Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe
Resource
win10v2004-20240226-en
General
-
Target
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe
-
Size
151KB
-
MD5
a7f0dd0cb9991516f790ec44755409b5
-
SHA1
18d6987544371b43ce3248d159cef229d63025bf
-
SHA256
a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274
-
SHA512
42033b2a96e6c1a048c85b199b57a0dd75dacc4e0ef1efd031d384fd6d64a7e1ec5e8d18a595de571229b75da7d7bc92b64cc00d8554cac6bfe4d09544fbb741
-
SSDEEP
3072:N+PpToisYIJJPuQJvYEnpZXNF+1/TniPnJptO/YfSzlMPCS1:NqoVYSPfRZX/sTiPnPtO2gGCS1
Malware Config
Signatures
-
Renames multiple (7431) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1616 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 Brlg.sys -
Loads dropped DLL 1 IoCs
pid Process 1748 cmd.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\B: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\K: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\Z: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\H: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\D: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\U: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\X: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\J: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\M: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\G: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\L: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\R: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\T: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\V: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\E: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\S: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\Y: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\I: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\F: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\N: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\O: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\W: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\A: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened (read-only) \??\P: a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01746_.GIF.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OMSINTL.DLL.IDX_DLL.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Midway.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-uisupport.xml.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactLowMask.bmp a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_TexturedBlue.gif.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Angles.thmx.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jre7\lib\tzmappings.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ClassicPhotoAlbum.potx.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\BlackStore_Help.txt a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLWVW.DLL.IDX_DLL a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\BlackStore_Help.txt a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199727.WMF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Priority.accft.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-compat_ja.jar.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\vlc.mo a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-outline_ja.jar a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\vlc.mo.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\TAB_OFF.GIF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GRAPH_F_COL.HXK.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR37F.GIF.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115865.GIF.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\REPORT.CFG.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zx______.pfm.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Dawson a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Niue.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-dialogs.xml a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcatsh.dat a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382944.JPG.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861240389.profile.gz a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198234.WMF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IpsMigrationPlugin.dll.mui a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\BlackStore_Help.txt a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106208.WMF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00136_.WMF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Technic.xml.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\ARCTIC.ELM a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR35B.GIF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Medium.jpg a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\macroprogress.gif a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DATE.JPG.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File created C:\Program Files\VideoLAN\VLC\BlackStore_Help.txt a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Aspect.thmx a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Oriel.xml.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Invite or Link.one a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBBTN.XML a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipRes.dll.mui a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf_3.4.0.v20140827-1444.jar a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ust-Nera.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00130_.GIF.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0212601.WMF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\org-netbeans-modules-profiler_visualvm.jar a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Honolulu a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File created C:\Program Files\Microsoft Games\Solitaire\fr-FR\BlackStore_Help.txt a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\BlackStore_Help.txt a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151041.WMF a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\RICEPAPR.ELM a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Phoenix.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.SYX a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Tags.accft a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Pohnpei.BlackStore a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\BlackStore_Help.txt a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2628 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe Token: SeRestorePrivilege 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe Token: SeBackupPrivilege 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe Token: SeTakeOwnershipPrivilege 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe Token: SeAuditPrivilege 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe Token: SeSecurityPrivilege 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe Token: SeIncBasePriorityPrivilege 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe Token: SeBackupPrivilege 2564 vssvc.exe Token: SeRestorePrivilege 2564 vssvc.exe Token: SeAuditPrivilege 2564 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2600 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 29 PID 1768 wrote to memory of 2600 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 29 PID 1768 wrote to memory of 2600 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 29 PID 1768 wrote to memory of 2600 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 29 PID 2600 wrote to memory of 3032 2600 cmd.exe 31 PID 2600 wrote to memory of 3032 2600 cmd.exe 31 PID 2600 wrote to memory of 3032 2600 cmd.exe 31 PID 2600 wrote to memory of 3032 2600 cmd.exe 31 PID 1768 wrote to memory of 1748 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 39 PID 1768 wrote to memory of 1748 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 39 PID 1768 wrote to memory of 1748 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 39 PID 1768 wrote to memory of 1748 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 39 PID 1768 wrote to memory of 2004 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 40 PID 1768 wrote to memory of 2004 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 40 PID 1768 wrote to memory of 2004 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 40 PID 1768 wrote to memory of 2004 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 40 PID 1768 wrote to memory of 1616 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 43 PID 1768 wrote to memory of 1616 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 43 PID 1768 wrote to memory of 1616 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 43 PID 1768 wrote to memory of 1616 1768 a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe 43 PID 2004 wrote to memory of 3032 2004 cmd.exe 44 PID 2004 wrote to memory of 3032 2004 cmd.exe 44 PID 2004 wrote to memory of 3032 2004 cmd.exe 44 PID 2004 wrote to memory of 3032 2004 cmd.exe 44 PID 1748 wrote to memory of 3024 1748 cmd.exe 46 PID 1748 wrote to memory of 3024 1748 cmd.exe 46 PID 1748 wrote to memory of 3024 1748 cmd.exe 46 PID 1748 wrote to memory of 3024 1748 cmd.exe 46 PID 1616 wrote to memory of 2628 1616 cmd.exe 47 PID 1616 wrote to memory of 2628 1616 cmd.exe 47 PID 1616 wrote to memory of 2628 1616 cmd.exe 47 PID 1616 wrote to memory of 2628 1616 cmd.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe"C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe" /F3⤵
- Creates scheduled task(s)
PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Brlg.sys"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\ProgramData\Brlg.sysC:\ProgramData\Brlg.sys3⤵
- Executes dropped EXE
PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Update BETA" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Update BETA" /F3⤵PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\a6dee670cff835d8cd8fab4b7c46ae63dd6c7b82c8a42b217a69ca89a12ff274.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2628
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550B
MD5a6a00a9a281b2517364ec50b37871686
SHA143e5981a42e68e9720583deca079c46f91d245b6
SHA256e028ecf6ea7087c5ced220129bae624b23cb75336404201c66fa6794324ed7a3
SHA512af6b0c680a9fbfd452a28d9f4c01157d389fbcce8e6d0a0c32c7d2b8ce67c70ae9af1d07be6c7c778e7b7cdf2e261009a68edac233b2c166c6308c30c69ac0bd
-
Filesize
5KB
MD5ab65af4349e7c5b0872c8b808d036980
SHA1414b2a2748b7ea6176c1d2453f89fdc8a2d349d0
SHA256a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2
SHA5122c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679