Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe
Resource
win10v2004-20240226-en
General
-
Target
7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe
-
Size
151KB
-
MD5
31ed39e13ae9da7fa610f85b56838dde
-
SHA1
ff602997ce7bdd695a282bd373daf57bea7a051f
-
SHA256
7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f
-
SHA512
199d70b70636555fbe753e83662cc672b5b06428050229856e9912488037cb4dae34a0766c3fcc560afd8fb07a4dcb5cfd8435a0fe3db86484a7929218cab5ee
-
SSDEEP
3072:lAMP+TYgJWo6QD6ivAFvvYknplbZVaX6TEQZwRNfysqdoTPwum3n:OZNMnQFvM/lbbHTFZw/fLm3n
Malware Config
Signatures
-
Renames multiple (7791) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 332 LPW4.tmp -
Loads dropped DLL 1 IoCs
pid Process 1812 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\Q: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\S: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\F: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\O: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\V: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\D: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\A: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\E: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\X: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\Y: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\W: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\B: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\N: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\P: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\T: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\G: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\H: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\M: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\U: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\L: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\R: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\Z: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\J: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened (read-only) \??\K: 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\eo.txt.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\ShvlRes.dll.mui.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kathmandu.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\RELAY.CER 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341557.JPG 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21296_.GIF.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\picturePuzzle.html 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.sat4j.core_2.3.5.v201308161310.jar 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-ui.xml 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00965_.WMF 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\ShapeCollector.exe.mui 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\classlist.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\PROFILE.ELM 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-spi-quicksearch_zh_CN.jar 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME44.CSS.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PSRCHSRN.DAT 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-oql.xml.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_choosefont.gif 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0294991.WMF.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_up_BIDI.png 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Sakhalin 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\HEADER.GIF 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\slideShow.css 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\RELEASE-NOTES.html.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099195.GIF.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.operations_2.4.0.v20131119-0908.jar 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Manila 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic_5.5.0.165303.jar.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zx______.pfm.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FINCL_02.MID.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02413_.WMF 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\InformationIcon.jpg 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\UTC 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File created C:\Program Files\Microsoft Games\Hearts\CYLANCE_README.txt 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\dt.jar 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0286068.WMF.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14756_.GIF.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\localizedSettings.css 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0324704.WMF 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\CYLANCE_README.txt 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\0.png 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Dawson_Creek 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105240.WMF 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT_F_COL.HXK 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\SEAMARBL.JPG 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierDisableUpArrow.jpg 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01060_.WMF 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0222019.WMF.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR31F.GIF.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\MMSL.ICO.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Yakutsk.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup.xml.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTIRM.XML 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196354.WMF 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginLetter.Dotx.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_top_right.png 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\CYLANCE_README.txt 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\CYLANCE_README.txt 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\vlc.mo 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\weather.js 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_ja.jar.Cylance 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1488 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe Token: SeRestorePrivilege 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe Token: SeBackupPrivilege 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe Token: SeTakeOwnershipPrivilege 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe Token: SeAuditPrivilege 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe Token: SeSecurityPrivilege 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe Token: SeIncBasePriorityPrivilege 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe Token: SeBackupPrivilege 2656 vssvc.exe Token: SeRestorePrivilege 2656 vssvc.exe Token: SeAuditPrivilege 2656 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2176 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 29 PID 1700 wrote to memory of 2176 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 29 PID 1700 wrote to memory of 2176 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 29 PID 1700 wrote to memory of 2176 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 29 PID 2176 wrote to memory of 2640 2176 cmd.exe 31 PID 2176 wrote to memory of 2640 2176 cmd.exe 31 PID 2176 wrote to memory of 2640 2176 cmd.exe 31 PID 2176 wrote to memory of 2640 2176 cmd.exe 31 PID 1700 wrote to memory of 1812 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 37 PID 1700 wrote to memory of 1812 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 37 PID 1700 wrote to memory of 1812 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 37 PID 1700 wrote to memory of 1812 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 37 PID 1700 wrote to memory of 2340 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 38 PID 1700 wrote to memory of 2340 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 38 PID 1700 wrote to memory of 2340 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 38 PID 1700 wrote to memory of 2340 1700 7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe 38 PID 1812 wrote to memory of 332 1812 cmd.exe 41 PID 1812 wrote to memory of 332 1812 cmd.exe 41 PID 1812 wrote to memory of 332 1812 cmd.exe 41 PID 1812 wrote to memory of 332 1812 cmd.exe 41 PID 2340 wrote to memory of 1824 2340 cmd.exe 42 PID 2340 wrote to memory of 1824 2340 cmd.exe 42 PID 2340 wrote to memory of 1824 2340 cmd.exe 42 PID 2340 wrote to memory of 1824 2340 cmd.exe 42 PID 332 wrote to memory of 576 332 LPW4.tmp 45 PID 332 wrote to memory of 576 332 LPW4.tmp 45 PID 332 wrote to memory of 576 332 LPW4.tmp 45 PID 332 wrote to memory of 576 332 LPW4.tmp 45 PID 576 wrote to memory of 1488 576 cmd.exe 47 PID 576 wrote to memory of 1488 576 cmd.exe 47 PID 576 wrote to memory of 1488 576 cmd.exe 47 PID 576 wrote to memory of 1488 576 cmd.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe"C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\7a5e813ec451cde49346d7e18aca31065846cafe52d88d08918a297196a6a49f.exe" /F3⤵
- Creates scheduled task(s)
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\LPW4.tmp"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\ProgramData\LPW4.tmpC:\ProgramData\LPW4.tmp3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 5 > nul & del "C:\ProgramData\LPW4.tmp"4⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 55⤵
- Runs ping.exe
PID:1488
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Update BETA" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Update BETA" /F3⤵PID:1824
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561348b179cef64a54515a52655438f3c
SHA19a8ba7251b8a3df3e70b9d979c115d5daafa0be9
SHA256c20e8f0ee899a3ade4307cb34e9119ed428a290fab7b54e6bb7a88c0113131a7
SHA5126b8e84adb8d50b7ff8751f6040f838e55ee94fb4a3e3cde084fdcf6b41e9af045d58f296f642f5794cda805f62bd00e546af38c33e132311d022a22300c0703a
-
Filesize
5KB
MD5ab65af4349e7c5b0872c8b808d036980
SHA1414b2a2748b7ea6176c1d2453f89fdc8a2d349d0
SHA256a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2
SHA5122c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679