Analysis
-
max time kernel
1803s -
max time network
1841s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 15:56
Static task
static1
Behavioral task
behavioral1
Sample
decoding_data.exe
Resource
win7-20220901-en
General
-
Target
decoding_data.exe
-
Size
3.4MB
-
MD5
177417be748814f6168171a42545f9dd
-
SHA1
9c8b988e66e0fe6f9dab69b1055e4ee200531094
-
SHA256
47dbb2594cd5eb7015ef08b7fb803cd5adc1a1fbe4849dc847c0940f1ccace35
-
SHA512
c90eebbd4663ffe4bec089e21e4f7c1a1441e21a2f78cc190b9ce85fd048bf46901aa74273695df7b6434887284a26d4fdaaf657cb5d9c5469574158adc351c2
-
SSDEEP
49152:EynbnX4Rsrb/TFvO90dL3BmAFd4A64nsfJUvelzON7j93aqSCD0BUCoQPr8bg11t:EyrAe2lS75Hw+i4JROD5R
Malware Config
Extracted
C:\Djfk_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 1068 wevtutil.exe 1848 wevtutil.exe 2460 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3128 bcdedit.exe 4272 bcdedit.exe -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
decoding_data.exedescription ioc process File renamed C:\Users\Admin\Pictures\DebugUndo.png => C:\Users\Admin\Pictures\DebugUndo.png.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_DX4DiMLuzuw0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\GrantOut.raw => C:\Users\Admin\Pictures\GrantOut.raw.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_srVfSKJgMPI0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\SplitConnect.tif => C:\Users\Admin\Pictures\SplitConnect.tif.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_LvixIxQTgDM0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\SplitConnect.tif.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_LvixIxQTgDM0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\UnlockUnregister.crw.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_3PHWB4cbUw00.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\DebugUndo.png.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_DX4DiMLuzuw0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\GrantOut.raw.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_srVfSKJgMPI0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\GrantUse.tiff => C:\Users\Admin\Pictures\GrantUse.tiff.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_LVBnBi51xUI0.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\GrantUse.tiff.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_LVBnBi51xUI0.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\UnlockUnregister.crw => C:\Users\Admin\Pictures\UnlockUnregister.crw.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_3PHWB4cbUw00.snwkz decoding_data.exe File renamed C:\Users\Admin\Pictures\UseRename.raw => C:\Users\Admin\Pictures\UseRename.raw.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_Y9poIu1Trc40.snwkz decoding_data.exe File opened for modification C:\Users\Admin\Pictures\UseRename.raw.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_Y9poIu1Trc40.snwkz decoding_data.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
decoding_data.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ul-phn.xrm-ms.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_6nT733ylXQg0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RADIAL\PREVIEW.GIF.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_HLfLWErxx6s0.snwkz decoding_data.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\jquery.jstree.js.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_ZBKf0y1X9Fc0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-80_contrast-black.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\cubemap.dds decoding_data.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-20.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_mda4Brec0MY0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.core.di.extensions_0.12.0.v20140417-2033.jar.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_rJLB-Bvm4q80.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\ja-JP\TipTsf.dll.mui decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ja-jp\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\FileAssociation\FileAssociation.targetsize-24.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-30_altform-lightunplated.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailLargeTile.scale-150.png decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_ellipses_selected-hover.svg.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_1akgX3OG6Vk0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\s_radio_selected_18.svg.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_fGMUr4tnDOQ0.snwkz decoding_data.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\MixedRealityPortalSplashScreen.scale-100_contrast-black.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\AppxManifest.xml decoding_data.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_scale-125.png decoding_data.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ul-oob.xrm-ms.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_2-RhsMZr6Fk0.snwkz decoding_data.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\vlc.mo.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_iWtD5fUg5gw0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-48.png decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\rhp_world_icon_hover_2x.png.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_nqAVsx52mQQ0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Retail-ul-phn.xrm-ms.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_le7dA3KGBDs0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageSmallTile.scale-400.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeTile.scale-200_contrast-black.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\HelpAndFeedback\BlogThumbnail.png decoding_data.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\MSFT_PackageManagementSource.strings.psd1.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_8idS03yhTuw0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\ANTQUAB.TTF.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_mKh_q3d49u40.snwkz decoding_data.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.bmp decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\JSByteCodeCache_64 decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookSmallTile.scale-400.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-30_contrast-black.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-200.png decoding_data.exe File created C:\Program Files (x86)\Common Files\System\ado\de-DE\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription4-pl.xrm-ms.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_ZvcoN_p6Zhw0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-ppd.xrm-ms.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_GAm7vlqEdwk0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-16.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-400.HCWhite.png decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-80.png.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_EJN4FL1pa4s0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\PREVIEW.GIF.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_fwtgzNG3iYA0.snwkz decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\cs-cz\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-125.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\LargeTile.scale-200.png decoding_data.exe File opened for modification C:\Program Files\VideoLAN\VLC\README.txt.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_JVR_L2zSQFA0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-48_altform-unplated_contrast-white.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_targetsize-36.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-16.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-64.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_zh_CN.jar.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_Y5qGXBmgU4c0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.es-es.msi.16.es-es.boot.tree.dat.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_l8Yat8w-xWE0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\rhp_world_icon_2x.png.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_GdnU7zvmpD40.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\ui-strings.js.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_62d7TjRRamY0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSplashScreen.scale-125_contrast-black.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\GeometryShader.cso decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-80_altform-unplated.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-40_altform-fullcolor.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxAccountsSmallTile.scale-100.png decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_KMS_Client-ul.xrm-ms.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_X0eUXY74LD00.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-64_altform-unplated_contrast-white.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubLargeTile.scale-200.png decoding_data.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css.WvpuRwDfP_tT3qXCSFciXx2iFxc1_DvpgcCXD0Y5kwn_rgQL2uHhYwQ0.snwkz decoding_data.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 604 sc.exe 1356 sc.exe 2440 sc.exe 2032 sc.exe 4588 sc.exe 3316 sc.exe 1088 sc.exe 2344 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2600 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exedecoding_data.exepid process 4156 powershell.exe 4156 powershell.exe 676 powershell.exe 676 powershell.exe 1028 decoding_data.exe 1028 decoding_data.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 2460 wevtutil.exe Token: SeBackupPrivilege 2460 wevtutil.exe Token: SeSecurityPrivilege 1068 wevtutil.exe Token: SeBackupPrivilege 1068 wevtutil.exe Token: SeSecurityPrivilege 1848 wevtutil.exe Token: SeBackupPrivilege 1848 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1920 wmic.exe Token: SeSecurityPrivilege 1920 wmic.exe Token: SeTakeOwnershipPrivilege 1920 wmic.exe Token: SeLoadDriverPrivilege 1920 wmic.exe Token: SeSystemProfilePrivilege 1920 wmic.exe Token: SeSystemtimePrivilege 1920 wmic.exe Token: SeProfSingleProcessPrivilege 1920 wmic.exe Token: SeIncBasePriorityPrivilege 1920 wmic.exe Token: SeCreatePagefilePrivilege 1920 wmic.exe Token: SeBackupPrivilege 1920 wmic.exe Token: SeRestorePrivilege 1920 wmic.exe Token: SeShutdownPrivilege 1920 wmic.exe Token: SeDebugPrivilege 1920 wmic.exe Token: SeSystemEnvironmentPrivilege 1920 wmic.exe Token: SeRemoteShutdownPrivilege 1920 wmic.exe Token: SeUndockPrivilege 1920 wmic.exe Token: SeManageVolumePrivilege 1920 wmic.exe Token: 33 1920 wmic.exe Token: 34 1920 wmic.exe Token: 35 1920 wmic.exe Token: 36 1920 wmic.exe Token: SeIncreaseQuotaPrivilege 3500 wmic.exe Token: SeSecurityPrivilege 3500 wmic.exe Token: SeTakeOwnershipPrivilege 3500 wmic.exe Token: SeLoadDriverPrivilege 3500 wmic.exe Token: SeSystemProfilePrivilege 3500 wmic.exe Token: SeSystemtimePrivilege 3500 wmic.exe Token: SeProfSingleProcessPrivilege 3500 wmic.exe Token: SeIncBasePriorityPrivilege 3500 wmic.exe Token: SeCreatePagefilePrivilege 3500 wmic.exe Token: SeBackupPrivilege 3500 wmic.exe Token: SeRestorePrivilege 3500 wmic.exe Token: SeShutdownPrivilege 3500 wmic.exe Token: SeDebugPrivilege 3500 wmic.exe Token: SeSystemEnvironmentPrivilege 3500 wmic.exe Token: SeRemoteShutdownPrivilege 3500 wmic.exe Token: SeUndockPrivilege 3500 wmic.exe Token: SeManageVolumePrivilege 3500 wmic.exe Token: 33 3500 wmic.exe Token: 34 3500 wmic.exe Token: 35 3500 wmic.exe Token: 36 3500 wmic.exe Token: SeIncreaseQuotaPrivilege 3500 wmic.exe Token: SeSecurityPrivilege 3500 wmic.exe Token: SeTakeOwnershipPrivilege 3500 wmic.exe Token: SeLoadDriverPrivilege 3500 wmic.exe Token: SeSystemProfilePrivilege 3500 wmic.exe Token: SeSystemtimePrivilege 3500 wmic.exe Token: SeProfSingleProcessPrivilege 3500 wmic.exe Token: SeIncBasePriorityPrivilege 3500 wmic.exe Token: SeCreatePagefilePrivilege 3500 wmic.exe Token: SeBackupPrivilege 3500 wmic.exe Token: SeRestorePrivilege 3500 wmic.exe Token: SeShutdownPrivilege 3500 wmic.exe Token: SeDebugPrivilege 3500 wmic.exe Token: SeSystemEnvironmentPrivilege 3500 wmic.exe Token: SeRemoteShutdownPrivilege 3500 wmic.exe Token: SeUndockPrivilege 3500 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
decoding_data.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1028 wrote to memory of 4108 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 4108 1028 decoding_data.exe net.exe PID 4108 wrote to memory of 1508 4108 net.exe net1.exe PID 4108 wrote to memory of 1508 4108 net.exe net1.exe PID 1028 wrote to memory of 532 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 532 1028 decoding_data.exe net.exe PID 532 wrote to memory of 5076 532 net.exe net1.exe PID 532 wrote to memory of 5076 532 net.exe net1.exe PID 1028 wrote to memory of 4928 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 4928 1028 decoding_data.exe net.exe PID 4928 wrote to memory of 944 4928 net.exe net1.exe PID 4928 wrote to memory of 944 4928 net.exe net1.exe PID 1028 wrote to memory of 1400 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 1400 1028 decoding_data.exe net.exe PID 1400 wrote to memory of 1184 1400 net.exe net1.exe PID 1400 wrote to memory of 1184 1400 net.exe net1.exe PID 1028 wrote to memory of 456 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 456 1028 decoding_data.exe net.exe PID 456 wrote to memory of 3324 456 net.exe net1.exe PID 456 wrote to memory of 3324 456 net.exe net1.exe PID 1028 wrote to memory of 820 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 820 1028 decoding_data.exe net.exe PID 820 wrote to memory of 100 820 net.exe net1.exe PID 820 wrote to memory of 100 820 net.exe net1.exe PID 1028 wrote to memory of 4900 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 4900 1028 decoding_data.exe net.exe PID 4900 wrote to memory of 452 4900 net.exe net1.exe PID 4900 wrote to memory of 452 4900 net.exe net1.exe PID 1028 wrote to memory of 1036 1028 decoding_data.exe net.exe PID 1028 wrote to memory of 1036 1028 decoding_data.exe net.exe PID 1036 wrote to memory of 3068 1036 net.exe net1.exe PID 1036 wrote to memory of 3068 1036 net.exe net1.exe PID 1028 wrote to memory of 2440 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 2440 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 2032 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 2032 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 4588 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 4588 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 3316 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 3316 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 1088 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 1088 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 2344 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 2344 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 604 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 604 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 1356 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 1356 1028 decoding_data.exe sc.exe PID 1028 wrote to memory of 3660 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 3660 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 3864 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 3864 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 1740 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 1740 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 3212 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 3212 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 1460 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 1460 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 1820 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 1820 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 3164 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 3164 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 4872 1028 decoding_data.exe reg.exe PID 1028 wrote to memory of 4872 1028 decoding_data.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1508
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:5076
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:944
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:1184
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:3324
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:100
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:452
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_1a7a2" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_1a7a2" /y3⤵PID:3068
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2440
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2032
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:4588
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
PID:3316
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1088
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:604
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_1a7a2" start= disabled2⤵
- Launches sc.exe
PID:1356
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3660
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:3864
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1740
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:3212
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1460
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1820
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3164
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4872
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1052
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1372
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1832
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1808
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:376
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:760
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1060
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:4296
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:4840
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:4476
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:4672
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:944
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1184
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:3324
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:100
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1180
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3688
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3528
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:4160
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3888
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1044
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4884
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1892
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4264
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2600
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3128
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:4272
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:4336
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2308
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:1376
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29