Analysis
-
max time kernel
135s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 08:19
Static task
static1
Behavioral task
behavioral1
Sample
Yvbhq.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Yvbhq.exe
Resource
win10v2004-20220812-en
General
-
Target
Yvbhq.exe
-
Size
65KB
-
MD5
9829cba45d96db58f0898ad58743a474
-
SHA1
a3f4827d0523dac0c56e91b4538bdcf14c36570f
-
SHA256
19d2e3e1f912a1fe23399b0a1c150e28e03ef0cff5dfb7d2d532f705769862b5
-
SHA512
bd4d6431ca4315ad21a1094594ca0cb68a5cca689b64b73876045e468d1ba1c03d6845b444d2936ea50e71438b44ef65fdd74ca22d2339472f2f6e53be90cd8a
-
SSDEEP
1536:pmV+3Z/ZBJEomaAsurFk5ZjXx+plbfP9HPe0/v7WYPwoMkeT1eK6G:I+JtEomapYFk5ZsFP9HmelqT1N6G
Malware Config
Signatures
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Yvbhq.exedescription ioc process File renamed C:\Users\Admin\Pictures\LimitWait.png => C:\Users\Admin\Pictures\LimitWait.png.zxs Yvbhq.exe File opened for modification C:\Users\Admin\Pictures\ResumeEnter.tiff Yvbhq.exe File renamed C:\Users\Admin\Pictures\UseRestore.raw => C:\Users\Admin\Pictures\UseRestore.raw.zxs Yvbhq.exe File renamed C:\Users\Admin\Pictures\GrantFind.tif => C:\Users\Admin\Pictures\GrantFind.tif.zxs Yvbhq.exe File renamed C:\Users\Admin\Pictures\NewUnblock.raw => C:\Users\Admin\Pictures\NewUnblock.raw.zxs Yvbhq.exe File renamed C:\Users\Admin\Pictures\OutCompress.raw => C:\Users\Admin\Pictures\OutCompress.raw.zxs Yvbhq.exe File opened for modification C:\Users\Admin\Pictures\PingWatch.tiff Yvbhq.exe File renamed C:\Users\Admin\Pictures\PingWatch.tiff => C:\Users\Admin\Pictures\PingWatch.tiff.zxs Yvbhq.exe File renamed C:\Users\Admin\Pictures\RemoveStep.raw => C:\Users\Admin\Pictures\RemoveStep.raw.zxs Yvbhq.exe File renamed C:\Users\Admin\Pictures\ResumeEnter.tiff => C:\Users\Admin\Pictures\ResumeEnter.tiff.zxs Yvbhq.exe File renamed C:\Users\Admin\Pictures\CloseImport.raw => C:\Users\Admin\Pictures\CloseImport.raw.zxs Yvbhq.exe -
Stops running service(s) 3 TTPs
-
Drops startup file 2 IoCs
Processes:
Yvbhq.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Yvbhq.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\#README#.txt Yvbhq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Yvbhq.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yvbhq = "C:\\Users\\Admin\\AppData\\Roaming\\HHN\\Yvbhq.exe" Yvbhq.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
Yvbhq.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Yvbhq.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Music\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\465H0QEB\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TNJRVQ2J\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Documents\desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NFAXYLRV\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Links\desktop.ini Yvbhq.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Videos\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Yvbhq.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\desktop.ini Yvbhq.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\YZA8LC25\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Yvbhq.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Yvbhq.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Yvbhq.exe File opened for modification C:\Program Files\desktop.ini Yvbhq.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B3RNYR1O\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Yvbhq.exe File opened for modification C:\Program Files (x86)\desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\16ZRL8F2\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Yvbhq.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Yvbhq.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Yvbhq.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Yvbhq.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Yvbhq.exe File opened for modification C:\Users\Public\desktop.ini Yvbhq.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Yvbhq.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Yvbhq.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\mc.jar Yvbhq.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\abcpy.ini Yvbhq.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\oledb32r.dll.mui Yvbhq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\icudtl.dat Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_ja_4.4.0.v20140623020002.jar Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPCORE.DLL Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PROGRAM.DPV Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\deploy.dll Yvbhq.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\#README#.txt Yvbhq.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT.DLL Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Petersburg Yvbhq.exe File opened for modification C:\Program Files\Java\jre7\bin\gstreamer-lite.dll Yvbhq.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\#README#.txt Yvbhq.exe File created C:\Program Files\Microsoft Games\More Games\ja-JP\#README#.txt Yvbhq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\settings.css Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199661.WMF Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14982_.GIF Yvbhq.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_pressed.png Yvbhq.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\TitleButtonIcon.png Yvbhq.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe Yvbhq.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\#README#.txt Yvbhq.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_smem_plugin.dll Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPPT.OLB Yvbhq.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Utilities.v3.5.resources.dll Yvbhq.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libpva_plugin.dll Yvbhq.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FBIBLIO.DLL Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341738.JPG Yvbhq.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.IdentityModel.Resources.dll Yvbhq.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\#README#.txt Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199036.WMF Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\SLINTL.DLL Yvbhq.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-desk.png Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-execution.jar Yvbhq.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmplayer.exe.mui Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387337.JPG Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00921_.WMF Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0177257.JPG Yvbhq.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt Yvbhq.exe File created C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\#README#.txt Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\jaccess.jar Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00810_.WMF Yvbhq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pl.pak Yvbhq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\calendar.css Yvbhq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_top_left.png Yvbhq.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\#README#.txt Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE06049_.WMF Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECRECS.ICO Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-multitabs.xml Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-application-views.xml Yvbhq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\service.js Yvbhq.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\#README#.txt Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03425I.JPG Yvbhq.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Hermosillo Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_COL.HXC Yvbhq.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml Yvbhq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\ij Yvbhq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_windy.png Yvbhq.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.EPS Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03731_.WMF Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03143I.JPG Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\TexturedBlue.css Yvbhq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKDECL.ICO Yvbhq.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 524 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 2 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Yvbhq.exepid process 1544 Yvbhq.exe 1544 Yvbhq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Yvbhq.exedescription pid process Token: SeDebugPrivilege 1544 Yvbhq.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
Yvbhq.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1544 wrote to memory of 840 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 840 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 840 1544 Yvbhq.exe cmd.exe PID 840 wrote to memory of 524 840 cmd.exe sc.exe PID 840 wrote to memory of 524 840 cmd.exe sc.exe PID 840 wrote to memory of 524 840 cmd.exe sc.exe PID 1544 wrote to memory of 1112 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 1112 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 1112 1544 Yvbhq.exe cmd.exe PID 1112 wrote to memory of 332 1112 cmd.exe net.exe PID 1112 wrote to memory of 332 1112 cmd.exe net.exe PID 1112 wrote to memory of 332 1112 cmd.exe net.exe PID 1544 wrote to memory of 472 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 472 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 472 1544 Yvbhq.exe cmd.exe PID 472 wrote to memory of 320 472 cmd.exe net.exe PID 472 wrote to memory of 320 472 cmd.exe net.exe PID 472 wrote to memory of 320 472 cmd.exe net.exe PID 1544 wrote to memory of 1912 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 1912 1544 Yvbhq.exe cmd.exe PID 1544 wrote to memory of 1912 1544 Yvbhq.exe cmd.exe PID 1912 wrote to memory of 1916 1912 cmd.exe net.exe PID 1912 wrote to memory of 1916 1912 cmd.exe net.exe PID 1912 wrote to memory of 1916 1912 cmd.exe net.exe PID 1544 wrote to memory of 1744 1544 Yvbhq.exe NOTEPAD.EXE PID 1544 wrote to memory of 1744 1544 Yvbhq.exe NOTEPAD.EXE PID 1544 wrote to memory of 1744 1544 Yvbhq.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yvbhq.exe"C:\Users\Admin\AppData\Local\Temp\Yvbhq.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /C sc delete VSS2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc delete VSS3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exe"cmd.exe" /C NET VIEW2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exeNET VIEW3⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.exe"cmd.exe" /C NET USE2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exeNET USE3⤵
-
C:\Windows\system32\cmd.exe"cmd.exe" /C NET VIEW \\RYNKSFQE2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exeNET VIEW \\RYNKSFQE3⤵
- Discovers systems in the same network
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\#README#.txt2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\desktop.iniFilesize
203B
MD56c28e539b6a2aed65c2a0d68752a063f
SHA103882709eb28cf277b2bcee22563d36df98fa8e5
SHA256be0f89ef3bf43540b04edeef2ed0bd86a6a1bb97d535eda5c65f869659472a22
SHA512a9d75e4d0502ba99783240d98283618f315cc798cdc575e8e2f468db935db92260fe263f72d895bb0c5711c50fe9674bb61af08e1b47aa4119302da5b79a2f2f
-
C:\Users\Admin\AppData\Local\Temp\#README#.txtFilesize
2KB
MD5bb62ec7a63e5753ce7f6df005ed80c40
SHA12d22c38455a23a911e87f1c7eda6cf7f68396c67
SHA256b99b2de92232164524ace2b2bf3573351c65196572650902ea77b84c36310811
SHA51221a31235ecde657f9831d5d919168dcab45f041563a5f4e9978734f6a1c835488d1035bb989891f9f14ca7ee8468893af68cd5ace0bc0d4b12b2606e5409703e
-
memory/320-62-0x0000000000000000-mapping.dmp
-
memory/332-60-0x0000000000000000-mapping.dmp
-
memory/472-61-0x0000000000000000-mapping.dmp
-
memory/524-58-0x0000000000000000-mapping.dmp
-
memory/840-57-0x0000000000000000-mapping.dmp
-
memory/1112-59-0x0000000000000000-mapping.dmp
-
memory/1544-54-0x0000000001280000-0x0000000001296000-memory.dmpFilesize
88KB
-
memory/1544-56-0x00000000005E0000-0x00000000005E6000-memory.dmpFilesize
24KB
-
memory/1544-55-0x00000000002C0000-0x00000000002DC000-memory.dmpFilesize
112KB
-
memory/1744-66-0x0000000000000000-mapping.dmp
-
memory/1744-67-0x000007FEFBB71000-0x000007FEFBB73000-memory.dmpFilesize
8KB
-
memory/1912-63-0x0000000000000000-mapping.dmp
-
memory/1916-64-0x0000000000000000-mapping.dmp