Resubmissions
12-02-2024 06:06
240212-gtspasgb59 10Analysis
-
max time kernel
111s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe
Resource
win10v2004-20231222-en
General
-
Target
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe
-
Size
122KB
-
MD5
979635229dfcfae1aae74ae296ec78c8
-
SHA1
b4e0d9256b62868eb5c6f651ac4a154c6d71eb14
-
SHA256
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482
-
SHA512
6303685d772ec6760ef4cbb952c5fd11658b4d066e8c02ee0f491382f19650197b2c1e47ae01119f51d358252ed66a7934ca0865b82c356b03f8b323719a1d43
-
SSDEEP
1536:uhxOUyl20w8bVZQ40iMSO1fY+iUyQs2r8t5p1ySotICS4A6Udoah5Dta66GDReU6:yMhQNDEtb3AioaheW8NR
Malware Config
Extracted
C:\Recovery\xvma6ku645-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/877BFD63545BA860
http://decoder.re/877BFD63545BA860
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2692 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\t32mMaunsR = "C:\\Users\\Admin\\AppData\\Local\\Temp\\03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe" 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exedescription ioc process File opened (read-only) \??\K: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\P: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\G: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\J: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\T: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\B: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\R: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\Q: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\D: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\M: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\U: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\A: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\E: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\W: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\N: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\S: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\Y: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\Z: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\V: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\X: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\L: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\O: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\F: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\H: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened (read-only) \??\I: 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bs56e4mh332z.bmp" 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe -
Drops file in Program Files directory 24 IoCs
Processes:
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exedescription ioc process File opened for modification \??\c:\program files\SearchDisconnect.wav 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\SplitDeny.wmf 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File created \??\c:\program files\xvma6ku645-readme.txt 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File created \??\c:\program files (x86)\tmp 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File created \??\c:\program files (x86)\xvma6ku645-readme.txt 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\AssertWrite.vdx 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\ReadRename.wps 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\SubmitUninstall.ppsx 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\TestRemove.mpeg 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File created \??\c:\program files\tmp 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\AssertEnter.kix 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\DisconnectPop.wps 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\RenameMerge.docx 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\RestartRestore.3gpp 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\StartWatch.AAC 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\ConnectUse.xls 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\DismountSplit.xla 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\GrantExport.wdp 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\ReadAdd.raw 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\SkipReceive.wpl 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\AddInstall.nfo 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\EnterUnlock.wmf 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\UnblockSplit.xlsx 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe File opened for modification \??\c:\program files\UnprotectFind.i64 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 2 IoCs
Processes:
OpenWith.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exemsedge.exemsedge.exechrome.exepid process 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 1852 msedge.exe 1852 msedge.exe 4908 msedge.exe 4908 msedge.exe 4188 chrome.exe 4188 chrome.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exechrome.exepid process 4908 msedge.exe 4908 msedge.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exevssvc.exechrome.exedescription pid process Token: SeDebugPrivilege 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe Token: SeTakeOwnershipPrivilege 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe Token: SeBackupPrivilege 4988 vssvc.exe Token: SeRestorePrivilege 4988 vssvc.exe Token: SeAuditPrivilege 4988 vssvc.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
Processes:
msedge.exefirefox.exechrome.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 2072 firefox.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of SendNotifyMessage 49 IoCs
Processes:
msedge.exefirefox.exechrome.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 2072 firefox.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
firefox.exeOpenWith.exeOpenWith.exepid process 2072 firefox.exe 292 OpenWith.exe 4548 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exemsedge.exedescription pid process target process PID 3588 wrote to memory of 2692 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe netsh.exe PID 3588 wrote to memory of 2692 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe netsh.exe PID 3588 wrote to memory of 2692 3588 03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe netsh.exe PID 4908 wrote to memory of 4944 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4944 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2136 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1852 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1852 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2220 4908 msedge.exe msedge.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe"C:\Users\Admin\AppData\Local\Temp\03b5a7ffe111cca63fc687a295ba8075087cc90812f6b988797a2d49a5db1482.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes2⤵
- Modifies Windows Firewall
PID:2692
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4752
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cabf46f8,0x7ff8cabf4708,0x7ff8cabf47182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10691301532442679562,2841100356928909573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10691301532442679562,2841100356928909573,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10691301532442679562,2841100356928909573,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10691301532442679562,2841100356928909573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10691301532442679562,2841100356928909573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3820
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:3056
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2072.0.621215351\2072853436" -parentBuildID 20221007134813 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 20671 -prefMapSize 233414 -appDir "C:\Program Files\Mozilla Firefox\browser" - {18857ecb-0bfa-4d37-bdf3-158a39d13f35} 2072 "\\.\pipe\gecko-crash-server-pipe.2072" 1964 277120bae58 gpu3⤵PID:3920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2072.1.1449727765\217965744" -parentBuildID 20221007134813 -prefsHandle 2352 -prefMapHandle 2348 -prefsLen 20707 -prefMapSize 233414 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af06619e-93d1-4a53-87fb-8083490aa7d7} 2072 "\\.\pipe\gecko-crash-server-pipe.2072" 2364 27705671358 socket3⤵PID:2916
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:292
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\xvma6ku645-readme.txt1⤵PID:5104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4188 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8ca9b9758,0x7ff8ca9b9768,0x7ff8ca9b97782⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=2028,i,1586291673334409868,296628508143944081,131072 /prefetch:22⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=2028,i,1586291673334409868,296628508143944081,131072 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 --field-trial-handle=2028,i,1586291673334409868,296628508143944081,131072 /prefetch:82⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=2028,i,1586291673334409868,296628508143944081,131072 /prefetch:12⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=2028,i,1586291673334409868,296628508143944081,131072 /prefetch:12⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4660 --field-trial-handle=2028,i,1586291673334409868,296628508143944081,131072 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4932 --field-trial-handle=2028,i,1586291673334409868,296628508143944081,131072 /prefetch:12⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1908
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD56115b173d7f895c144bf1647bd48eb5f
SHA1aadfd627d86b601bb9ff766810cd83b7d3a360d4
SHA256bd227beed6e41b6227d9a4d73ff3c1c214e0fe60c9d6c90fccd31348f67c3819
SHA512bcfa431de5a475a09efc4f2768fa1236125a6690772d797d9f42a2d96875c7f5b0f6b6ec1a6cdc434d66d49ad6ea2939e3bfaeeb02e793f72148e3b4a9764d8c
-
Filesize
194KB
MD536104d04a9994182ba78be74c7ac3b0e
SHA10c049d44cd22468abb1d0711ec844e68297a7b3d
SHA256ccde155056cdce86d7e51dfd4e8fb603e8d816224b1257adfcf9503139dd28f1
SHA5128c115e3e5925fb01efd8dda889f4d5e890f6daaf40b10d5b8e3d9b19e15dadcb9dcf344f40c43f59a1f5428b3ee49e24e492cf0cb6826add1c03d21efdec52ba
-
Filesize
144B
MD51bbcebdf051a9afacf58a22901025b6f
SHA15dfe1134eb9fb48db77c2ab3fe48bc4117a1dabb
SHA2561e92871f4cb58ac3238131d074b177519b50d9a3d69f5d92cf25417a967cf329
SHA51279a27245f1a96e67d78da1a7d9cf13e8054112c8c5515532ba741ed40afc74b9bd91aded553bc9f8ddfbd0e58398d7eea42d4bfcb7e0a53b4d122312b2e4a5a2
-
Filesize
1KB
MD58f41c00c0ef510228ab0bdf42277b589
SHA1e56ce6d9a7f66b59c868f8b01d3c1f1fbbad25fa
SHA2566b1dc6f7d2e4d3f0a287dcd3c18335e2ab4590c2c4227b4b493a0eb0e319af93
SHA512571676430f191915a9b0d7782a258407773496b265f6c5dadc297deb779f165731eb15755af8f5b01f2021a1842bfba429b0bd549af860daf16f28e0604bc6c4
-
Filesize
371B
MD5e24f6563214e79616547e024fc453ac1
SHA14420386a1cacb12ab13ee46d4380ac805740b039
SHA2568890f45b4d5833db5c4899c061736e5cf254138a8d4c233cb36f8f0b63adf888
SHA512b761703c6f5933fb672aa3b22fff703c8dcfd2d87a03abd9813cc504e1468256307e8d00e424771a10ab027d9586a1b95803fefd7579de1eed167c393fcaf80e
-
Filesize
6KB
MD576ec18661ae74cb6d4508c30a9c571e0
SHA1a824669cd5d8c855dd32caaa7bf3deb3fc108635
SHA256fd956ae708ab7d92fa8144c6cc7da64bc549695a5efa567d90b37d3efeb35c77
SHA512e7a0373b0b08603bda6afa74ccdfe53e90b9d71207730c793dd535d0b1ad4b541a9fc49ce9295c90784656afc884512a805ef1a829c6217750a4ef915c924420
-
Filesize
239KB
MD5258930ee5ce2eb6ca51d8c1f8c3d27cc
SHA16658e757536ac0e2c1ec977263c3460f3de0c37d
SHA256e3c72f90da2aeba98c00b286efaa889adc0498abb16c6bdd6e6b549d5d5c0582
SHA51241d77bff173ba3f4b66b033c031f7633c7bd0e0400cc4749b92f518792d4bdc5f7392142e9638b1687e5b74aba764391abb8a9f7583480bdc83d496967edbfe0
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
5KB
MD52a6953a8fa3354c1e25e04038fde3312
SHA1856750b1b2130d28c6751fce39679bdb7f19f1bd
SHA256a4c25e7c77359de8c4ca60d3f4d150239d49f32e6d4a74d1b1b124bc547e18e5
SHA512b059ea3ddf8d19b1a44db9263ba386b786bc6e178b145d25a36b3c4f1906939d4b1b59b080a6528393d71b89519a3f7663a396bc550a0a52cb2a7da6e23d4a4a
-
Filesize
5KB
MD5ec3b653569a73c7e3244f73bca086019
SHA19b758a7caa65c6e4e2a3efe2403f9bd84d2ee20e
SHA2562e1736b5b80aa013f77c85f727a70dfc4331e86e92cb15be7514b4f239531307
SHA512caf42977ee1dd85440ec3b10a01007046852cf15a880b660a8ac732eb5aa5a242b26eede676c84bdeaa52e31a427991eef32fbb90c57b083e1f9570ab0101384
-
Filesize
24KB
MD5da501e07c2e4f0c56da44d46d614a406
SHA19624e765801de7e06f8df24ef37a54ac21297c65
SHA256801e3e8abcaa2e4101192ab3f30c4fd1cc9a3c688df4e1cc33234d975a17aac0
SHA512db90caa2a15943bbc197446fed2598dfe230ca0d5e0f0a40501a4b8bc02be3027dc5a53a4b72cd2926e68372b68dd26dd5cdfe741f0de1efce1ea70adc7df1ae
-
Filesize
10KB
MD55c96bc01dd8180759cc91dd7d00e196e
SHA1f246a169559992aa8b9b47a6fba05e05eecb83dd
SHA256039340c56ea9125849cf1bb5346eb6d6fe4aa9f0a4e11684476f2a4d0f80ef93
SHA51295a8d42912f8221883e50e88c3491554f5c9b7189790b5268a9c606aa00f4651aa6b3356907ef44b2507908f16090b013f76b62707e9c62992853d20d6c5f234
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e