Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 16:37
Behavioral task
behavioral1
Sample
5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe
-
Size
148KB
-
MD5
5fac45e8b565bda371ae257d4248e6ae
-
SHA1
2ac8ac40b6f7b3c586b01bb1eef91c78dde25b8a
-
SHA256
dc2f69fcc0ee9a810e269948a3c8ed0d157faaad98b9bec2becba6735a728fe2
-
SHA512
a06fd0be0e51e6051e88e0c1f4a97d61e6ca2b0df39e204c63075bc34a05915f7203c33fcc65517e3640277976ff82df0d982db5f329092c893339feb6e5d76e
-
SSDEEP
1536:tzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDkMuha2LGe+WZRPRhLfSHZ2e/lT:+qJogYkcSNm9V7D7uX1JZRPLfutT
Malware Config
Extracted
C:\OneKLJVIF.README.txt
lockbit
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
http://lockbitapt.uz
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Renames multiple (728) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4004 7AF8.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4176143399-3250363947-192774652-1000\desktop.ini 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4176143399-3250363947-192774652-1000\desktop.ini 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE is not expected to spawn this process 3976 268 DW20.EXE 100 -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL splwow64.exe File created C:\Windows\system32\spool\PRINTERS\PP5bvxx_oghjwag2mngzazzq4ab.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPjqmko49h84ds43ayuyryz5soc.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PP252d7w98qeu98xnw2tn9dglw.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\OneKLJVIF.bmp" 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\OneKLJVIF.bmp" 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4004 7AF8.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\Desktop 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\Desktop\WallpaperStyle = "10" 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.OneKLJVIF 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.OneKLJVIF\ = "OneKLJVIF" 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OneKLJVIF\DefaultIcon 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OneKLJVIF 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OneKLJVIF\DefaultIcon\ = "C:\\ProgramData\\OneKLJVIF.ico" 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp 4004 7AF8.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeDebugPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: 36 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeImpersonatePrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeIncBasePriorityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeIncreaseQuotaPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: 33 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeManageVolumePrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeProfSingleProcessPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeRestorePrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSystemProfilePrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeTakeOwnershipPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeShutdownPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeDebugPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeBackupPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe Token: SeSecurityPrivilege 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE 268 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1788 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 95 PID 5112 wrote to memory of 1788 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 95 PID 3744 wrote to memory of 268 3744 printfilterpipelinesvc.exe 100 PID 3744 wrote to memory of 268 3744 printfilterpipelinesvc.exe 100 PID 5112 wrote to memory of 4004 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 101 PID 5112 wrote to memory of 4004 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 101 PID 5112 wrote to memory of 4004 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 101 PID 5112 wrote to memory of 4004 5112 5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe 101 PID 4004 wrote to memory of 3588 4004 7AF8.tmp 103 PID 4004 wrote to memory of 3588 4004 7AF8.tmp 103 PID 4004 wrote to memory of 3588 4004 7AF8.tmp 103 PID 268 wrote to memory of 3976 268 ONENOTE.EXE 104 PID 268 wrote to memory of 3976 268 ONENOTE.EXE 104 PID 3976 wrote to memory of 3532 3976 DW20.EXE 105 PID 3976 wrote to memory of 3532 3976 DW20.EXE 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe"C:\Users\Admin\AppData\Local\Temp\5fac45e8b565bda371ae257d4248e6ae_darkside_JC.exe"1⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
- Drops file in System32 directory
PID:1788
-
-
C:\ProgramData\7AF8.tmp"C:\ProgramData\7AF8.tmp"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\7AF8.tmp >> NUL3⤵PID:3588
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2088
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{859815FA-530D-4AB9-8846-6470F8EB1F7B}.xps" 1333564068775700002⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 35203⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 35204⤵PID:3532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
129B
MD52323b2677b29c59cb891a3e300535c1b
SHA196362ebfcede3a54eb7b9577562c0c2f3dd94408
SHA25658bb90394cd67f8c466d8bbd502ba128037f82e690b4ddba343e4c7343d3a23d
SHA512f3ea256625c7717d6b8caaab2bf6c266c0ee93accf27da106b2d7fe331a713db709828b4bd590f0c6ddf86ba227348eabcc1009984a0b9c8d36cf6e1789540e3
-
Filesize
2KB
MD5baa2ad4667c6f2451f6e8e45d57dfe8e
SHA1f4699284b493e431f2c750b782ecf4e9dd576e27
SHA256869eb3639c2e429cc4e567bdede14689e3679f3c51bffc624b46df47466b7ef6
SHA5123a775658f3fdc2479675f993fd32635eec9dcb714a80ddcc504dec470778f1cf55697c734c17fb9a21d19b6d70f27e9e6b4cf8a135d49096a10f5b2a8337a49f
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
148KB
MD5329d52764d2cc07733bf7d2f7b3a2f1d
SHA11bed914f61815890a851c325519fab0f4a3cae62
SHA256a80b5a0513f0adca8923ad36d0bc78b865a4f4d7b4215085104d583e9f7e6fbc
SHA512f4850fabdb700beabc1f257cb6480a7deef9a9f4774db899f64498ad0981c8977f497888f5c14f04bb5ce6d23b84b636f345ec59f11d50cb516e1610a3a76f51
-
Filesize
129B
MD5942963c329ee47c01e71befe26ccb12b
SHA18bd75b8c4bcc008ca527413283f4df9f66babc22
SHA256d813667ef54b46e8339aa854e5b0868aa88deb143b4472cb2ca426e7d552137b
SHA512558d6597325df4fde904d75c476e2aaa35458c506dea3b084bdb8fb83f0d2edd771242727e610d98c2531d9e5b53a34461319155fb657c05634ebbd2be99ba51