Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:52
Behavioral task
behavioral1
Sample
1f0a89360bb9471af8b2b1136eafd65f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f0a89360bb9471af8b2b1136eafd65f.exe
Resource
win10v2004-20231215-en
General
-
Target
1f0a89360bb9471af8b2b1136eafd65f.exe
-
Size
250KB
-
MD5
1f0a89360bb9471af8b2b1136eafd65f
-
SHA1
a7bd3592ff31c5c659cda9810936ddce842d6590
-
SHA256
2a23fac4cfa697cc738d633ec00f3fbe93ba22d2498f14dea08983026fdf128a
-
SHA512
c696ee6a3a65cf01f120724c8536d14bbdc5283e6a62e1a26454629ea30c4015d62c1ba6139ca158f9952d6028ea7d9a1f76a4d2adad4e3a377d06607f5ad031
-
SSDEEP
6144:bAr3VCaIjpP65V3Q400RwDym6flM5OPh2r:bAr3VCMP00RwDymd5Uh2r
Malware Config
Extracted
C:\Users\LOCKFILE-README-GLTGRJAG-1704392475.hta
http-equiv="Content-Type"
http-equiv="x-ua-compatible"
Extracted
C:\Users\Public\LOCKFILE-README.hta
lockfile
https://tox.chat/download.html
http://zqaflhty5hyziovsxgqvj2mrz5e5rs6oqxzb54zolccfnvtn5w2johad.onion
Signatures
-
Detect LockFile payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3004-1281-0x000000013FA40000-0x000000013FB19000-memory.dmp family_lockfile behavioral1/memory/3004-7684-0x000000013FA40000-0x000000013FB19000-memory.dmp family_lockfile -
LockFile
LockFile is a new ransomware that emerged in July 2021 with ProxyShell vulnerabilties.
-
Renames multiple (1058) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory 29 IoCs
Processes:
1f0a89360bb9471af8b2b1136eafd65f.exedescription ioc process File created C:\Windows\System32\drivers\UMDF\en-US\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\de-DE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\UMDF\it-IT\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\etc\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\UMDF\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\UMDF\es-ES\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\es-ES\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\de-DE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\UMDF\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\UMDF\fr-FR\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\UMDF\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\fr-FR\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\it-IT\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\fr-FR\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\UMDF\it-IT\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\en-US\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\UMDF\fr-FR\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\it-IT\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\UMDF\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\en-US\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\drivers\UMDF\de-DE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\es-ES\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\UMDF\de-DE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\drivers\UMDF\es-ES\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 452 cmd.exe -
Drops startup file 1 IoCs
Processes:
1f0a89360bb9471af8b2b1136eafd65f.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/3004-0-0x000000013FA40000-0x000000013FB19000-memory.dmp upx behavioral1/memory/3004-1281-0x000000013FA40000-0x000000013FB19000-memory.dmp upx behavioral1/memory/3004-7684-0x000000013FA40000-0x000000013FB19000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
Processes:
1f0a89360bb9471af8b2b1136eafd65f.exedescription ioc process File created C:\Windows\SysWOW64\it-IT\Licenses\eval\HomeBasicE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\Dism\it-IT\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\prnbr006.inf_amd64_neutral_f156853def526447\Amd64\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\es-ES\Licenses\_Default\EnterpriseE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\es-ES\Licenses\_Default\HomeBasicN\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\icsxml\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\cxfalcon_ibv64.inf_amd64_neutral_d065aec3fcf4ec4e\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmpn1.inf_amd64_neutral_e44cc033b67e7d04\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\tape.inf_amd64_neutral_c6a6811d3d827dba\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\Professional\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\Setup\es-ES\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\HomePremiumN\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\HomeBasicE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\com\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\de-DE\Licenses\OEM\HomePremiumE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\spp\tokens\issuance\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitsTransfer\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\en-US\Licenses\eval\Enterprise\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-StorageMigration\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmrock5.inf_amd64_neutral_cadd97421d121ebb\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\netbxnda.inf_amd64_neutral_c81780c5dcabd0a0\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\wsdprint.inf_amd64_neutral_f91980f20f3112ed\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-NetworkBridge\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\Setup\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\HomeBasicN\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\migwiz\PostMigRes\data\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\config\RegBack\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmarch.inf_amd64_neutral_4261401e3170ebfb\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmlasno.inf_amd64_neutral_c86d5b5e5fa8b48a\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\prncs302.inf_amd64_ja-jp_96eca15be06b1482\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\spool\drivers\x64\3\mui\0409\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\IME\IMETC10\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\Speech\Engines\SR\it-IT\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\HomeBasicN\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\wdmvsc.inf_amd64_neutral_a2cf745000e2ea92\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\ja-JP\Licenses\_Default\ProfessionalE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\oobe\en-US\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmcomp.inf_amd64_neutral_e5ca2f01ca47bddb\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmmotou.inf_amd64_neutral_eb1d978f38f35bca\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\prnsv002.inf_amd64_neutral_6ca80563d6148ee5\Amd64\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\wbem\fr-FR\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky002.inf_amd64_neutral_525d9740c77e325f\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\slmgr\0410\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\de-DE\Licenses\eval\ProfessionalN\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\en-US\Licenses\eval\ProfessionalE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\catroot2\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\Dism\de-DE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\angelu64.inf_amd64_neutral_3d6079dd78127f5e\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\wiaep002.inf_amd64_neutral_0a982dec66379cb0\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-OfflineFiles-Core\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\en-US\Licenses\OEM\HomeBasicN\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\HomeBasicN\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\it-IT\Licenses\OEM\ProfessionalE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmdsi.inf_amd64_neutral_e77f438012239042\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\prnlx00w.inf_amd64_neutral_d4c93bb2fbf75723\Amd64\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\DriverStore\en-US\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0013\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\System32\DriverStore\FileRepository\prnxx002.inf_amd64_neutral_560fdd891b24f384\Amd64\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\de-DE\Licenses\_Default\HomeBasicE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\Starter\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe -
Drops file in Program Files directory 64 IoCs
Processes:
1f0a89360bb9471af8b2b1136eafd65f.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\kamchatka 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0292286.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\mawson 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\bl00152_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0105360.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\bs00441_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\outlook.dev_k_col.hxk 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\bdrtkful.poc 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\vlc.mo 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\recovr32.cnv 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\so02268_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0238959.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\sy00560_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\core_visualvm.jar 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\na01474_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-api-caching_zh_cn.jar 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0292278.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\nairobi 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\acro20.lng 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\so00704_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\tr00126_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0287020.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\brussels 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0105912.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\infopath_col.hxt 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.nl_ja_4.4.0.v20140623020002.jar 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\syowa 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\recycle.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\madeira 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\dd01170_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\pswavy.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.commands.nl_zh_4.4.0.v20140623020002.jar 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.workbench.nl_ja_4.4.0.v20140623020002.jar 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\bd06102_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\form.js 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\feature.properties 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\pe03668_.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.configuration_5.5.0.165303.jar 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0198102.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\email11.poc 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_ja_4.4.0.v20140623020002.jar 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\j0250504.wmf 1f0a89360bb9471af8b2b1136eafd65f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\brch98sp.poc 1f0a89360bb9471af8b2b1136eafd65f.exe -
Drops file in Windows directory 64 IoCs
Processes:
1f0a89360bb9471af8b2b1136eafd65f.exedescription ioc process File created C:\Windows\winsxs\amd64_eventviewersettings.resources_31bf3856ad364e35_6.1.7600.16385_de-de_4a360e25beb75a4d\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..putername.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ec2a8bc0ed056604\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\wow64_microsoft-windows-p..ll-events.resources_31bf3856ad364e35_6.1.7600.16385_de-de_a041c100b985443d\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_ddores.resources_31bf3856ad364e35_6.1.7600.16385_en-us_5c4247eed23781da\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..madvanced.resources_31bf3856ad364e35_6.1.7600.16385_es-es_aee713c9ed7b0da3\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Applications.ComRPCChannel\8.0.0.0__b03f5f7f11d50a3a\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_MSIL\System.Data.SqlXml.resources\2.0.0.0_ja_b77a5c561934e089\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_prnnr003.inf.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_26bf1facff1302e4\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_tsprint.inf_31bf3856ad364e35_6.1.7601.17514_none_ca1bed7d5beee2f8\amd64\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-icsigd.resources_31bf3856ad364e35_6.1.7600.16385_es-es_14256cc5377d4e42\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-ie-controls.resources_31bf3856ad364e35_8.0.7600.16385_es-es_c8451224905fb33f\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-duser.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_73a83d2d2f7a0e00\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-twext.resources_31bf3856ad364e35_6.1.7600.16385_es-es_11eab51bccaaf9d5\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-dpiscaling.resources_31bf3856ad364e35_6.1.7600.16385_en-us_057de34e5a8ea31c\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-ie-infocard.resources_31bf3856ad364e35_8.0.7600.16385_ja-jp_c5079e0d3ab8f002\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-rpc-ns.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_7266a173a5b0605a\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_server-help-chm.comexp.resources_31bf3856ad364e35_6.1.7600.16385_en-us_251c978d797d5c4b\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_devicepairingproxy.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_7f4f041e22424650\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_msdv.inf.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b1d69ea4b8ab3c12\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_desktop_shell-gettingstarted.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_debfc28a2e2600eb\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_netfx-_vsavb7rtui_b03f5f7f11d50a3a_6.1.7600.16385_none_24e6a98ae7855ab9\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\msil_microsoft.web.manag..nt.webdav.resources_31bf3856ad364e35_6.1.7600.16385_de-de_71b1283683a76a6f\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\msil_iiehost_b03f5f7f11d50a3a_6.1.7600.16385_none_56100bff47b890a3\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-taskbarcpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_2803da416ca2cec0\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_server-help-chm.nap.resources_31bf3856ad364e35_6.1.7600.16385_de-de_821d94e46283e8d1\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-compact.resources_31bf3856ad364e35_6.1.7600.16385_de-de_24a866aeedb4c9f8\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-bubbles.resources_31bf3856ad364e35_6.1.7600.16385_de-de_7f5c9b4fc7fa82f2\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-adminmmc.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_5081821862f9dc0a\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-atbroker.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_65b0ce353b009c87\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-e..ehprivjob.resources_31bf3856ad364e35_6.1.7600.16385_de-de_49e806b857d27fcf\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..indetails.resources_31bf3856ad364e35_6.1.7600.16385_it-it_e746c4ae38d15130\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..favorites.resources_31bf3856ad364e35_8.0.7600.16385_fr-fr_aa2f4b7be84827f9\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..rtmonitor.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b12fab6d36e5136e\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-c..n-comrepl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_7a43d94b3ba04b6e\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_MSIL\System.Core.resources\3.5.0.0_it_b77a5c561934e089\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Serialization.Json\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-wusa.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_98d236f1683c8164\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\wow64_microsoft-windows-a..ence-mitigations-c2_31bf3856ad364e35_6.1.7601.17514_none_749de8353d4bd160\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..-msscript.resources_31bf3856ad364e35_6.1.7600.16385_en-us_ceaabf751a874229\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-r..-detector.resources_31bf3856ad364e35_6.1.7600.16385_es-es_cbe144ab260021bd\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\msil_system.drawing.design.resources_b03f5f7f11d50a3a_6.1.7600.16385_ja-jp_3ca4dcce1313e214\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_hidbth.inf_31bf3856ad364e35_6.1.7600.16385_none_7f07aed06f24a51d\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-m..utilities.resources_31bf3856ad364e35_6.1.7600.16385_it-it_6e201243d7806634\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-r..erycenter.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_1276d7675954221c\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.V9921e851#\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-efs-rekeywiz.resources_31bf3856ad364e35_6.1.7600.16385_en-us_15495050540f23f5\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-onex.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b39ac2b4e1f167d\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-rpc-adm.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_d0e436e42475718a\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_32\System.Data.OracleClient\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_64\Microsoft.MediaCenter.Interop\6.1.0.0__31bf3856ad364e35\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_netfx-iehost_b03f5f7f11d50a3a_6.1.7600.16385_none_7dd203ef359dfcfb\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..ionengine.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_8ba155016eda35d6\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\PresentationUI\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..cy-engine.resources_31bf3856ad364e35_6.1.7600.16385_it-it_524bb44d60ddbc71\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-cdosys.resources_31bf3856ad364e35_6.1.7601.17514_nb-no_1d1edaf7a80e1441\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\x86_microsoft-windows-dpapi-keys.resources_31bf3856ad364e35_6.1.7600.16385_it-it_756ddde051618f16\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..ll-events.resources_31bf3856ad364e35_6.1.7600.16385_it-it_cb88b5d13e2d7b8c\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-s..ols-klist.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8942ec8df0dc8142\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_server-help-chm.iismmc.resources_31bf3856ad364e35_6.1.7600.16385_de-de_4b7529f49a9291a6\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\assembly\GAC_MSIL\System.XML.resources\2.0.0.0_de_b77a5c561934e089\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-l..epremiume.resources_31bf3856ad364e35_6.1.7600.16385_it-it_37669c3d6397c19d\LOCKFILE-README-GLTGRJAG-1704392475.hta 1f0a89360bb9471af8b2b1136eafd65f.exe -
Kills process with WMI 9 IoCs
Processes:
WMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exeWMIC.exepid process 2716 WMIC.exe 2976 WMIC.exe 1728 WMIC.exe 2732 WMIC.exe 2724 WMIC.exe 2456 WMIC.exe 2532 WMIC.exe 2696 WMIC.exe 2600 WMIC.exe -
Processes:
mshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2976 WMIC.exe Token: SeSecurityPrivilege 2976 WMIC.exe Token: SeTakeOwnershipPrivilege 2976 WMIC.exe Token: SeLoadDriverPrivilege 2976 WMIC.exe Token: SeSystemProfilePrivilege 2976 WMIC.exe Token: SeSystemtimePrivilege 2976 WMIC.exe Token: SeProfSingleProcessPrivilege 2976 WMIC.exe Token: SeIncBasePriorityPrivilege 2976 WMIC.exe Token: SeCreatePagefilePrivilege 2976 WMIC.exe Token: SeBackupPrivilege 2976 WMIC.exe Token: SeRestorePrivilege 2976 WMIC.exe Token: SeShutdownPrivilege 2976 WMIC.exe Token: SeDebugPrivilege 2976 WMIC.exe Token: SeSystemEnvironmentPrivilege 2976 WMIC.exe Token: SeRemoteShutdownPrivilege 2976 WMIC.exe Token: SeUndockPrivilege 2976 WMIC.exe Token: SeManageVolumePrivilege 2976 WMIC.exe Token: 33 2976 WMIC.exe Token: 34 2976 WMIC.exe Token: 35 2976 WMIC.exe Token: SeIncreaseQuotaPrivilege 2976 WMIC.exe Token: SeSecurityPrivilege 2976 WMIC.exe Token: SeTakeOwnershipPrivilege 2976 WMIC.exe Token: SeLoadDriverPrivilege 2976 WMIC.exe Token: SeSystemProfilePrivilege 2976 WMIC.exe Token: SeSystemtimePrivilege 2976 WMIC.exe Token: SeProfSingleProcessPrivilege 2976 WMIC.exe Token: SeIncBasePriorityPrivilege 2976 WMIC.exe Token: SeCreatePagefilePrivilege 2976 WMIC.exe Token: SeBackupPrivilege 2976 WMIC.exe Token: SeRestorePrivilege 2976 WMIC.exe Token: SeShutdownPrivilege 2976 WMIC.exe Token: SeDebugPrivilege 2976 WMIC.exe Token: SeSystemEnvironmentPrivilege 2976 WMIC.exe Token: SeRemoteShutdownPrivilege 2976 WMIC.exe Token: SeUndockPrivilege 2976 WMIC.exe Token: SeManageVolumePrivilege 2976 WMIC.exe Token: 33 2976 WMIC.exe Token: 34 2976 WMIC.exe Token: 35 2976 WMIC.exe Token: SeIncreaseQuotaPrivilege 1728 WMIC.exe Token: SeSecurityPrivilege 1728 WMIC.exe Token: SeTakeOwnershipPrivilege 1728 WMIC.exe Token: SeLoadDriverPrivilege 1728 WMIC.exe Token: SeSystemProfilePrivilege 1728 WMIC.exe Token: SeSystemtimePrivilege 1728 WMIC.exe Token: SeProfSingleProcessPrivilege 1728 WMIC.exe Token: SeIncBasePriorityPrivilege 1728 WMIC.exe Token: SeCreatePagefilePrivilege 1728 WMIC.exe Token: SeBackupPrivilege 1728 WMIC.exe Token: SeRestorePrivilege 1728 WMIC.exe Token: SeShutdownPrivilege 1728 WMIC.exe Token: SeDebugPrivilege 1728 WMIC.exe Token: SeSystemEnvironmentPrivilege 1728 WMIC.exe Token: SeRemoteShutdownPrivilege 1728 WMIC.exe Token: SeUndockPrivilege 1728 WMIC.exe Token: SeManageVolumePrivilege 1728 WMIC.exe Token: 33 1728 WMIC.exe Token: 34 1728 WMIC.exe Token: 35 1728 WMIC.exe Token: SeIncreaseQuotaPrivilege 1728 WMIC.exe Token: SeSecurityPrivilege 1728 WMIC.exe Token: SeTakeOwnershipPrivilege 1728 WMIC.exe Token: SeLoadDriverPrivilege 1728 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1f0a89360bb9471af8b2b1136eafd65f.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3004 wrote to memory of 2936 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2936 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2936 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2936 wrote to memory of 2976 2936 cmd.exe WMIC.exe PID 2936 wrote to memory of 2976 2936 cmd.exe WMIC.exe PID 2936 wrote to memory of 2976 2936 cmd.exe WMIC.exe PID 3004 wrote to memory of 2160 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2160 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2160 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2160 wrote to memory of 1728 2160 cmd.exe WMIC.exe PID 2160 wrote to memory of 1728 2160 cmd.exe WMIC.exe PID 2160 wrote to memory of 1728 2160 cmd.exe WMIC.exe PID 3004 wrote to memory of 2560 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2560 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2560 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2560 wrote to memory of 2600 2560 cmd.exe WMIC.exe PID 2560 wrote to memory of 2600 2560 cmd.exe WMIC.exe PID 2560 wrote to memory of 2600 2560 cmd.exe WMIC.exe PID 3004 wrote to memory of 2680 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2680 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2680 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2680 wrote to memory of 2696 2680 cmd.exe WMIC.exe PID 2680 wrote to memory of 2696 2680 cmd.exe WMIC.exe PID 2680 wrote to memory of 2696 2680 cmd.exe WMIC.exe PID 3004 wrote to memory of 2728 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2728 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2728 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2728 wrote to memory of 2716 2728 cmd.exe WMIC.exe PID 2728 wrote to memory of 2716 2728 cmd.exe WMIC.exe PID 2728 wrote to memory of 2716 2728 cmd.exe WMIC.exe PID 3004 wrote to memory of 2672 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2672 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2672 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2672 wrote to memory of 2732 2672 cmd.exe WMIC.exe PID 2672 wrote to memory of 2732 2672 cmd.exe WMIC.exe PID 2672 wrote to memory of 2732 2672 cmd.exe WMIC.exe PID 3004 wrote to memory of 2496 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2496 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2496 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2496 wrote to memory of 2724 2496 cmd.exe WMIC.exe PID 2496 wrote to memory of 2724 2496 cmd.exe WMIC.exe PID 2496 wrote to memory of 2724 2496 cmd.exe WMIC.exe PID 3004 wrote to memory of 2712 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2712 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2712 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2712 wrote to memory of 2456 2712 cmd.exe WMIC.exe PID 2712 wrote to memory of 2456 2712 cmd.exe WMIC.exe PID 2712 wrote to memory of 2456 2712 cmd.exe WMIC.exe PID 3004 wrote to memory of 2508 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2508 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 3004 wrote to memory of 2508 3004 1f0a89360bb9471af8b2b1136eafd65f.exe cmd.exe PID 2508 wrote to memory of 2532 2508 cmd.exe WMIC.exe PID 2508 wrote to memory of 2532 2508 cmd.exe WMIC.exe PID 2508 wrote to memory of 2532 2508 cmd.exe WMIC.exe PID 3004 wrote to memory of 1772 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 1772 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 1772 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 1880 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 1880 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 1880 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 2292 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 2292 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 2292 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe PID 3004 wrote to memory of 1800 3004 1f0a89360bb9471af8b2b1136eafd65f.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f0a89360bb9471af8b2b1136eafd65f.exe"C:\Users\Admin\AppData\Local\Temp\1f0a89360bb9471af8b2b1136eafd65f.exe"1⤵
- Drops file in Drivers directory
- Drops startup file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%vmwp%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%vmwp%'" call terminate3⤵
- Kills process with WMI
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%sqlservr%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%sqlservr%'" call terminate3⤵
- Kills process with WMI
PID:2696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%omtsreco%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%vmware%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%tnslsnr%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%oracle%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%mysqld%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%vbox%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "name like '%virtualbox%'" call terminate2⤵
- Suspicious use of WriteProcessMemory
PID:2160
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:676
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:2204
-
-
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 -n 5 && del "C:\Users\Admin\AppData\Local\Temp\1f0a89360bb9471af8b2b1136eafd65f.exe" && exit2⤵
- Deletes itself
PID:452 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2016
-
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:1188
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:1516
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:1848
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:1392
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:1800
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:2292
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:1880
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\LOCKFILE-README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Modifies Internet Explorer settings
PID:1772
-
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%virtualbox%'" call terminate1⤵
- Kills process with WMI
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%vbox%'" call terminate1⤵
- Kills process with WMI
PID:2600
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%omtsreco%'" call terminate1⤵
- Kills process with WMI
PID:2732
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%oracle%'" call terminate1⤵
- Kills process with WMI
PID:2724
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%tnslsnr%'" call terminate1⤵
- Kills process with WMI
PID:2456
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%vmware%'" call terminate1⤵
- Kills process with WMI
PID:2532
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "name like '%mysqld%'" call terminate1⤵
- Kills process with WMI
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD51081f7601b184340776f0ed997f7645f
SHA16e952b4415ea7c60a726006bfeb08d89f00f694d
SHA256b199bcbfa99f8e76eff033179a32521c69b7b5396a9e4a5fb37166b467392b76
SHA512e3885fc903df378f9d667d750bff74cfb6082b907e7d7a529269eba6aca839807c9343bbc78af361598bf7ea95909a65fae87f6897d6ceb5ae336aef83742b8c
-
Filesize
21KB
MD5eb158675e76fc2445e6763566d99a7c3
SHA1f204da7d6e4c3aa5bfce08b3aa203b286eec972c
SHA2562a46f52d5cab528f6b23fc1496945129a52ab7fc240a701529db7818e7a8d9e9
SHA51278f017e88ad661cacf0b497903cc65e891c61b3cc651d72270852511dc5c7821fc21ead347e9e2d79c9d01876204fae2f4a08da7fcc46fa7342dcf58ad85fd55