Analysis
-
max time kernel
150s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/01/2023, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Resource
win10v2004-20221111-en
General
-
Target
3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
-
Size
347KB
-
MD5
dafc8e7ccd381af36f19267a2a9b3f9b
-
SHA1
742c9021f4f0fb264c32a59a66e3ac514b8e166b
-
SHA256
3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
-
SHA512
70779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
SSDEEP
6144:58CS6KWJ0XJWcPZ1PiqbeiS8XDMs9HHCUA:KC9IgWrPiN0YEHHFA
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
pid Process 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1432 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\AssertSelect.crw => C:\Users\Admin\Pictures\AssertSelect.crw.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File renamed C:\Users\Admin\Pictures\HideRestore.tif => C:\Users\Admin\Pictures\HideRestore.tif.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File opened for modification C:\Users\Admin\Pictures\MergeResolve.tiff 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File opened for modification C:\Users\Admin\Pictures\ProtectEnter.tiff 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File renamed C:\Users\Admin\Pictures\ProtectEnter.tiff => C:\Users\Admin\Pictures\ProtectEnter.tiff.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File renamed C:\Users\Admin\Pictures\ConnectPublish.raw => C:\Users\Admin\Pictures\ConnectPublish.raw.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File renamed C:\Users\Admin\Pictures\MergeResolve.tiff => C:\Users\Admin\Pictures\MergeResolve.tiff.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File renamed C:\Users\Admin\Pictures\SaveConvertFrom.crw => C:\Users\Admin\Pictures\SaveConvertFrom.crw.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File renamed C:\Users\Admin\Pictures\SelectStart.raw => C:\Users\Admin\Pictures\SelectStart.raw.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File renamed C:\Users\Admin\Pictures\SendExpand.png => C:\Users\Admin\Pictures\SendExpand.png.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe -
Loads dropped DLL 3 IoCs
pid Process 1228 cmd.exe 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1432 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe -
Drops desktop.ini file(s) 6 IoCs
description ioc Process File created C:\Users\Admin\Pictures\desktop.ini 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File created C:\Users\Admin\Desktop\desktop.ini 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File created C:\Users\Admin\Downloads\desktop.ini 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File created C:\Users\Admin\Pictures\desktop.ini 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File created C:\Users\Admin\Desktop\desktop.ini 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe File created C:\Users\Admin\Downloads\desktop.ini 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 536 set thread context of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 1468 set thread context of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1432 set thread context of 1892 1432 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 848 vssadmin.exe 956 vssadmin.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe %1" 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe %1" 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.ecrp 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.ecrp\shell\open\command 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.ecrp\shell 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.ecrp\shell\open 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2036 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe Token: SeBackupPrivilege 268 vssvc.exe Token: SeRestorePrivilege 268 vssvc.exe Token: SeAuditPrivilege 268 vssvc.exe Token: SeDebugPrivilege 1892 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 536 wrote to memory of 1956 536 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 28 PID 1956 wrote to memory of 1228 1956 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 29 PID 1956 wrote to memory of 1228 1956 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 29 PID 1956 wrote to memory of 1228 1956 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 29 PID 1956 wrote to memory of 1228 1956 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 29 PID 1228 wrote to memory of 1076 1228 cmd.exe 31 PID 1228 wrote to memory of 1076 1228 cmd.exe 31 PID 1228 wrote to memory of 1076 1228 cmd.exe 31 PID 1228 wrote to memory of 1076 1228 cmd.exe 31 PID 1228 wrote to memory of 2036 1228 cmd.exe 32 PID 1228 wrote to memory of 2036 1228 cmd.exe 32 PID 1228 wrote to memory of 2036 1228 cmd.exe 32 PID 1228 wrote to memory of 2036 1228 cmd.exe 32 PID 1228 wrote to memory of 320 1228 cmd.exe 33 PID 1228 wrote to memory of 320 1228 cmd.exe 33 PID 1228 wrote to memory of 320 1228 cmd.exe 33 PID 1228 wrote to memory of 320 1228 cmd.exe 33 PID 1228 wrote to memory of 1468 1228 cmd.exe 34 PID 1228 wrote to memory of 1468 1228 cmd.exe 34 PID 1228 wrote to memory of 1468 1228 cmd.exe 34 PID 1228 wrote to memory of 1468 1228 cmd.exe 34 PID 1228 wrote to memory of 1468 1228 cmd.exe 34 PID 1228 wrote to memory of 1468 1228 cmd.exe 34 PID 1228 wrote to memory of 1468 1228 cmd.exe 34 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1468 wrote to memory of 1896 1468 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 35 PID 1896 wrote to memory of 1228 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 40 PID 1896 wrote to memory of 1228 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 40 PID 1896 wrote to memory of 1228 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 40 PID 1896 wrote to memory of 1228 1896 3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe 40 PID 1228 wrote to memory of 1028 1228 cmd.exe 42 PID 1228 wrote to memory of 1028 1228 cmd.exe 42 PID 1228 wrote to memory of 1028 1228 cmd.exe 42 PID 1228 wrote to memory of 1028 1228 cmd.exe 42 PID 1228 wrote to memory of 848 1228 cmd.exe 43 PID 1228 wrote to memory of 848 1228 cmd.exe 43 PID 1228 wrote to memory of 848 1228 cmd.exe 43 PID 1228 wrote to memory of 848 1228 cmd.exe 43 PID 1760 wrote to memory of 1432 1760 taskeng.exe 46 PID 1760 wrote to memory of 1432 1760 taskeng.exe 46 PID 1760 wrote to memory of 1432 1760 taskeng.exe 46 PID 1760 wrote to memory of 1432 1760 taskeng.exe 46 PID 1760 wrote to memory of 1432 1760 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"C:\Users\Admin\AppData\Local\Temp\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"C:\Users\Admin\AppData\Local\Temp\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1076
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:2036
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:320
-
-
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"5⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet6⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:1028
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:848
-
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
C:\Windows\system32\taskeng.exetaskeng.exe {E0F17793-7931-454E-8456-566B48E31149} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exeC:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1432 -
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet4⤵PID:1708
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:432
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:956
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
C:\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
\Users\Admin\AppData\Local\ServiceHub\3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf.exe
Filesize347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e