Analysis
-
max time kernel
153s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 13:52
Static task
static1
Behavioral task
behavioral1
Sample
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe
Resource
win10v2004-20220901-en
General
-
Target
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe
-
Size
396KB
-
MD5
52ec44494fed2c9bebd5ce99903b7775
-
SHA1
6191526cf35f080922830412c795df4fed5f8696
-
SHA256
a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724
-
SHA512
100a3704d165eda1c8ac9e17c593934e76fe947971e8a9cf6dacbf7304927bd103cda0ae82f1e87530548a0b1832476277c493738bdf421e2e8c1ced7fca2ad7
-
SSDEEP
6144:Q0sTdSkul5CpfZsu43jx0HdEouuj5axxn7JCpIKxZU/bc92A6mJOl:FG7pfZsu43d0HdEFuj5EpNbWAcsoOl
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\_RECoVERY_+wdwld.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/7387685FD14E526
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/7387685FD14E526
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/7387685FD14E526
http://xlowfznrg4wf7dli.ONION/7387685FD14E526
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1096 rcnngqwyufhg.exe -
Deletes itself 1 IoCs
pid Process 840 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run rcnngqwyufhg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lmdvcankavhf = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\rcnngqwyufhg.exe\"" rcnngqwyufhg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\de-DE\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_up.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\settings.css rcnngqwyufhg.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows NT\TableTextService\de-DE\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\drag.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\Services\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-highlight.png rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows NT\TableTextService\es-ES\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_RGB6_PAL.wmv rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationLeft_ButtonGraphic.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_RECoVERY_+wdwld.html rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dial.png rcnngqwyufhg.exe File opened for modification C:\Program Files\Java\jre7\_RECoVERY_+wdwld.txt rcnngqwyufhg.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_RECoVERY_+wdwld.png rcnngqwyufhg.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_RECoVERY_+wdwld.html rcnngqwyufhg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rcnngqwyufhg.exe a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe File opened for modification C:\Windows\rcnngqwyufhg.exe a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 rcnngqwyufhg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e rcnngqwyufhg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 rcnngqwyufhg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe 1096 rcnngqwyufhg.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe Token: SeDebugPrivilege 1096 rcnngqwyufhg.exe Token: SeIncreaseQuotaPrivilege 560 WMIC.exe Token: SeSecurityPrivilege 560 WMIC.exe Token: SeTakeOwnershipPrivilege 560 WMIC.exe Token: SeLoadDriverPrivilege 560 WMIC.exe Token: SeSystemProfilePrivilege 560 WMIC.exe Token: SeSystemtimePrivilege 560 WMIC.exe Token: SeProfSingleProcessPrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 560 WMIC.exe Token: SeBackupPrivilege 560 WMIC.exe Token: SeRestorePrivilege 560 WMIC.exe Token: SeShutdownPrivilege 560 WMIC.exe Token: SeDebugPrivilege 560 WMIC.exe Token: SeSystemEnvironmentPrivilege 560 WMIC.exe Token: SeRemoteShutdownPrivilege 560 WMIC.exe Token: SeUndockPrivilege 560 WMIC.exe Token: SeManageVolumePrivilege 560 WMIC.exe Token: 33 560 WMIC.exe Token: 34 560 WMIC.exe Token: 35 560 WMIC.exe Token: SeIncreaseQuotaPrivilege 560 WMIC.exe Token: SeSecurityPrivilege 560 WMIC.exe Token: SeTakeOwnershipPrivilege 560 WMIC.exe Token: SeLoadDriverPrivilege 560 WMIC.exe Token: SeSystemProfilePrivilege 560 WMIC.exe Token: SeSystemtimePrivilege 560 WMIC.exe Token: SeProfSingleProcessPrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 560 WMIC.exe Token: SeBackupPrivilege 560 WMIC.exe Token: SeRestorePrivilege 560 WMIC.exe Token: SeShutdownPrivilege 560 WMIC.exe Token: SeDebugPrivilege 560 WMIC.exe Token: SeSystemEnvironmentPrivilege 560 WMIC.exe Token: SeRemoteShutdownPrivilege 560 WMIC.exe Token: SeUndockPrivilege 560 WMIC.exe Token: SeManageVolumePrivilege 560 WMIC.exe Token: 33 560 WMIC.exe Token: 34 560 WMIC.exe Token: 35 560 WMIC.exe Token: SeBackupPrivilege 296 vssvc.exe Token: SeRestorePrivilege 296 vssvc.exe Token: SeAuditPrivilege 296 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1096 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 26 PID 1976 wrote to memory of 1096 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 26 PID 1976 wrote to memory of 1096 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 26 PID 1976 wrote to memory of 1096 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 26 PID 1976 wrote to memory of 840 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 27 PID 1976 wrote to memory of 840 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 27 PID 1976 wrote to memory of 840 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 27 PID 1976 wrote to memory of 840 1976 a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe 27 PID 1096 wrote to memory of 560 1096 rcnngqwyufhg.exe 29 PID 1096 wrote to memory of 560 1096 rcnngqwyufhg.exe 29 PID 1096 wrote to memory of 560 1096 rcnngqwyufhg.exe 29 PID 1096 wrote to memory of 560 1096 rcnngqwyufhg.exe 29 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" rcnngqwyufhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rcnngqwyufhg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe"C:\Users\Admin\AppData\Local\Temp\a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\rcnngqwyufhg.exeC:\Windows\rcnngqwyufhg.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1096 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A9356D~1.EXE2⤵
- Deletes itself
PID:840
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD552ec44494fed2c9bebd5ce99903b7775
SHA16191526cf35f080922830412c795df4fed5f8696
SHA256a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724
SHA512100a3704d165eda1c8ac9e17c593934e76fe947971e8a9cf6dacbf7304927bd103cda0ae82f1e87530548a0b1832476277c493738bdf421e2e8c1ced7fca2ad7
-
Filesize
396KB
MD552ec44494fed2c9bebd5ce99903b7775
SHA16191526cf35f080922830412c795df4fed5f8696
SHA256a9356dd8568924ba6380fb0c192502cb30b4290cbc7494f9801d8fed4274c724
SHA512100a3704d165eda1c8ac9e17c593934e76fe947971e8a9cf6dacbf7304927bd103cda0ae82f1e87530548a0b1832476277c493738bdf421e2e8c1ced7fca2ad7