\\z2yubeqs.exe \"%l\" " 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Loki 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Loki\ = "Loki" 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Loki\shell\open\command 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Loki 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Loki\shell 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Loki\shell\open 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 2592 powershell.exe 2592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe Token: SeIncreaseQuotaPrivilege 2108 WMIC.exe Token: SeSecurityPrivilege 2108 WMIC.exe Token: SeTakeOwnershipPrivilege 2108 WMIC.exe Token: SeLoadDriverPrivilege 2108 WMIC.exe Token: SeSystemProfilePrivilege 2108 WMIC.exe Token: SeSystemtimePrivilege 2108 WMIC.exe Token: SeProfSingleProcessPrivilege 2108 WMIC.exe Token: SeIncBasePriorityPrivilege 2108 WMIC.exe Token: SeCreatePagefilePrivilege 2108 WMIC.exe Token: SeBackupPrivilege 2108 WMIC.exe Token: SeRestorePrivilege 2108 WMIC.exe Token: SeShutdownPrivilege 2108 WMIC.exe Token: SeDebugPrivilege 2108 WMIC.exe Token: SeSystemEnvironmentPrivilege 2108 WMIC.exe Token: SeRemoteShutdownPrivilege 2108 WMIC.exe Token: SeUndockPrivilege 2108 WMIC.exe Token: SeManageVolumePrivilege 2108 WMIC.exe Token: 33 2108 WMIC.exe Token: 34 2108 WMIC.exe Token: 35 2108 WMIC.exe Token: 36 2108 WMIC.exe Token: SeIncreaseQuotaPrivilege 2108 WMIC.exe Token: SeSecurityPrivilege 2108 WMIC.exe Token: SeTakeOwnershipPrivilege 2108 WMIC.exe Token: SeLoadDriverPrivilege 2108 WMIC.exe Token: SeSystemProfilePrivilege 2108 WMIC.exe Token: SeSystemtimePrivilege 2108 WMIC.exe Token: SeProfSingleProcessPrivilege 2108 WMIC.exe Token: SeIncBasePriorityPrivilege 2108 WMIC.exe Token: SeCreatePagefilePrivilege 2108 WMIC.exe Token: SeBackupPrivilege 2108 WMIC.exe Token: SeRestorePrivilege 2108 WMIC.exe Token: SeShutdownPrivilege 2108 WMIC.exe Token: SeDebugPrivilege 2108 WMIC.exe Token: SeSystemEnvironmentPrivilege 2108 WMIC.exe Token: SeRemoteShutdownPrivilege 2108 WMIC.exe Token: SeUndockPrivilege 2108 WMIC.exe Token: SeManageVolumePrivilege 2108 WMIC.exe Token: 33 2108 WMIC.exe Token: 34 2108 WMIC.exe Token: 35 2108 WMIC.exe Token: 36 2108 WMIC.exe Token: SeBackupPrivilege 2100 vssvc.exe Token: SeRestorePrivilege 2100 vssvc.exe Token: SeAuditPrivilege 2100 vssvc.exe Token: SeDebugPrivilege 2592 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3004 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 84 PID 5016 wrote to memory of 3004 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 84 PID 5016 wrote to memory of 3004 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 84 PID 3004 wrote to memory of 1404 3004 cmd.exe 86 PID 3004 wrote to memory of 1404 3004 cmd.exe 86 PID 3004 wrote to memory of 1404 3004 cmd.exe 86 PID 5016 wrote to memory of 1704 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 87 PID 5016 wrote to memory of 1704 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 87 PID 5016 wrote to memory of 1704 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 87 PID 1704 wrote to memory of 4008 1704 csc.exe 89 PID 1704 wrote to memory of 4008 1704 csc.exe 89 PID 1704 wrote to memory of 4008 1704 csc.exe 89 PID 5016 wrote to memory of 2368 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 91 PID 5016 wrote to memory of 2368 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 91 PID 5016 wrote to memory of 2368 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 91 PID 5016 wrote to memory of 1904 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 93 PID 5016 wrote to memory of 1904 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 93 PID 5016 wrote to memory of 1904 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 93 PID 5016 wrote to memory of 1220 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 95 PID 5016 wrote to memory of 1220 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 95 PID 5016 wrote to memory of 1220 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 95 PID 5016 wrote to memory of 1812 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 97 PID 5016 wrote to memory of 1812 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 97 PID 5016 wrote to memory of 1812 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 97 PID 5016 wrote to memory of 2576 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 99 PID 5016 wrote to memory of 2576 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 99 PID 5016 wrote to memory of 2576 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 99 PID 5016 wrote to memory of 3060 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 101 PID 5016 wrote to memory of 3060 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 101 PID 5016 wrote to memory of 3060 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 101 PID 5016 wrote to memory of 4428 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 103 PID 5016 wrote to memory of 4428 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 103 PID 5016 wrote to memory of 4428 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 103 PID 5016 wrote to memory of 4608 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 105 PID 5016 wrote to memory of 4608 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 105 PID 5016 wrote to memory of 4608 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 105 PID 4428 wrote to memory of 3988 4428 cmd.exe 107 PID 4428 wrote to memory of 3988 4428 cmd.exe 107 PID 4428 wrote to memory of 3988 4428 cmd.exe 107 PID 1220 wrote to memory of 2108 1220 cmd.exe 108 PID 1220 wrote to memory of 2108 1220 cmd.exe 108 PID 1220 wrote to memory of 2108 1220 cmd.exe 108 PID 4608 wrote to memory of 1716 4608 cmd.exe 109 PID 4608 wrote to memory of 1716 4608 cmd.exe 109 PID 4608 wrote to memory of 1716 4608 cmd.exe 109 PID 5016 wrote to memory of 2592 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 117 PID 5016 wrote to memory of 2592 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 117 PID 5016 wrote to memory of 2592 5016 478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe"C:\Users\Admin\AppData\Local\Temp\478c116d9bb318b4621c7839c81be36261c38e748a593249f8c9c67789f71064.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /CREATE /SC ONLOGON /TN Loki /TR C:\Users\Admin\AppData\Roaming\winlogon.exe /RU SYSTEM /RL HIGHEST /F2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /SC ONLOGON /TN Loki /TR C:\Users\Admin\AppData\Roaming\winlogon.exe /RU SYSTEM /RL HIGHEST /F3⤵
- Creates scheduled task(s)
PID:1404
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ispeyzjo\ispeyzjo.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES569C.tmp" "c:\ProgramData\CSC6C51DE26E371487EBAF7863D3245F881.TMP"3⤵PID:4008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵PID:2368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin DELETE SYSTEMSTATEBACKUP2⤵PID:1904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete2⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C netsh advfirewall set currentprofile state off2⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C netsh firewall set opmode mode=disable2⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:1716
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Get-ADComputer -filter * -Searchbase '%s' | foreach{ Invoke-GPUpdate -computer $_.name -force -RandomDelayInMinutes 0}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5ee379bb2de1951ffc406d3a90f3a5f94
SHA1bc9fce35cf2c057391c003128dfac5a467317761
SHA256e0f7e20f5f1fd921301337771fae8d7af2fea18b2e034c78517cfe1c39f89a3a
SHA512b7b369fdb0dc43a99579abe5636912071d1f9724bac1dd0e72f98291339cfd7c921847089f55fbdc9533cb6de55c9678e86ec35db8d5e2620bca91ba7bf030b4
-
Filesize
25KB
MD5d69236fd6e48ce09cf844033b9211aca
SHA15500f550237eeb3686321dd2ab4024162ff0badb
SHA2560d43bcf5b3fe55bea4ff725a119a7b265358df66741deece6e7c8a84942d89cf
SHA512c2e7b8d64e47de4b252fc03ce937504fef55f82814060aed1550c80fcb62a58c1c7e2c1e7e4f286260c864f4386b98943ae698a75b8145c595731f1f2d37aee6
-
Filesize
24KB
MD5b5cd1dab865ae06645aee06a3adb4593
SHA1fc3de66360608f2339d912f82d1075704e3c6465
SHA2567b546e473b65419bd5abd34729dc9bca136aca2714b7989879a55e58991b43c8
SHA512948b4ca873d2e302e9887f4c230a6bd6b04291b1a615c6a524b53c166bbb3be2daa58b27a791c5bf9b5c5cbf7d7b55b4a01d27dd2e0388433d896332a1828353
-
Filesize
1KB
MD5e5ed578b429b2183e3aa05e94df9e278
SHA143701a596dae631cdc0eb482a940cc1edebd6f3f
SHA2561403a91040808d1c057f8edb45157a7d3cb9245b3dc3ae52074e48a093cb93c5
SHA512ca0988657e02b174ac6b34b872c1ce54a89d935ff8d4ce747adaaf2040237fd55da13e76f92c3e01dd57cb153d839725509d7942d1916e0e77580db474bad0cb
-
Filesize
236B
MD587fca89b680876dc4cf3c16fa1523d8a
SHA164a2ec87b0e3a0d1e07468ab7a10f6468629f1f8
SHA256bf70ab4370ed14b8954b6bd400c35bb556db42bf6e9168261a2d6109f1a4bc52
SHA512d50c9d1efe18979236e819fd768f4ad692bf0742098b2b3a9ec3fa7a54d503d81a4fbf3e92acf854a2d7a245eed1fe2f9e78fe5c35c56925b3d4d09ffe099aca
-
Filesize
23KB
MD58c9a5448905c6ad6f5a15ad8f102fa56
SHA1185575a9708fe9ff122423e459eeed7098ad11d4
SHA256fc65491d373c30593f9ef53d83959625dc384bc42d551aa77a666d4e9b538104
SHA5122032d1f19ac0734339626531cd77ce0509dbba93260c87505d20998ab66aa3dceee4c94e10d8620cdcc62eacf9e63bbe5357afa2a09abdaa51ca0fde8b9aed50