Analysis
-
max time kernel
270s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/02/2023, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
tzw_2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tzw_2.exe
Resource
win10v2004-20220812-en
General
-
Target
tzw_2.exe
-
Size
106KB
-
MD5
f1ab4f5cbf5fc72c4033699edadc4622
-
SHA1
858f3f7f656397fcf43ac5ea13d6d4cbe7a5ca11
-
SHA256
c333a0afa8f9c38ff61d3618d8d3c7749e88cbba269c3345706898224da679dd
-
SHA512
e4df529da677f28ce5e44d6756f11d3ea35a4170b1a55e745e8a1e971c136c8d2723d485a4776873a085e9e7efdd5ea6d4360ef75a358984aab0160af7393202
-
SSDEEP
3072:2SXsZZXQm4BbJpVIYbQf91G3im/2Ef07JysgIXvjLg2InA5xNyeyvDhORuARBy1M:vHpVCf/mxeBuARij7b8
Malware Config
Extracted
\??\M:\Boot\cs-CZ\ReadMe.txt
http://tzw7ckhurmxgcpajx6gy57dkrysl2sigfrt6nk4a3rvedfldigtor7ad.onion/?71DYTOJDYT
https://yip.su/2QstD5
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertToUpdate.raw => C:\Users\Admin\Pictures\ConvertToUpdate.raw.TZW tzw_2.exe File renamed C:\Users\Admin\Pictures\DisableDebug.tiff => C:\Users\Admin\Pictures\DisableDebug.tiff.TZW tzw_2.exe File renamed C:\Users\Admin\Pictures\RepairSet.crw => C:\Users\Admin\Pictures\RepairSet.crw.TZW tzw_2.exe File opened for modification C:\Users\Admin\Pictures\AssertCopy.tiff tzw_2.exe File opened for modification C:\Users\Admin\Pictures\DisableDebug.tiff tzw_2.exe File renamed C:\Users\Admin\Pictures\AssertCopy.tiff => C:\Users\Admin\Pictures\AssertCopy.tiff.TZW tzw_2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 48 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini tzw_2.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini tzw_2.exe File opened for modification C:\Program Files (x86)\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\YZA8LC25\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Documents\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini tzw_2.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini tzw_2.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini tzw_2.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini tzw_2.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Videos\desktop.ini tzw_2.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Music\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Libraries\desktop.ini tzw_2.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini tzw_2.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI tzw_2.exe File opened for modification C:\Users\Public\Pictures\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini tzw_2.exe File opened for modification C:\Program Files\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Music\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Downloads\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Videos\desktop.ini tzw_2.exe File opened for modification \??\M:\$RECYCLE.BIN\S-1-5-21-4063495947-34355257-727531523-1000\desktop.ini explorer.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\G2GR9E4N\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Links\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Searches\desktop.ini tzw_2.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\16ZRL8F2\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NFAXYLRV\desktop.ini tzw_2.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Desktop\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Documents\desktop.ini tzw_2.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini tzw_2.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: tzw_2.exe File opened (read-only) \??\J: tzw_2.exe File opened (read-only) \??\K: tzw_2.exe File opened (read-only) \??\M: tzw_2.exe File opened (read-only) \??\Z: tzw_2.exe File opened (read-only) \??\Q: tzw_2.exe File opened (read-only) \??\R: tzw_2.exe File opened (read-only) \??\T: tzw_2.exe File opened (read-only) \??\U: tzw_2.exe File opened (read-only) \??\O: tzw_2.exe File opened (read-only) \??\H: tzw_2.exe File opened (read-only) \??\L: tzw_2.exe File opened (read-only) \??\W: tzw_2.exe File opened (read-only) \??\E: tzw_2.exe File opened (read-only) \??\F: tzw_2.exe File opened (read-only) \??\X: tzw_2.exe File opened (read-only) \??\B: tzw_2.exe File opened (read-only) \??\Y: tzw_2.exe File opened (read-only) \??\P: tzw_2.exe File opened (read-only) \??\A: tzw_2.exe File opened (read-only) \??\S: tzw_2.exe File opened (read-only) \??\G: tzw_2.exe File opened (read-only) \??\V: tzw_2.exe File opened (read-only) \??\N: tzw_2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00685_.WMF tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-modules.xml tzw_2.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2ssv.dll tzw_2.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDIRMV.XML tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\QP.DPV tzw_2.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Managua tzw_2.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0283209.GIF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTaskIconMask.bmp tzw_2.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\45.png tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0281638.WMF tzw_2.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00809_.WMF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR3F.GIF tzw_2.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\timeZones.js tzw_2.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\jfluid-server_zh_CN.jar tzw_2.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_rgb_mmx_plugin.dll tzw_2.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\custom.lua tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00417_.WMF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKWord.dll tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00487_.WMF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\INVITE.DPV tzw_2.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\Microsoft.Build.Engine.resources.dll tzw_2.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_ja_4.4.0.v20140623020002.jar tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR40F.GIF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange.css tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\charsets.jar tzw_2.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105332.WMF tzw_2.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml tzw_2.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL01041_.WMF tzw_2.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcer.dll.mui tzw_2.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\DELETE.GIF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105266.WMF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387337.JPG tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe tzw_2.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.png tzw_2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_joined.gif tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107138.WMF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199303.WMF tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15136_.GIF tzw_2.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\settings.html tzw_2.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_selectionsubpicture.png tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css tzw_2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.lng tzw_2.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-filesystem-l1-1-0.dll tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV_COL.HXC tzw_2.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Yekaterinburg tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02756U.BMP tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher_1.3.0.v20140911-0143.jar tzw_2.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\ReadMe.txt tzw_2.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_zh_HK.properties tzw_2.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui tzw_2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_spellcheck.gif tzw_2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sampler_zh_CN.jar tzw_2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe explorer.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe 1496 tzw_2.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1680 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe Token: SeShutdownPrivilege 1984 explorer.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe -
Suspicious use of SendNotifyMessage 49 IoCs
pid Process 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1680 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe 1984 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tzw_2.exe"C:\Users\Admin\AppData\Local\Temp\tzw_2.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:832
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x58c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1680
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
849B
MD5dddd6f7b0646be4e2f942157fb645688
SHA1a75acda7314829e4ebfa81348639276a55d631c6
SHA2567d6c3e22511df93b23142f244dc916229c4d1deb8b6966365b22b4f8c4f131ff
SHA5124c9ac52afbf604d84e54695105f50b806b07f4aa80b9182ba626ffa86786e8e82a11eb9467273bb0307eb5070e2457228aade1dc4e63b8663d41c22d62da7d87
-
Filesize
787KB
MD582174cf15a9908b9db7e737c0806fee7
SHA1d28a9603bf87db6be3f9b8ec436c1e9c38f79cd8
SHA256a9245679d45b81af8a60f0bf2c73e7cb787e354f0e32337e26dd5c7a2c477a67
SHA51231b1ca71bca30d504e8d571e4eaf55ee514dd962ad419db2983797117bf4101af70a92f696b68308ccb9486b79c07549550bba67a36184a2cb4f7a6b38a54f25
-
Filesize
413KB
MD55d52bbd942cb934cdb72947b923eb992
SHA1ae5d1656d842e7e1338ac0e8b5f4c4c71a796215
SHA256dd09ff5cda324ddaf6b5859acd0d64c8464c38828dde29adabcb3c9d6701bcea
SHA5129f93d7a00fcaadd14aa165650a68f2fac319e94683550c8b6b1ace8583a98116ddd9e0e947f8afbb24994bd2a82bb87477fbf65803656f744a6d6c26c433afac
-
Filesize
974KB
MD594b701099df683ecde624855aa32711e
SHA18d7ac4dcff23bee8a37faf0ced43367ce631c7ed
SHA25697552b2913ed9f72caa57c02c356938c09cbccdb7ce283ada7f33ac7abbccc6b
SHA512c6231fde2d72fbdc877e1c7d7d1e30a4d9f0f005df2e6bf32e6b197521c53aa59e575d8f42f2dd553ea0ce4735d71fa5fc4341083af1861272e4b730dbd53f8a
-
Filesize
947KB
MD50b4b15f1ee3df297b708ad6cf9a4f59d
SHA153887e61a42c6a2bc5bfe883038d0c1baa9deadb
SHA2566b4552534a567b764e535cef77822ce67344f87af167b17568142be1e9e89b92
SHA5121e1698dd481ea0784d2eede990f558f7e017eaea8743c50bfd2b416fbc77d759e52bff8a668478b0314c7d0678090fa555694a6b64f65d646e8f47fa977af2be
-
Filesize
627KB
MD56ded8b2dd7250b29c0409121dcadaff3
SHA1406cba8cd1078b2cd96bf8362e6be3d9168f33d4
SHA2564124f33dcfba03434a546ac9b5af4711714c22691cbb11bd568501ba425b263e
SHA51272253d2eda9a2a7c977998422b6574bd543f91eac63fede3a0c542928faf64f30d639d50a37181ae6bb6e29da828d148c8a27b24e11f9f29a9f30af45b4dbe1d
-
Filesize
600KB
MD509865a0e2238871baf8655ebc8deef90
SHA1521b6ff07842468b7a6ae3e3072f40e253879a0f
SHA256033d2574234ce1dc0d948e76b2be7aecaaf01f28d13e0bc1644dda12e507d435
SHA5123b78b33edfe83bec2b3d9954fa34a339966829ed123eceb192e396428e6f7aae52d9b0309aab46ce75c91be1f8e836b224d48b2d63eee197e8e67e0653dbea0e
-
Filesize
920KB
MD5533f4c7caf236b8bff5d6cb891bab85e
SHA1f0006a63276608f4cce13f70b37cc395ef2b8f4f
SHA25664d3b22e43dcc262c9d60864ea272558955831e8f869e4424d06676b9b985800
SHA5127f8cbc08181e79d9ee23c9ce01c9be43e48b6522a1daf0737cb03b928f41a7f69cf25fc860d4a4efb7a6b6ff1104b13772f4fcaecd32914c0314c960784b1ba6
-
Filesize
814KB
MD533d2a3134b6f22db3b60af5ba02a35d3
SHA12cf55b4a35ae8c7a3043f52628e2edced89361a0
SHA2569a639c8f28f100fa71df7980d775171bd353f06a34b18025a3a058fdb58718ac
SHA51229ed01e43ac6019b58009cbd31a87f599ce11b04a4aefab3d64fd614620519b26eb7314e219c145990e7b55ada1aa6d1bb78c2c66b8973f5e6da94784d369277
-
Filesize
680KB
MD573f21b411cb8b9af90f68524e9cba258
SHA173584d3d1bb03f34dffa60e6f85bf5963c8de9a0
SHA256a0333b7cb8b6db0b1390f29e9028586fca3d498d7efc3c80cb8d0a827e3d902c
SHA512eb0b4a9f048da515ec2a8989c5f20619f4bfd0c16db2c2b79051fa50c0757884aea620f7b46c230fdfa15fee7d4cedceb03642582a347bdb3653b5d56ef86d3c
-
Filesize
734KB
MD581f68e4c1b3d03c2b56458812ee34a07
SHA1a78b914af766e6201e936cf755e0cba9d7ef29d1
SHA256cb011fe62efb0766e99aecece02fded2b878ffabc60345bebd384d16406ce349
SHA512f07b117718e3e948decb80c8008375e07ca89b0b580b378ea67b72d7b11e182fe4bc2aa650a555f081ae6b9d6278a9823c89411625cc1a7a273dbcc64b39ab57
-
Filesize
440KB
MD5f72a5e81dd33074418c223096b1c28a1
SHA15b49ab61ba89a1744e455e67f966a1e36d707a41
SHA2561d21f7576ebc149e62c6fcb69657b3cb79b4da7d043d6de9a68009803bac61fb
SHA512bfb55d12ea83f5163804bfd34572356025be0a4bc02de225064077dbda57929616d7c63b033415dcbc2385a20173a54ae6c1db0406f148a11bf3f2de4c01d445
-
Filesize
520KB
MD521e4ee41543906dd60f6470a2ee4a79e
SHA1cf0b0f1dbbaf1ac13a8c058fd635357862df1d1a
SHA256361c938e8868bb0f25f45476aaec65be1bb99499d1c8dc2ce3d3667d94c36075
SHA512284e54540fd0e14382e15966096a3e386719c2c1c4b1b8e6a38183b02900ae7dffd85e489cebed623b31002d27178d3fb97af203b5ee92b465d51a64f17235af
-
Filesize
493KB
MD52835dbd255848a813cf1ca3529c9b95f
SHA155af5dbc75d5637a614160a0bc69565547b96540
SHA25651ce7e4f639cbc187d065d19e72c29d0e2877d67d80175fc6524e23c39f1d195
SHA51220ee5ea1deba795ced1d8d1568d954e84579d199e600591d8102cbd399131537b6861a94149721f633603d1193ba80e5813d7bfb4f6712712b31c02490fb3648
-
Filesize
653KB
MD59a7df49c384b280f5bbcfe2d5a45b261
SHA1b0bbaa0637eaf1e495a1b9103b1bf073d513c2b9
SHA256a3c0fa30b26830adaa1ddbdb996f3381f1978827e3e3134ae7c980bcf4f60fc0
SHA512d0dfec0cbb605c1528d2f9202704fb46d37c650a11034c0b3dcfa7c33bedde892af20799abf0cf0422ebacfd47e67a498a8316820255244e8199630e3fb2b95e
-
Filesize
849B
MD5dddd6f7b0646be4e2f942157fb645688
SHA1a75acda7314829e4ebfa81348639276a55d631c6
SHA2567d6c3e22511df93b23142f244dc916229c4d1deb8b6966365b22b4f8c4f131ff
SHA5124c9ac52afbf604d84e54695105f50b806b07f4aa80b9182ba626ffa86786e8e82a11eb9467273bb0307eb5070e2457228aade1dc4e63b8663d41c22d62da7d87
-
Filesize
573KB
MD5831f7310b3648f9feacdef61dd89bdea
SHA12c9e28c35756f77b7f20db2ee0521ffa727ff38a
SHA256c78dd68a779e177ce835b90db03824ca49d0f0e2dc0a180439fff155e9cfae28
SHA512e9c87b99494e162cc149931ca0f1fab61f436e46106ac80aa1881069e0f9431cbf4da68b1fe40a4121c100b0c8e9874b0448ee33475c60a2c3049895e66d263b
-
Filesize
760KB
MD56edbe80911ad8ee1d8ed43acbd627f03
SHA15932488c43e3d1abeb6c2e0466cd5de5c71ae90e
SHA256441434f82cd7c71fdc0b68d5df330910679dcc4e031cdd0a015a3d9e24aea980
SHA5126286748ba4d8d32e1b389d1740612fc2d8cff16383580f38427e9d982d5020f5b76fff60497835ae3a8d90df3a0c4417cb72abb26054812ced9feb5c0533cbeb
-
Filesize
1.4MB
MD5fb538c3518cc9dd98aaafab502d147e3
SHA181e0f0421fa66e67d79fab5fe266e60e5588b2ab
SHA256a0f4d6aed3e14c7d0b237933fff54bcf4ea069a813e8b7f2a699176d2210c295
SHA5124154f1e7d64d9c8f653ee47796cad6d8ec017ab534b30d990bf05c0ba2acefccb64fbc704c3f4f60be49cd2066d41448842921db227fb35e2a78482dfceda173
-
Filesize
360KB
MD5a16fe30f849ee6450398c897ad5472f2
SHA169361e94082883b73b6bef484da30d7026aa21f1
SHA256482ad3c10ccc14089bb8f2addcb549f0b56175456abd6720ba5a8c25d3fc7fa9
SHA512013abcbea2ab983c9d4466a9526e3daee36581d5682d16d98e78e357fa4ddc003328e0216950b87448e995ac515655d85858c3a9eb0e99464da22d478deb2249
-
Filesize
547KB
MD5e876fbd285f834ea6a1dd2e1b8790ef4
SHA1f7efa7d07bfb28dac60d77f577aa406079a865e6
SHA25681beb74065ec4da590854cd311544d10f0b7a9ed0851c8f504bb7f3a84e67e89
SHA512e3c50eca32cedeb330225fcd5ca7345b34835762543029f267ca22f4aff566db312df43ac3954382d10c0bab4fcbc8c4b734711c24ebb673c4901f4f63e88eaa
-
Filesize
387KB
MD5b8e5aa4b9c45e966ed7085341de4160e
SHA197d43fdd99572b61132c981dd7a313fcb66f9296
SHA256ea2a30198af619d3284c57cb7005f543cc9b6f424a3ab891f5c8c477802a2e18
SHA51278185911e6bf779cad11296fdd23489cb4afdedfdfe4669e2c776824d4f00380730ccf8c16d311c3ca5fc46b52a8a69d14c1fc184b39924147defdb54fb9f90d
-
Filesize
840KB
MD551b01410df2332a5afbe0e2a12a0dd0a
SHA1e6b4bd47312fda9ef8bba3fbb60cba6a85950907
SHA256e626f6b90871f89ca9f87968d084850bf60c3beae468c323a8dbe444785c18a8
SHA51293aa2931da40fab7022b183af2945bd8554b7c505fa1f6545bfb2ba6a5dd1ea81d32e2a7d5d520b491c7e138e9874960c648797477ca7296e53cf1910440b816
-
Filesize
894KB
MD554bff659fd392dd37d64820b3c9ce3c6
SHA1e2e2d4964903593e1078e6d5dd4debeb26b17b13
SHA2564c8df72bd1f0571e8ab05989a2aab3f1f77a3c6cdecec5a040a6459c9cac4a2e
SHA512005042a03eadf274983f75c53f243ffb86a6c2f2af70af6bd6f98261bff0870b743717bcc7ad3e4c7ceb8b4a53d5a60355cc4dd858c42b71c21b3a01826c048f
-
Filesize
1000KB
MD55e0963f53f823d3e04183c1920f774da
SHA16254e6e0f95680ab01f3c5ce888b89e27f9c662d
SHA256c1d1e60aee17692acfb6e7e45254dfa0891f53d650321284d93626d67a474dff
SHA51287d5d447bd29a9b5accf7bc99a21ae142341d7cbdd4e4e8c56f3b7ffe77067d828185975e3954f1bcf7dcf5f9a729a7e859bce9af7dfd56289e9d1e86ba22a5e
-
Filesize
1.0MB
MD5a5761612a7a75ba41856e81d0005d97a
SHA1d484d3c778280ce89bad573cd680ec72e6402b58
SHA2569cf9fae3d043f5ccce844928fa314a6e0a49da4f3f836a6eef53c736934207e5
SHA51219f9ea30733a32e2a4c1fe6801705c7b99b05fdd5838eb94e959841d1effd219095d02e21c3f5cab3a063b5e13ecf4616fba2792dd89fc3bbddf0e95785e2da5
-
Filesize
867KB
MD58717a0f3d66d82cca3efce4efbbaf287
SHA1cf2c2660fbab4f6d471b1eae87a5de97cb4f1fe1
SHA256305100b46a10b62f801100537805fe77f2a3c490c3e5ee1dad47101add5f3331
SHA512d3b2bc0e7f156b0dcefa9e22bade61afe7ee49b78b0e8008a3217d56535ffe174ee62939fa2fc0b3d07099fa2ea3089cb922ba10f7ed41e97282b9ca18e6e9b4
-
Filesize
467KB
MD5f930324be4e9aee1e969acc825e66f66
SHA1d08533ede1de96b671671f6ca32c01a4cdd01c91
SHA25686c98ca2f7e97554bb1ab81fcb109b26798a8b221ed206a7b9cf3d85d093fffb
SHA512a9693223295275001f85037a75c5693cc174cf454fd00ae1bda8be4ac210a1953451a2d9dbc2faeb63524e872b0f1f7b91bd572b8c4896ea197e3c2b0c7f8f52
-
Filesize
707KB
MD5ba6bdcfff9448d5542d55f20c4e9adbb
SHA1aadb4129cd8e84fb3bf58a796216019f3770f3ec
SHA256eec02fade863d07e386dd761dff703684390e0d3c4c6365ccf36240187f1fe9c
SHA512ba0cde5c01a8d2c4cce4cde55228f5dcc5e1b61f773cae81683a37dd9e71fa39624e20478978073f7263a106e1d3764f63802b1181ac27a828749e0238bb70aa
-
Filesize
363B
MD578b541a66a90337c1729c3916bca8d33
SHA1cdd9d0f98f364814916da60e52da1203759830c8
SHA25610114d5dfa26b9c6080af8c6efc73f2e600853d0cacdebde65d9553e5edf5ed2
SHA512cb2cf3afa79621bf9512668a7de00e369ed327973fac5ac6276d096f59736c52b93874c3e84d141b017aa666bd2867a5ab20eb7459e841ece0d5de148c642778
-
Filesize
2KB
MD578fa1b8782b658e2a17841aa3b8bd12c
SHA1b88f0c1ff20eb670573a319403b47b0d76fed343
SHA2562f6b3d47bf540327787d37228e7717fc6c8053b323cc8f5a669719434ef1bc3c
SHA512e4001829f8334469061c8ede00b090f2488a46275f9fe164e6513a38ef7712e0a66e8e92e117144c110f01eda5c46a4b19c97dcd63395851f035315e87f12f41
-
Filesize
1012B
MD52b117dcf358cf45a051b1bfc01d75314
SHA121aa91c78b0c3b969b7fd0bac2c1924c0c3b2536
SHA256ef53b2837f365306c884f79a929cd56efeb1c7a45a5b26d8817b5b4e5132aca1
SHA512cdb2b0fe6bd53acaf01a501faefbfce263a5c2d8eff3e8976e57a099a71155afd8e187dbd7513e3da0e47f602f4c08971976725d4ff0fa7644397a1ece0dd371
-
Filesize
2KB
MD5dc748099fff58dfa38a60d4f52803f59
SHA11a0b89c0b99e25206b65c163e52b9b19c8ccaa14
SHA256c2f9e6acb329941ba80432ecceeea6d35f87f3498d6e09dac596e462d7401d01
SHA5123a8db10fee413a5cb007c489e76259952ffbafe9c8707df6df25696b0693e3b0edd97d8bff42d1987e7bcbe624e1acb61295ab4add5540945b59361d8a4b4883
-
Filesize
849B
MD5dddd6f7b0646be4e2f942157fb645688
SHA1a75acda7314829e4ebfa81348639276a55d631c6
SHA2567d6c3e22511df93b23142f244dc916229c4d1deb8b6966365b22b4f8c4f131ff
SHA5124c9ac52afbf604d84e54695105f50b806b07f4aa80b9182ba626ffa86786e8e82a11eb9467273bb0307eb5070e2457228aade1dc4e63b8663d41c22d62da7d87
-
Filesize
959B
MD5174fac63d760fdf9e75a8a8460d2fdbe
SHA11dac08c90ddb98cacf12eaf5f2e79b992acde385
SHA256aedae752304074fdbe698737ac5902fe30349295c0c2d300f5fe515909672877
SHA512aef1e54c70597790a10f727035220dc498da9c535c357288bf4c10f508b3b505418f78e0c70f2b9a8c7b67579012ee2981bd7ca1e3e6e697991a575cafcd48c9
-
Filesize
255B
MD52d82e8036dd726e7ba27e50c62e8dc43
SHA1caf40a443ef74f6f8408ac5bfb41117124bb3922
SHA2560459a0ddc48709a4a0fe05a9ae9828426421d746c772d4d35508f833ea225dd5
SHA51229f9fc8f10e1e78850acf31759af457c2db520273e54f4d88c5dcf3354a11c366d2989774f49cf5311483e51fc70153674b890c10f4ad836d4a3ec865d856554
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88