Analysis
-
max time kernel
145s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 16:40
Behavioral task
behavioral1
Sample
a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe
Resource
win10v2004-20220812-en
General
-
Target
a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe
-
Size
159KB
-
MD5
be971d880e75cd48a669ea9e45f6f022
-
SHA1
43b24f5108ff16c56e836082da80128fe516d8af
-
SHA256
a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525
-
SHA512
ded17b8af07b1035d74cbbfeb218c88d12210c047458d4261352613dda693d88259244ad345abef09b016515fe497c49fab944937939a2063ca5249aeb82b064
-
SSDEEP
3072:o3ypcDozZR/WcCF7dPiyJUh5KvdtEZtPz4g0I/t9L05Uht9uew+BVfRUi29J+L:o3ypcmR/UoyJU8EPPE0tVPtnNgg
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2295526160-1155304984-640977766-1000\RECOVERY FILES.txt
https://t.me/mallox_leaks
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RenameComplete.tif => C:\Users\Admin\Pictures\RenameComplete.tif.FARGO3 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File renamed C:\Users\Admin\Pictures\RepairClose.png => C:\Users\Admin\Pictures\RepairClose.png.FARGO3 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File renamed C:\Users\Admin\Pictures\LockWatch.raw => C:\Users\Admin\Pictures\LockWatch.raw.FARGO3 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File renamed C:\Users\Admin\Pictures\EnterConnect.png => C:\Users\Admin\Pictures\EnterConnect.png.FARGO3 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File renamed C:\Users\Admin\Pictures\MergeConnect.crw => C:\Users\Admin\Pictures\MergeConnect.crw.FARGO3 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\H: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\K: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\L: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\M: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\N: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\A: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\B: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\T: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\U: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\V: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\X: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\Z: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\R: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\S: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\E: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\Q: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\W: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\I: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\P: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\O: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\Y: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\F: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened (read-only) \??\J: a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_win7.css a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\W6.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\GetHelpOffline2.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_Spiral.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\nl-nl\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\168.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\BuildInfo.xml a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-256_altform-unplated_devicefamily-colorfulunplated.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\compare_poster.jpg a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\check-mark-2x.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\Heartbeat\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-fr\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_pound_Loud.m4a a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-100_contrast-white.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\MedTile.scale-100.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-oob.xrm-ms a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.XLS a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-125_contrast-white.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-256.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosLogoExtensions.targetsize-32.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SmallTile.scale-400_contrast-black.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyView-Dark.scale-400.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Exchange.scale-100.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-oob.xrm-ms a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fi-fi\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_EyeLookingUp.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\de-de\ui-strings.js a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hr-hr\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\music_welcome_page.jpg a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.513.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.xml_1.3.4.v201005080400.jar a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\FileSystemMetadata.xml a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.fr-fr.msi.16.fr-fr.tree.dat a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailLargeTile.scale-100.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Light.scale-100.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-20_altform-unplated.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-256_contrast-black.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.165.21\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Windows Media Player\en-US\wmplayer.exe.mui a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageMedTile.scale-125.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Square150x150Logo.scale-125.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-72_contrast-white.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\VisualElements\LogoCanary.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-up.gif a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nb-no\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART8.BDR a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\MedTile.scale-125.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fi-fi\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setNetworkClientCP a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightDemiItalic.ttf a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.docs.zh_CN_5.5.0.165303.jar a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\da-dk\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-es_es.gif a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\B11EF506-7DE1-455F-8E20-67264DD4AF60\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\libs\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\css\RECOVERY FILES.txt a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\LargeTile.scale-125.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-80_altform-unplated_contrast-black.png a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1036 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe Token: SeDebugPrivilege 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe Token: SeBackupPrivilege 1320 vssvc.exe Token: SeRestorePrivilege 1320 vssvc.exe Token: SeAuditPrivilege 1320 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1036 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 89 PID 1784 wrote to memory of 1036 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 89 PID 1784 wrote to memory of 3320 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 82 PID 1784 wrote to memory of 3320 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 82 PID 1784 wrote to memory of 3320 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 82 PID 1784 wrote to memory of 504 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 88 PID 1784 wrote to memory of 504 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 88 PID 1784 wrote to memory of 504 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 88 PID 1784 wrote to memory of 4144 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 86 PID 1784 wrote to memory of 4144 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 86 PID 1784 wrote to memory of 4144 1784 a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe 86 PID 3320 wrote to memory of 4404 3320 cmd.exe 91 PID 3320 wrote to memory of 4404 3320 cmd.exe 91 PID 3320 wrote to memory of 4404 3320 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe"C:\Users\Admin\AppData\Local\Temp\a5085e571857ec54cf9625050dfc29a195dad4d52bea9b69d3f22e33ed636525.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc delete MsDtsServer100&&sc delete MSSQL$SOPHOS&&sc delete MSSQLFDLauncher&&sc delete MSSQLSERVER&&sc delete MSSQLServerADHelper100&&sc delete MSSQLServerOLAPService&&sc delete ReportServer&&sc delete SQLAgent$SOPHOS&&sc delete "SQLANYs_sem5"&&sc delete SQLBrowser&&sc delete SQLSERVERAGENT&&sc delete SQLWriter&&sc delete B1LicenseService&&sc delete b1s50000&&sc delete b1s50001&&sc delete b1s50002&&sc delete B1ServerTools&&sc delete B1ServerTools64&&sc delete B1Workflow&&sc delete COMSysApp&&sc delete Gatekeeper64&&sc delete isapnp&&sc delete "SAP Business One RSP Agent Service"&&sc delete SBOClientAgent&&sc delete "SBODI_Server"&&sc delete SBOMail&&sc delete SBOWFDataAccess&&taskkill /f /im db*&&taskkill /f /im apache*&&taskkill /f /im mysql*&&taskkill /f /im Notifier*&&taskkill /f /im IBM*&&taskkill /f /im copy*&&taskkill /f /im store*&&taskkill /f /im sql*&&taskkill /f /im vee*&&taskkill /f /im wrsa*&&taskkill /f /im postg*&&taskkill /f /im sage*&&taskkill /f /im msdt*&&taskkill /f /im ora*&&taskkill /f /im microsoft*&&taskkill /f /im backup*&&taskkill /f /im http*&&taskkill /f /im office*&&taskkill /f /im cube*&&taskkill /f /im team*&&taskkill /f /im b1*&&taskkill /f /im sbo*&&taskkill /f /im reporting*&&taskkill /f /im sav*&&taskkill /f /im fd*&&taskkill /f /im microsoft*&&net stop MSSQLFDLauncher&&net stop MSSQLServerOLAPService&&net stop ReportServer2⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\sc.exesc delete MsDtsServer1003⤵
- Launches sc.exe
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵PID:4144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵PID:504
-
-
C:\Windows\system32\vssadmin.exe"C:\Windows\sysnative\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1036
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320