Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 05:05
Static task
static1
Behavioral task
behavioral1
Sample
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
Resource
win10v2004-20220812-en
General
-
Target
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
-
Size
301KB
-
MD5
2dc0dad1939edfdf997525bac94cdc21
-
SHA1
e3e398a3eed8ffc0266dbe37c396909eee150cf4
-
SHA256
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801
-
SHA512
bfab68408e2812a00a114372fc51704ebaa232f63aeb3564769d10af5895957b0bb8a1aefe8ffe09d92fc38e96b807c02dedc9a08d2beda5822ad4ec3d7cefda
-
SSDEEP
6144:DRBvjMHJAGRdMSv+8nMmSIis4WKAra+xZp3AaEHhwnR:lBvjMHJANkMm9v4WKUJEHhwnR
Malware Config
Extracted
\??\A:\!-Recovery_Instructions-!.html
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\TraceGrant.raw => C:\Users\Admin\Pictures\TraceGrant.raw.bulwark4 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe -
Overwrites deleted data with Cipher tool 1 TTPs
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: cipher.exe File opened (read-only) \??\I: cipher.exe File opened (read-only) \??\N: cipher.exe File opened (read-only) \??\V: cipher.exe File opened (read-only) \??\Y: cipher.exe File opened (read-only) \??\Z: cipher.exe File opened (read-only) \??\W: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Q: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Q: cipher.exe File opened (read-only) \??\R: cipher.exe File opened (read-only) \??\I: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\K: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\S: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Y: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\L: cipher.exe File opened (read-only) \??\J: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\P: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\E: cipher.exe File opened (read-only) \??\G: cipher.exe File opened (read-only) \??\B: cipher.exe File opened (read-only) \??\M: cipher.exe File opened (read-only) \??\M: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\F: cipher.exe File opened (read-only) \??\A: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\G: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\L: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\O: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\T: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\V: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\K: cipher.exe File opened (read-only) \??\P: cipher.exe File opened (read-only) \??\B: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\T: cipher.exe File opened (read-only) \??\X: cipher.exe File opened (read-only) \??\S: cipher.exe File opened (read-only) \??\H: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\R: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\X: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\A: cipher.exe File opened (read-only) \??\O: cipher.exe File opened (read-only) \??\U: cipher.exe File opened (read-only) \??\F: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\N: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\U: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Z: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\J: cipher.exe File opened (read-only) \??\W: cipher.exe File opened (read-only) \??\E: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1100 1272 WerFault.exe 19 3572 2184 WerFault.exe 193 -
Kills process with taskkill 16 IoCs
pid Process 4456 taskkill.exe 1860 taskkill.exe 2224 taskkill.exe 1828 taskkill.exe 3808 taskkill.exe 2148 taskkill.exe 3964 taskkill.exe 5020 taskkill.exe 1600 taskkill.exe 4140 taskkill.exe 1184 taskkill.exe 4948 taskkill.exe 2296 taskkill.exe 4268 taskkill.exe 4336 taskkill.exe 2556 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{347F2E03-F8E3-466B-8660-C04845242685} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 4456 taskkill.exe Token: SeDebugPrivilege 2296 taskkill.exe Token: SeDebugPrivilege 4268 taskkill.exe Token: SeDebugPrivilege 4336 taskkill.exe Token: SeDebugPrivilege 5020 taskkill.exe Token: SeDebugPrivilege 2556 taskkill.exe Token: SeDebugPrivilege 1860 taskkill.exe Token: SeDebugPrivilege 1600 taskkill.exe Token: SeDebugPrivilege 4140 taskkill.exe Token: SeDebugPrivilege 1184 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 1828 taskkill.exe Token: SeDebugPrivilege 3808 taskkill.exe Token: SeDebugPrivilege 4948 taskkill.exe Token: SeDebugPrivilege 2148 taskkill.exe Token: SeDebugPrivilege 3964 taskkill.exe Token: SeIncreaseQuotaPrivilege 4952 wmic.exe Token: SeSecurityPrivilege 4952 wmic.exe Token: SeTakeOwnershipPrivilege 4952 wmic.exe Token: SeLoadDriverPrivilege 4952 wmic.exe Token: SeSystemProfilePrivilege 4952 wmic.exe Token: SeSystemtimePrivilege 4952 wmic.exe Token: SeProfSingleProcessPrivilege 4952 wmic.exe Token: SeIncBasePriorityPrivilege 4952 wmic.exe Token: SeCreatePagefilePrivilege 4952 wmic.exe Token: SeBackupPrivilege 4952 wmic.exe Token: SeRestorePrivilege 4952 wmic.exe Token: SeShutdownPrivilege 4952 wmic.exe Token: SeDebugPrivilege 4952 wmic.exe Token: SeSystemEnvironmentPrivilege 4952 wmic.exe Token: SeRemoteShutdownPrivilege 4952 wmic.exe Token: SeUndockPrivilege 4952 wmic.exe Token: SeManageVolumePrivilege 4952 wmic.exe Token: 33 4952 wmic.exe Token: 34 4952 wmic.exe Token: 35 4952 wmic.exe Token: 36 4952 wmic.exe Token: SeShutdownPrivilege 2184 explorer.exe Token: SeCreatePagefilePrivilege 2184 explorer.exe Token: SeShutdownPrivilege 2184 explorer.exe Token: SeCreatePagefilePrivilege 2184 explorer.exe Token: SeShutdownPrivilege 2184 explorer.exe Token: SeCreatePagefilePrivilege 2184 explorer.exe Token: SeShutdownPrivilege 2184 explorer.exe Token: SeCreatePagefilePrivilege 2184 explorer.exe Token: SeShutdownPrivilege 2184 explorer.exe Token: SeCreatePagefilePrivilege 2184 explorer.exe Token: SeShutdownPrivilege 2184 explorer.exe Token: SeCreatePagefilePrivilege 2184 explorer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe 2184 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3708 wrote to memory of 4456 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 81 PID 3708 wrote to memory of 4456 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 81 PID 3708 wrote to memory of 4456 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 81 PID 3708 wrote to memory of 2296 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 83 PID 3708 wrote to memory of 2296 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 83 PID 3708 wrote to memory of 2296 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 83 PID 3708 wrote to memory of 4268 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 85 PID 3708 wrote to memory of 4268 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 85 PID 3708 wrote to memory of 4268 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 85 PID 3708 wrote to memory of 4336 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 87 PID 3708 wrote to memory of 4336 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 87 PID 3708 wrote to memory of 4336 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 87 PID 3708 wrote to memory of 5020 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 89 PID 3708 wrote to memory of 5020 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 89 PID 3708 wrote to memory of 5020 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 89 PID 3708 wrote to memory of 2556 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 91 PID 3708 wrote to memory of 2556 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 91 PID 3708 wrote to memory of 2556 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 91 PID 3708 wrote to memory of 1860 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 93 PID 3708 wrote to memory of 1860 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 93 PID 3708 wrote to memory of 1860 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 93 PID 3708 wrote to memory of 1600 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 95 PID 3708 wrote to memory of 1600 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 95 PID 3708 wrote to memory of 1600 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 95 PID 3708 wrote to memory of 4140 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 97 PID 3708 wrote to memory of 4140 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 97 PID 3708 wrote to memory of 4140 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 97 PID 3708 wrote to memory of 1184 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 99 PID 3708 wrote to memory of 1184 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 99 PID 3708 wrote to memory of 1184 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 99 PID 3708 wrote to memory of 2224 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 101 PID 3708 wrote to memory of 2224 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 101 PID 3708 wrote to memory of 2224 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 101 PID 3708 wrote to memory of 1828 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 103 PID 3708 wrote to memory of 1828 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 103 PID 3708 wrote to memory of 1828 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 103 PID 3708 wrote to memory of 3808 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 105 PID 3708 wrote to memory of 3808 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 105 PID 3708 wrote to memory of 3808 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 105 PID 3708 wrote to memory of 4948 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 107 PID 3708 wrote to memory of 4948 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 107 PID 3708 wrote to memory of 4948 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 107 PID 3708 wrote to memory of 2148 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 109 PID 3708 wrote to memory of 2148 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 109 PID 3708 wrote to memory of 2148 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 109 PID 3708 wrote to memory of 3964 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 111 PID 3708 wrote to memory of 3964 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 111 PID 3708 wrote to memory of 3964 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 111 PID 3708 wrote to memory of 4292 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 113 PID 3708 wrote to memory of 4292 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 113 PID 3708 wrote to memory of 4292 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 113 PID 4292 wrote to memory of 4828 4292 net.exe 115 PID 4292 wrote to memory of 4828 4292 net.exe 115 PID 4292 wrote to memory of 4828 4292 net.exe 115 PID 3708 wrote to memory of 3180 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 116 PID 3708 wrote to memory of 3180 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 116 PID 3708 wrote to memory of 3180 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 116 PID 3180 wrote to memory of 4688 3180 net.exe 118 PID 3180 wrote to memory of 4688 3180 net.exe 118 PID 3180 wrote to memory of 4688 3180 net.exe 118 PID 3708 wrote to memory of 4296 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 119 PID 3708 wrote to memory of 4296 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 119 PID 3708 wrote to memory of 4296 3708 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 119 PID 4296 wrote to memory of 3940 4296 net.exe 121 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe"C:\Users\Admin\AppData\Local\Temp\c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3708 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlbrowser.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlwriter.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlservr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im msmdsrv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im MsDtsSrvr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlceip.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im fdlauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im Ssms.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im SQLAGENT.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im fdhost.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im fdlauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlservr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im ReportingServicesService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im msftesql.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im pg_ctl.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im postgres.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper1002⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper1003⤵PID:4828
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$ISARS2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$ISARS3⤵PID:4688
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$MSFW2⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$MSFW3⤵PID:3940
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$ISARS2⤵PID:4124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$ISARS3⤵PID:4308
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$MSFW2⤵PID:1680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$MSFW3⤵PID:3388
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser2⤵PID:4708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser3⤵PID:2352
-
-
-
C:\Windows\SysWOW64\net.exenet stop ReportServer$ISARS2⤵PID:1732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$ISARS3⤵PID:776
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter2⤵PID:4080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter3⤵PID:2960
-
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\SysWOW64\cipher.execipher /w:A:2⤵
- Enumerates connected drives
PID:1956
-
-
C:\Windows\SysWOW64\cipher.execipher /w:B:2⤵
- Enumerates connected drives
PID:2676
-
-
C:\Windows\SysWOW64\cipher.execipher /w:H:2⤵
- Enumerates connected drives
PID:1464
-
-
C:\Windows\SysWOW64\cipher.execipher /w:G:2⤵
- Enumerates connected drives
PID:4580
-
-
C:\Windows\SysWOW64\cipher.execipher /w:E:2⤵
- Enumerates connected drives
PID:4864
-
-
C:\Windows\SysWOW64\cipher.execipher /w:F:2⤵
- Enumerates connected drives
PID:1600
-
-
C:\Windows\SysWOW64\cipher.execipher /w:C:2⤵PID:1132
-
-
C:\Windows\SysWOW64\cipher.execipher /w:I:2⤵
- Enumerates connected drives
PID:3448
-
-
C:\Windows\SysWOW64\cipher.execipher /w:J:2⤵
- Enumerates connected drives
PID:4936
-
-
C:\Windows\SysWOW64\cipher.execipher /w:K:2⤵
- Enumerates connected drives
PID:2612
-
-
C:\Windows\SysWOW64\cipher.execipher /w:L:2⤵
- Enumerates connected drives
PID:4948
-
-
C:\Windows\SysWOW64\cipher.execipher /w:N:2⤵
- Enumerates connected drives
PID:4604
-
-
C:\Windows\SysWOW64\cipher.execipher /w:O:2⤵
- Enumerates connected drives
PID:2148
-
-
C:\Windows\SysWOW64\cipher.execipher /w:Q:2⤵
- Enumerates connected drives
PID:740
-
-
C:\Windows\SysWOW64\cipher.execipher /w:P:2⤵
- Enumerates connected drives
PID:1284
-
-
C:\Windows\SysWOW64\cipher.execipher /w:M:2⤵
- Enumerates connected drives
PID:480
-
-
C:\Windows\SysWOW64\cipher.execipher /w:R:2⤵
- Enumerates connected drives
PID:2520
-
-
C:\Windows\SysWOW64\cipher.execipher /w:S:2⤵
- Enumerates connected drives
PID:2336
-
-
C:\Windows\SysWOW64\cipher.execipher /w:T:2⤵
- Enumerates connected drives
PID:1972
-
-
C:\Windows\SysWOW64\cipher.execipher /w:U:2⤵
- Enumerates connected drives
PID:3536
-
-
C:\Windows\SysWOW64\cipher.execipher /w:W:2⤵
- Enumerates connected drives
PID:552
-
-
C:\Windows\SysWOW64\cipher.execipher /w:Z:2⤵
- Enumerates connected drives
PID:1420
-
-
C:\Windows\SysWOW64\cipher.execipher /w:X:2⤵
- Enumerates connected drives
PID:4172
-
-
C:\Windows\SysWOW64\cipher.execipher /w:Y:2⤵
- Enumerates connected drives
PID:3188
-
-
C:\Windows\SysWOW64\cipher.execipher /w:V:2⤵
- Enumerates connected drives
PID:4124
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 1272 -ip 12721⤵PID:3632
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1272 -s 30441⤵
- Program crash
PID:1100
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2184 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2184 -s 22722⤵
- Program crash
PID:3572
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 184 -p 2184 -ip 21841⤵PID:312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.bulwark4
Filesize624KB
MD5adef2d9c21b8af0447288add8507f6fb
SHA1fae3acdc4eafa17746a07f976dbee629008c7089
SHA256dc4cca40cb6abb03ddbc802477fe894c6386024b6e60abff150759d8d8803f6b
SHA5128286e27662ec32517eed741a95165a0a8f5b6dfca4216b1a88f647b9d3d93b0fb1169c69dc6cebebe1ed8117f5b45203ae9cbaf020abe9b3c8666f671e17591e