Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 16:32
Static task
static1
Behavioral task
behavioral1
Sample
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe
Resource
win10v2004-20220812-en
General
-
Target
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe
-
Size
420KB
-
MD5
3dd401698586fc163555e651596621d5
-
SHA1
d17e5d37d45f60df5b8752e5a44a28de1b70da6b
-
SHA256
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
-
SHA512
23f38597863f70ac1cc73481467513a439792c9186ad27cec1bfa9ca97f7c87cd76c7a5433cde93e29a6c53f8740f41a3c076bb038d84553cb6e16ceb3e06bd2
-
SSDEEP
6144:gQHEannVRVHgyA37acHbkwKSvpruDo+sOJDy/GQoyVHi1i/nEtqhAxFzjtc7Ec6o:dHnVRCyAJKShulPk/GOVHZJcFlc7qUb
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\_RECoVERY_+rtmew.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/CD1030C47803E87
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/CD1030C47803E87
http://yyre45dbvn2nhbefbmh.begumvelic.at/CD1030C47803E87
http://xlowfznrg4wf7dli.ONION/CD1030C47803E87
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
axvpaeufxhbs.exeaxvpaeufxhbs.exepid process 948 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 552 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axvpaeufxhbs.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run axvpaeufxhbs.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ssyjomtuwpvo = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\axvpaeufxhbs.exe\"" axvpaeufxhbs.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exeaxvpaeufxhbs.exedescription pid process target process PID 1536 set thread context of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 948 set thread context of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe -
Drops file in Program Files directory 64 IoCs
Processes:
axvpaeufxhbs.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\te.pak axvpaeufxhbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\selection_subpicture.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluHandle.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\it-IT\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi axvpaeufxhbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sr.pak axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkTSFrame.png axvpaeufxhbs.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\More Games\it-IT\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bn.pak axvpaeufxhbs.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Google\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_blu.css axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\1047x576black.png axvpaeufxhbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Internet Explorer\en-US\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_preferencestyle.css axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\THIRDPARTYLICENSEREADME.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Uninstall Information\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\fr-FR\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Microsoft Office\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_RECoVERY_+rtmew.png axvpaeufxhbs.exe File opened for modification C:\Program Files\DVD Maker\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Google\Chrome\_RECoVERY_+rtmew.txt axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_RECoVERY_+rtmew.html axvpaeufxhbs.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_RECoVERY_+rtmew.png axvpaeufxhbs.exe -
Drops file in Windows directory 2 IoCs
Processes:
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exedescription ioc process File opened for modification C:\Windows\axvpaeufxhbs.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe File created C:\Windows\axvpaeufxhbs.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
axvpaeufxhbs.exepid process 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe 836 axvpaeufxhbs.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exeaxvpaeufxhbs.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe Token: SeDebugPrivilege 836 axvpaeufxhbs.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe Token: SeBackupPrivilege 832 vssvc.exe Token: SeRestorePrivilege 832 vssvc.exe Token: SeAuditPrivilege 832 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exea8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exeaxvpaeufxhbs.exeaxvpaeufxhbs.exedescription pid process target process PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1536 wrote to memory of 1736 1536 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe PID 1736 wrote to memory of 948 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe axvpaeufxhbs.exe PID 1736 wrote to memory of 948 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe axvpaeufxhbs.exe PID 1736 wrote to memory of 948 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe axvpaeufxhbs.exe PID 1736 wrote to memory of 948 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe axvpaeufxhbs.exe PID 1736 wrote to memory of 552 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe cmd.exe PID 1736 wrote to memory of 552 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe cmd.exe PID 1736 wrote to memory of 552 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe cmd.exe PID 1736 wrote to memory of 552 1736 a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe cmd.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 948 wrote to memory of 836 948 axvpaeufxhbs.exe axvpaeufxhbs.exe PID 836 wrote to memory of 2012 836 axvpaeufxhbs.exe WMIC.exe PID 836 wrote to memory of 2012 836 axvpaeufxhbs.exe WMIC.exe PID 836 wrote to memory of 2012 836 axvpaeufxhbs.exe WMIC.exe PID 836 wrote to memory of 2012 836 axvpaeufxhbs.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
axvpaeufxhbs.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System axvpaeufxhbs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" axvpaeufxhbs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe"C:\Users\Admin\AppData\Local\Temp\a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe"C:\Users\Admin\AppData\Local\Temp\a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\axvpaeufxhbs.exeC:\Windows\axvpaeufxhbs.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\axvpaeufxhbs.exeC:\Windows\axvpaeufxhbs.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:836 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A8E6C8~1.EXE3⤵
- Deletes itself
PID:552
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD53dd401698586fc163555e651596621d5
SHA1d17e5d37d45f60df5b8752e5a44a28de1b70da6b
SHA256a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
SHA51223f38597863f70ac1cc73481467513a439792c9186ad27cec1bfa9ca97f7c87cd76c7a5433cde93e29a6c53f8740f41a3c076bb038d84553cb6e16ceb3e06bd2
-
Filesize
420KB
MD53dd401698586fc163555e651596621d5
SHA1d17e5d37d45f60df5b8752e5a44a28de1b70da6b
SHA256a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
SHA51223f38597863f70ac1cc73481467513a439792c9186ad27cec1bfa9ca97f7c87cd76c7a5433cde93e29a6c53f8740f41a3c076bb038d84553cb6e16ceb3e06bd2
-
Filesize
420KB
MD53dd401698586fc163555e651596621d5
SHA1d17e5d37d45f60df5b8752e5a44a28de1b70da6b
SHA256a8e6c87180a0a26dc5e67c02a582625c93331a8623b76a8b948a09a57f181522
SHA51223f38597863f70ac1cc73481467513a439792c9186ad27cec1bfa9ca97f7c87cd76c7a5433cde93e29a6c53f8740f41a3c076bb038d84553cb6e16ceb3e06bd2