Analysis
-
max time kernel
40s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/01/2023, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe
Resource
win10v2004-20220812-en
General
-
Target
d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe
-
Size
779KB
-
MD5
ff660cfc3188548169fb503f22ec7333
-
SHA1
a9f496bc96e2375a713a1664162b3556f62bd966
-
SHA256
d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2
-
SHA512
e0a093cf807b1d0683a78376636a3a1f5efd16f88d720bb9038894d851b097f9c5b20dfbdfc2ebc2cb61b851114e6b428894e6ea6624e1fc982fc98ad62c4470
-
SSDEEP
24576:WKGiLkFAQ6LNAQfcLovuwCzSb8bcSaV1:W22hwNAZcvuwvJR
Malware Config
Extracted
djvu
http://spaceris.com/test1/get.php
-
extension
.poqw
-
offline_id
ZMk7348t4yGVy3t2uxofhOwYXOGjluI9PiRO8dt1
-
payload_url
http://uaery.top/dl/build2.exe
http://spaceris.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-GTrvfBi8hs Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0632JOsie
Extracted
vidar
2
19
https://t.me/tgdatapacks
https://steamcommunity.com/profiles/76561199469677637
-
profile_id
19
Signatures
-
Detected Djvu ransomware 10 IoCs
resource yara_rule behavioral1/memory/1972-56-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/1972-55-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1944-59-0x0000000004480000-0x000000000459B000-memory.dmp family_djvu behavioral1/memory/1972-61-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1972-62-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1972-66-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/748-69-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/748-73-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/748-80-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/748-106-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1556 build2.exe 964 build2.exe 432 build3.exe 1704 mstsca.exe -
Loads dropped DLL 4 IoCs
pid Process 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1780 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\42dba92c-22fe-4550-b042-3fca288bc225\\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe\" --AutoStart" d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.2ip.ua 4 api.2ip.ua 12 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1944 set thread context of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1184 set thread context of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1556 set thread context of 964 1556 build2.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1724 schtasks.exe 1988 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1944 wrote to memory of 1972 1944 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 26 PID 1972 wrote to memory of 1780 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 29 PID 1972 wrote to memory of 1780 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 29 PID 1972 wrote to memory of 1780 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 29 PID 1972 wrote to memory of 1780 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 29 PID 1972 wrote to memory of 1184 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 30 PID 1972 wrote to memory of 1184 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 30 PID 1972 wrote to memory of 1184 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 30 PID 1972 wrote to memory of 1184 1972 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 30 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 1184 wrote to memory of 748 1184 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 31 PID 748 wrote to memory of 1556 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 32 PID 748 wrote to memory of 1556 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 32 PID 748 wrote to memory of 1556 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 32 PID 748 wrote to memory of 1556 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 32 PID 748 wrote to memory of 432 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 33 PID 748 wrote to memory of 432 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 33 PID 748 wrote to memory of 432 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 33 PID 748 wrote to memory of 432 748 d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe 33 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 1556 wrote to memory of 964 1556 build2.exe 34 PID 432 wrote to memory of 1724 432 build3.exe 36 PID 432 wrote to memory of 1724 432 build3.exe 36 PID 432 wrote to memory of 1724 432 build3.exe 36 PID 432 wrote to memory of 1724 432 build3.exe 36 PID 1692 wrote to memory of 1704 1692 taskeng.exe 39 PID 1692 wrote to memory of 1704 1692 taskeng.exe 39 PID 1692 wrote to memory of 1704 1692 taskeng.exe 39 PID 1692 wrote to memory of 1704 1692 taskeng.exe 39 PID 1704 wrote to memory of 1988 1704 mstsca.exe 40 PID 1704 wrote to memory of 1988 1704 mstsca.exe 40 PID 1704 wrote to memory of 1988 1704 mstsca.exe 40 PID 1704 wrote to memory of 1988 1704 mstsca.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe"C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe"C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\42dba92c-22fe-4550-b042-3fca288bc225" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe"C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe"C:\Users\Admin\AppData\Local\Temp\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\6545d483-55d3-4688-ac24-99271b098204\build2.exe"C:\Users\Admin\AppData\Local\6545d483-55d3-4688-ac24-99271b098204\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\6545d483-55d3-4688-ac24-99271b098204\build2.exe"C:\Users\Admin\AppData\Local\6545d483-55d3-4688-ac24-99271b098204\build2.exe"6⤵
- Executes dropped EXE
PID:964
-
-
-
C:\Users\Admin\AppData\Local\6545d483-55d3-4688-ac24-99271b098204\build3.exe"C:\Users\Admin\AppData\Local\6545d483-55d3-4688-ac24-99271b098204\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:1724
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E16B9F3D-0542-47C6-858C-105B417CF702} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5601b920be0ad16def87b9ec3e1a91938
SHA1aba2e6c5da479ff7380f714a8536bd9a9cdec729
SHA2562ba194594a0d55b2bc4efc4b8eb5432b2788e1eb7192b83326fcdca28e9ce2b8
SHA5121b91d61b37d9276967f0940e81fd844a9295bac488a9923dfcfd586175597e4573d8817dbf711808a5dad7d32e21b953c872501f23b39051b1332ee174f7e387
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD55ab2ae90a7737ff9868f2cd67b2a4480
SHA1c1bb6d9a6785587ec61f8c72302ddfc3dd36cdc3
SHA256a5d983b7cbbc88ca9947355648a78593a6f1fe31f8bee558641213b00e8d5d84
SHA512c82df76e226c5c395cacdd26ee1924f7b80c90c35397cd37aa32dc8d2bf36cb262fd76771db30cfee533d3eb79e9c77a8bc076c82b716c0bcc5f739495716822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5e0c66c51d39f5224266319627e98f603
SHA19368da73fcc3ff3becc3f19544ff7b964fbaf753
SHA256c9216bb5b5662dbd2d57831ff15976384ca65af69a95c1ffd381c97d53cfe11f
SHA51227f8b0aadb3787d355e768e2df5e9df95e301ff97efcf438f200688129306fe836d37cd5cb3c351d24cbde85e8d37d4dea494d7beb903cab090b267189fd87a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd3e4d544ae32021d113598d3c93b34
SHA16e06b6e0e5a224d14d96c4e48d434cfb2b0a31e5
SHA256adde83a0fa71c3119ea858fdf1a740b73cfe76016741307f404984926a465b67
SHA51287592da2ea139c16e663e8902849f788c10941456f79fd40193947759b1e674f7c60f0ecb43f9802aada8b35b46c5f9366b4fe0afce532e9debc8f7e26ac19cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD51c97d28fb59789bb9f918099807940b1
SHA15fe8435c96f1124c8e31c908ef05f7904ac7e779
SHA25658c5aeeee3c1bde9bd76e597b55bb2d635d083ec861e66ae799d78dad1a6bb24
SHA512587dd3b4ffcbc9322c506cbba6018a680ed8f053137dfcc0cd04439e5885cd6c2661535272ef110ad5ec5b14e0ec4c07c39ca987039eed272cc937d954957af2
-
C:\Users\Admin\AppData\Local\42dba92c-22fe-4550-b042-3fca288bc225\d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2.exe
Filesize779KB
MD5ff660cfc3188548169fb503f22ec7333
SHA1a9f496bc96e2375a713a1664162b3556f62bd966
SHA256d373a6246bccff072df5fbdc5f53fe93acd3a2776fa02e377910bc4ea6b02fb2
SHA512e0a093cf807b1d0683a78376636a3a1f5efd16f88d720bb9038894d851b097f9c5b20dfbdfc2ebc2cb61b851114e6b428894e6ea6624e1fc982fc98ad62c4470
-
Filesize
422KB
MD5866933fee5234be619d89a6d6a60bd88
SHA1fd279d026264dbb75ea46be965ea163d94d67f0c
SHA256ab6396ad69a961a9f879e58725ed66fa01f7add478b61cbaf4db1f26a9e47185
SHA512fab7b9cfa5c38cff35068334b8525fcc1c6a5ca694f379db3322fc1bd8df9bbfa3446504297fec4c42c55e805fee2be9f96a3eff8eed7db72816a080aff7933d
-
Filesize
422KB
MD5866933fee5234be619d89a6d6a60bd88
SHA1fd279d026264dbb75ea46be965ea163d94d67f0c
SHA256ab6396ad69a961a9f879e58725ed66fa01f7add478b61cbaf4db1f26a9e47185
SHA512fab7b9cfa5c38cff35068334b8525fcc1c6a5ca694f379db3322fc1bd8df9bbfa3446504297fec4c42c55e805fee2be9f96a3eff8eed7db72816a080aff7933d
-
Filesize
422KB
MD5866933fee5234be619d89a6d6a60bd88
SHA1fd279d026264dbb75ea46be965ea163d94d67f0c
SHA256ab6396ad69a961a9f879e58725ed66fa01f7add478b61cbaf4db1f26a9e47185
SHA512fab7b9cfa5c38cff35068334b8525fcc1c6a5ca694f379db3322fc1bd8df9bbfa3446504297fec4c42c55e805fee2be9f96a3eff8eed7db72816a080aff7933d
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
422KB
MD5866933fee5234be619d89a6d6a60bd88
SHA1fd279d026264dbb75ea46be965ea163d94d67f0c
SHA256ab6396ad69a961a9f879e58725ed66fa01f7add478b61cbaf4db1f26a9e47185
SHA512fab7b9cfa5c38cff35068334b8525fcc1c6a5ca694f379db3322fc1bd8df9bbfa3446504297fec4c42c55e805fee2be9f96a3eff8eed7db72816a080aff7933d
-
Filesize
422KB
MD5866933fee5234be619d89a6d6a60bd88
SHA1fd279d026264dbb75ea46be965ea163d94d67f0c
SHA256ab6396ad69a961a9f879e58725ed66fa01f7add478b61cbaf4db1f26a9e47185
SHA512fab7b9cfa5c38cff35068334b8525fcc1c6a5ca694f379db3322fc1bd8df9bbfa3446504297fec4c42c55e805fee2be9f96a3eff8eed7db72816a080aff7933d
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a