Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 17:07
Behavioral task
behavioral1
Sample
13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe
Resource
win10v2004-20231215-en
General
-
Target
13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe
-
Size
82KB
-
MD5
f346aad7f24a9ab3442b802e0ef42cf3
-
SHA1
9b13e49b407a0fd3b558881e389458871180219b
-
SHA256
13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb
-
SHA512
74559ac477f7dbd050b8778ca09ef6c58db3fd680b994069ed3413b68b45a542e109daad0abe8c16bf35ba35e61f9fa49387b5ab483c92fad2660f00ecfeb49e
-
SSDEEP
1536:JxqjQ+P04wsmJCOXjlS1FKnDtkuImg61iF:sr85COXBS1FqtkuImgmiF
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\+README-WARNING+.txt
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x00010000000102f3-13.dat family_neshta behavioral1/memory/624-469-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/624-473-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
MAKOP ransomware payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000015c3d-2.dat family_makop -
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8259) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2520 wbadmin.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 1788 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Loads dropped DLL 3 IoCs
pid Process 624 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 624 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 624 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5E1B.tmp.bmp" 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System\es-ES\wab32res.dll.mui 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\oledbjvs.inc 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\clock.html 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\RSSFeeds.css 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\settings.html 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\+README-WARNING+.txt 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Common Files\System\de-DE\wab32res.dll.mui 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBHD.DPV 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\+README-WARNING+.txt 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jakarta 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\LucidaBrightDemiBold.ttf 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02752G.GIF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_SelectionSubpicture.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\install.ins 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152708.WMF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02957_.WMF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01213K.JPG 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_F_COL.HXK 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\mshwLatin.dll.mui 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Elemental.eftx 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\BTINTERNET.NET.XML 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\12.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mip.exe.mui 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01618_.WMF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178348.JPG 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00462_.WMF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR23F.GIF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\flyout.html 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\gadget.xml 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dialdot_lrg.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106222.WMF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\HEADER.GIF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsMacroTemplate.html 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\WinMail.exe.mui 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\settings.css 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR50F.GIF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveNewsletter.dotx 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-application.xml 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.xml 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-utilities.xml 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jre7\lib\alt-rt.jar 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Kosrae 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Flow.xml 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115839.GIF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_ButtonGraphic.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POSTCARD.XML 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\TexturedBlue.css 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Enderbury 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\7.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\+README-WARNING+.txt 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15132_.GIF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityMergeFax.Dotx 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\org-netbeans-modules-profiler_visualvm.jar 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\+README-WARNING+.txt 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\vlc-48.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\main_background.png 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00737_.WMF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00305_.WMF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21481_.GIF 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsBlankPage.html 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2560 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2616 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2668 vssvc.exe Token: SeRestorePrivilege 2668 vssvc.exe Token: SeAuditPrivilege 2668 vssvc.exe Token: SeBackupPrivilege 2792 wbengine.exe Token: SeRestorePrivilege 2792 wbengine.exe Token: SeSecurityPrivilege 2792 wbengine.exe Token: SeIncreaseQuotaPrivilege 2956 WMIC.exe Token: SeSecurityPrivilege 2956 WMIC.exe Token: SeTakeOwnershipPrivilege 2956 WMIC.exe Token: SeLoadDriverPrivilege 2956 WMIC.exe Token: SeSystemProfilePrivilege 2956 WMIC.exe Token: SeSystemtimePrivilege 2956 WMIC.exe Token: SeProfSingleProcessPrivilege 2956 WMIC.exe Token: SeIncBasePriorityPrivilege 2956 WMIC.exe Token: SeCreatePagefilePrivilege 2956 WMIC.exe Token: SeBackupPrivilege 2956 WMIC.exe Token: SeRestorePrivilege 2956 WMIC.exe Token: SeShutdownPrivilege 2956 WMIC.exe Token: SeDebugPrivilege 2956 WMIC.exe Token: SeSystemEnvironmentPrivilege 2956 WMIC.exe Token: SeRemoteShutdownPrivilege 2956 WMIC.exe Token: SeUndockPrivilege 2956 WMIC.exe Token: SeManageVolumePrivilege 2956 WMIC.exe Token: 33 2956 WMIC.exe Token: 34 2956 WMIC.exe Token: 35 2956 WMIC.exe Token: SeIncreaseQuotaPrivilege 2956 WMIC.exe Token: SeSecurityPrivilege 2956 WMIC.exe Token: SeTakeOwnershipPrivilege 2956 WMIC.exe Token: SeLoadDriverPrivilege 2956 WMIC.exe Token: SeSystemProfilePrivilege 2956 WMIC.exe Token: SeSystemtimePrivilege 2956 WMIC.exe Token: SeProfSingleProcessPrivilege 2956 WMIC.exe Token: SeIncBasePriorityPrivilege 2956 WMIC.exe Token: SeCreatePagefilePrivilege 2956 WMIC.exe Token: SeBackupPrivilege 2956 WMIC.exe Token: SeRestorePrivilege 2956 WMIC.exe Token: SeShutdownPrivilege 2956 WMIC.exe Token: SeDebugPrivilege 2956 WMIC.exe Token: SeSystemEnvironmentPrivilege 2956 WMIC.exe Token: SeRemoteShutdownPrivilege 2956 WMIC.exe Token: SeUndockPrivilege 2956 WMIC.exe Token: SeManageVolumePrivilege 2956 WMIC.exe Token: 33 2956 WMIC.exe Token: 34 2956 WMIC.exe Token: 35 2956 WMIC.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 624 wrote to memory of 2348 624 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 28 PID 624 wrote to memory of 2348 624 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 28 PID 624 wrote to memory of 2348 624 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 28 PID 624 wrote to memory of 2348 624 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 28 PID 2348 wrote to memory of 1680 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 30 PID 2348 wrote to memory of 1680 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 30 PID 2348 wrote to memory of 1680 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 30 PID 2348 wrote to memory of 1680 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 30 PID 1680 wrote to memory of 2560 1680 cmd.exe 32 PID 1680 wrote to memory of 2560 1680 cmd.exe 32 PID 1680 wrote to memory of 2560 1680 cmd.exe 32 PID 1680 wrote to memory of 2520 1680 cmd.exe 35 PID 1680 wrote to memory of 2520 1680 cmd.exe 35 PID 1680 wrote to memory of 2520 1680 cmd.exe 35 PID 1680 wrote to memory of 2956 1680 cmd.exe 39 PID 1680 wrote to memory of 2956 1680 cmd.exe 39 PID 1680 wrote to memory of 2956 1680 cmd.exe 39 PID 2348 wrote to memory of 2552 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 46 PID 2348 wrote to memory of 2552 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 46 PID 2348 wrote to memory of 2552 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 46 PID 2348 wrote to memory of 2552 2348 13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe 46 PID 2552 wrote to memory of 2616 2552 cmd.exe 48 PID 2552 wrote to memory of 2616 2552 cmd.exe 48 PID 2552 wrote to memory of 2616 2552 cmd.exe 48 PID 2552 wrote to memory of 2616 2552 cmd.exe 48 PID 2552 wrote to memory of 540 2552 cmd.exe 49 PID 2552 wrote to memory of 540 2552 cmd.exe 49 PID 2552 wrote to memory of 540 2552 cmd.exe 49 PID 2552 wrote to memory of 540 2552 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe"C:\Users\Admin\AppData\Local\Temp\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe"2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe" n23483⤵
- Executes dropped EXE
PID:1788
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2560
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:2520
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 5 & fsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe" & del /q /f "C:\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 54⤵
- Runs ping.exe
PID:2616
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=131072 "C:\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe"4⤵PID:540
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1824
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
1KB
MD55d377addd5fb119f9d200838847ff087
SHA18cdf851e8945d590a672a594cbce8fa354e4542e
SHA256dd62f39b01cf2120c9e21add9e80396b44704d3d9e5499de2ef26fa5824c10bb
SHA512c2779f2e5b30bd6d8337e6663cf17d4ae972f758a894d481b01b3d4f7336734259615592fb7a975b134f5cbc5db19647d26a32f7938c975c361c264d36eeae0c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
244B
MD57542d69e361272103915c36732e4651f
SHA1658ee67bde75570aecb40bd5952a47cedfd2500e
SHA256776157969336b81e839a9c4735ca9b1e540b99df84b2a15a661db729e2c19693
SHA512330f71824f26429bce5d9506818a885fdfd7445e9fb01d922eaf614cd16f911d7f4d739460d9b88390eff30f21fd26d7a8612e09502bfc6bd04733dd035d6ea6
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\13eb85d3fe56e7eaf0d63825f4f75bffe768fb6abf8c0bb8a7a4efe7452e72cb.exe
Filesize42KB
MD56096dec7644520ba1a4fdc04183bb62f
SHA1f0eae70b15d663787858a5cc24d8fdf21b67f225
SHA25668dd91e49256ee61ca05a5309db255e9ffe23e8df680ace95d48346e2a39c260
SHA5123680248b7ef0e7304268fa8b277f5c9d823c82185d0137bfa9d756ce9fb6406b1af0be5f4dfb73199a6ba4b175dbca97ac61600f140043a645279110750c8f05