Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3samples4.zip
windows7-x64
1samples4.zip
windows10-2004-x64
10e60d49a96...01.exe
windows7-x64
0e60d49a96...01.exe
windows10-2004-x64
1ce5dd21fb...1e.exe
windows7-x64
101ce5dd21fb...1e.exe
windows10-2004-x64
103c73425d02...e6.exe
windows7-x64
63c73425d02...e6.exe
windows10-2004-x64
65df6314b5c...5b.exe
windows7-x64
105df6314b5c...5b.exe
windows10-2004-x64
105ee5166c02...93.exe
windows7-x64
105ee5166c02...93.exe
windows10-2004-x64
105f7cdd8c28...02.exe
windows7-x64
75f7cdd8c28...02.exe
windows10-2004-x64
7Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
samples4.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
samples4.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win10v2004-20231215-en
General
-
Target
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
-
Size
2.2MB
-
MD5
71a4ba0fe0bc0cb450b8966cb585f757
-
SHA1
eccb76a942b3359d8dbf4c12e6bc3be0c8627eca
-
SHA256
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0
-
SHA512
5748e02e83ea32118013741680be6e2eea398b05cde8c359e0db9126175ce63a4890e7ca654e5a5930970889aa2598c650395972107d41522e55207dd5460c01
-
SSDEEP
12288:QnQY+2XG1Inz4vM/nlBKSduzxx73zDJnaPxMrFHQJGTTqTdd1o/CMj:QbGOnbzuHT5naPxUHQATTqzi/Cu
Malware Config
Extracted
C:\ProgramData\lcrueog.html
http://jssestaew3e7ao3q.onion.cab
http://jssestaew3e7ao3q.tor2web.org
http://jssestaew3e7ao3q.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation pcftxel.exe -
Executes dropped EXE 2 IoCs
pid Process 1192 pcftxel.exe 4372 pcftxel.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pcftxel.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pcftxel.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 pcftxel.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\desktop.ini pcftxel.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pcftxel.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-eayftga.bmp" Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1580 1192 WerFault.exe 91 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" pcftxel.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch pcftxel.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{14f6f45c-0000-0000-0000-f0ff3a000000}\NukeOnDelete = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00310034006600360066003400350063002d0030003000300030002d0030003000300030002d0030003000300030002d006400300031003200300030003000300030003000300030007d00000030002c007b00310034006600360066003400350063002d0030003000300030002d0030003000300030002d0030003000300030002d006600300066006600330061003000300030003000300030007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{14f6f45c-0000-0000-0000-f0ff3a000000}\MaxCapacity = "2047" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{14f6f45c-0000-0000-0000-d01200000000} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{14f6f45c-0000-0000-0000-f0ff3a000000} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{14f6f45c-0000-0000-0000-d01200000000}\NukeOnDelete = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{14f6f45c-0000-0000-0000-d01200000000}\MaxCapacity = "14116" svchost.exe -
Modifies registry class 35 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133485973364481902" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133485973597294360" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133485974654012702" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133485973261453366" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133485973593076086" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1 svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU\ICT = "133471138020262031" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133485973924013140" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133485974261356423" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133485974259950559" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133485974244012886" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133471138015574605" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU\PCT = "133471138018230743" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133485974655106659" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133485973916669673" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133485974659325298" svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3264 5ee5166c02636f294fb8f6da69d5c0ae893.exe 3264 5ee5166c02636f294fb8f6da69d5c0ae893.exe 1192 pcftxel.exe 1192 pcftxel.exe 1192 pcftxel.exe 1192 pcftxel.exe 1192 pcftxel.exe 1192 pcftxel.exe 1192 pcftxel.exe 1192 pcftxel.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1192 pcftxel.exe Token: SeDebugPrivilege 1192 pcftxel.exe Token: SeShutdownPrivilege 3560 Explorer.EXE Token: SeCreatePagefilePrivilege 3560 Explorer.EXE Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe Token: SeTcbPrivilege 804 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4372 pcftxel.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4372 pcftxel.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4372 pcftxel.exe 4372 pcftxel.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3560 Explorer.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1192 wrote to memory of 804 1192 pcftxel.exe 83 PID 804 wrote to memory of 2292 804 svchost.exe 97 PID 804 wrote to memory of 2292 804 svchost.exe 97 PID 804 wrote to memory of 4880 804 svchost.exe 98 PID 804 wrote to memory of 4880 804 svchost.exe 98 PID 804 wrote to memory of 2260 804 svchost.exe 101 PID 804 wrote to memory of 2260 804 svchost.exe 101 PID 1192 wrote to memory of 3560 1192 pcftxel.exe 40 PID 1192 wrote to memory of 4372 1192 pcftxel.exe 104 PID 1192 wrote to memory of 4372 1192 pcftxel.exe 104 PID 1192 wrote to memory of 4372 1192 pcftxel.exe 104 PID 804 wrote to memory of 2624 804 svchost.exe 107 PID 804 wrote to memory of 2624 804 svchost.exe 107 PID 804 wrote to memory of 2624 804 svchost.exe 107 PID 804 wrote to memory of 3416 804 svchost.exe 109 PID 804 wrote to memory of 3416 804 svchost.exe 109 PID 804 wrote to memory of 3416 804 svchost.exe 109 PID 804 wrote to memory of 2492 804 svchost.exe 110 PID 804 wrote to memory of 2492 804 svchost.exe 110 PID 804 wrote to memory of 2492 804 svchost.exe 110 PID 804 wrote to memory of 4896 804 svchost.exe 112 PID 804 wrote to memory of 4896 804 svchost.exe 112 PID 804 wrote to memory of 4896 804 svchost.exe 112 PID 804 wrote to memory of 180 804 svchost.exe 113 PID 804 wrote to memory of 180 804 svchost.exe 113 PID 804 wrote to memory of 180 804 svchost.exe 113 PID 804 wrote to memory of 5088 804 svchost.exe 114 PID 804 wrote to memory of 5088 804 svchost.exe 114 PID 804 wrote to memory of 5088 804 svchost.exe 114 PID 804 wrote to memory of 1420 804 svchost.exe 115 PID 804 wrote to memory of 1420 804 svchost.exe 115 PID 804 wrote to memory of 1420 804 svchost.exe 115
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0\5ee5166c02636f294fb8f6da69d5c0ae893.exe"C:\Users\Admin\AppData\Local\Temp\5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0\5ee5166c02636f294fb8f6da69d5c0ae893.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:2292
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:4880
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:2260
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2624
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:3416
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2492
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:4896
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:180
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:5088
-
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\pcftxel.exeC:\Users\Admin\AppData\Local\Temp\pcftxel.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\pcftxel.exe"C:\Users\Admin\AppData\Local\Temp\pcftxel.exe" -u2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7282⤵
- Program crash
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1192 -ip 11921⤵PID:3416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD5be0941561ee986e4e023b75b6ddb2425
SHA12085e0994538f6a48676fbd4909a8990cf5e0369
SHA2568710149afed5be5d1411ff22b402f9a68dd5cf738170b681c86274f7dfcf83d2
SHA512ee675674c35eeaf3a749e737b3e2e7186faa26bd8b747aa7746d41d5d489a41e4cda70a7682df590522ed8723e5b157df5ce9228c664f57326295acfe259cc58
-
Filesize
654B
MD5e849abd43c9b7c4ede7aac692d3ec91b
SHA13524bfbe3e737dfafd3c7ba8659a0504d6d23693
SHA256f488b40901536fe9404befeba5688422355e69a0da99114722ed604da67786a0
SHA512cc054aa1d21dc5dd1de8182713a6ab8b42bd4b12ad127d0e32e3e5bf419050cd59f7dd6114544e908b394a4ed3a3d6cc0f80fadcb82d203986bb8ffe435611af
-
Filesize
654B
MD522710014cbcb4c4cfa420f35c780557e
SHA1e49906e5f04fafecfccbec7e595cd3b6daf8e24a
SHA256fd412ca09aab8b87e7954f61f5da678f4e6e96aa24428bc4ff8916636dd14ca2
SHA512d5bfe15e4ca85a8c56cb9f2d5f4d2b60449c2fdc64d121e8d39127490956bd42d8caade771710cf51240db76ba0c13b31da014ad37f7ee94e11d5b7a57c70d1d
-
Filesize
654B
MD58f5efa01c7217ea9f9e28fe87ed13df7
SHA17961a1c6599d4db649a2da578468a9d7be074904
SHA256c7bac4e7254ec928ffead5688dca22f9c3b6ec86759b167e61628a48f3c01244
SHA512b9ee8b830f4cf8c55dc8a581884ef9fc11f17c186f9d3efdba2beb0e01ae7751e255d121417fa145ff8e0c5805e94e07db15fba172ef0bd5cd89ab91731c04ff
-
Filesize
654B
MD5d3f79c34e1cac921bcdd5670fcacf24c
SHA191dd21f71bc34f827fbcb993c1e2507bdfc4434e
SHA256d4bbc984d19458e1242956cb6408ee77cdc05cfda94c4fdb96fba12d3325bc3a
SHA512f6cd8dbb3c77912f2891de34800ffa48336a0dd85022510d8cfc1905b02034a12a1faf4b99a1efaf68b620236ace608acffe6e811ec93413605962700666be76
-
Filesize
92KB
MD5a5a9fab1f31e3596f8b321efc68d3200
SHA130109f92616bce91d101696951c4b77a934aebc6
SHA256d007458ab4b6c924f0ca12b3cc924f3bf2857e0489331eb387cc332c953f360b
SHA512443c715052e5be1d39e3a7a7c21e38166e7125d5948a96a8fbc4d7bafab4d9aed839f26b488c69030a6f890ff86cfb86caeed2375c801e20ae0cc27bab0b30cd
-
Filesize
1.0MB
MD5b79e10aa53e3f1610dbe2606d5b8c233
SHA1ecad09dc23eab74e78ff02e2655566eb5dc39036
SHA2565d182cd219ec791fe2d9ee46b141f003baef4b88c0d6c274f1cb1b977690caa2
SHA5123a7efa725aaa608a18181927a8e6cf8483249d1a359491e571adf1d3cbbebf8a441fd71adca0a7588ef8aa68914bd5275296a3bbedb83b7618823db933c3151f
-
Filesize
1.4MB
MD51438e80c72f143e3ff7fb9329e1df87f
SHA1b6adb1285545d5c5a6e18ada580914e1f57a9162
SHA2566263719feef138c624bf4df8e331da67860a643396a20b79a03306b3af072174
SHA5124872c8949f6387760e4cf236c1c356665a209f1a671c384e0ac6ff28e5a44ce0cccd0d58c844fbaf66564fa1387aa2564b9262868730745f20c5c7a733ccafb8
-
Filesize
857KB
MD5cc2bc9f430872b8600a8b83ab37d50ae
SHA19122b833e1ad0434092cb6d7f4abec4882e108c6
SHA256ffb9a1270f7cd52e77d473966c4009203452090a1a5d091abc419e5f137d085d
SHA51268ca6ea4c9cab37403d3bd15e448c394426046f98dcccc09cbf420bc56b79efe7288dd11ab6f3ca1bd7ec7a69184e6de5fda000b1bc810ebbc585e3fbe5eb26d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.JPG.eayftga
Filesize36KB
MD573e439f82fc759dcd56f28a0414f2fde
SHA1340c7e05ee1d44f61aa3852a846f3ec43247297b
SHA25699f0bd0f94bf510c4f7813a84184bafa0df786709c28542abb561170d8669c4f
SHA512be45e9bce1f5bc7dfaf41c2631dc078d6b67d54abb6dc0d868623bf1920ec4de704f5574f7254e1fa500e30e6ad102ef6c4949facc6bdfd95940c7b7e7d98bbf
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88