Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
Resource
win10v2004-20240226-en
General
-
Target
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
-
Size
370KB
-
MD5
7219e5aa812c246f68f63491ccdb9f77
-
SHA1
fcf0be55446d921b89c645e6ae5db56d3ceeec84
-
SHA256
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1
-
SHA512
99f1e14f5b54806432cd0beb4555d26f5b6f9ffa0a105b869195a8dfd8f67c98d6e8a09808cb0e70024c63b1e92ae8dd64c3ae3e8e80dea7c05f3180eb6b1cdf
-
SSDEEP
6144:50H9JCRYd6SkwEcXDVVArElO2Z3WhrGJpVxFW5cQZ2BCn:AJSYd6SJxhVArELBWhGJpVaNEy
Malware Config
Extracted
F:\$RECYCLE.BIN\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2608 bcdedit.exe 2740 bcdedit.exe -
Renames multiple (7254) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\J: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\K: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\O: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\P: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\S: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\T: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\U: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\A: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\I: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\L: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\M: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\Q: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\X: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\D: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\E: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\B: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\G: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\N: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\R: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\V: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\W: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\Y: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\Z: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.sat4j.pb_2.3.5.v201404071733.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EST5EDT f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00160_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107280.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02265_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME15.CSS f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\boot.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01357_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00222_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01563_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Waveform.xml f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR4F.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.update.configurator.nl_ja_4.4.0.v20140623020002.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.filetransfer_5.0.0.v20140827-1444.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_SelectionSubpicture.png f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Hovd f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01178_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\utilityfunctions.js f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl.css f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Vostok f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\localedata.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIDEBARBB.DPV f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Memories_buttonClear.png f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Discussion.gta f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Toronto f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Guam f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.jsp.jasper_1.0.400.v20130327-1442.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_win7.css f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099149.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02829J.JPG f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02068_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Antigua f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Maceio f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FLAP.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313896.JPG f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199283.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART8.BDR f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_CopyNoDrop32x32.gif f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.VisualElementsManifest.xml f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\vlc.mo f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7ge.kic f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00546_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02446_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\BUTTON.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ZoomIcons.jpg f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MENU98.POC f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\Maple.gif f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\wmlaunch.exe.mui f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.zh_CN_5.5.0.165303.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\vlc.mo f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\ui.js f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00297_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeDebugPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1548 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 28 PID 2916 wrote to memory of 1548 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 28 PID 2916 wrote to memory of 1548 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 28 PID 2916 wrote to memory of 2004 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 30 PID 2916 wrote to memory of 2004 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 30 PID 2916 wrote to memory of 2004 2916 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 30 PID 1548 wrote to memory of 2608 1548 cmd.exe 32 PID 1548 wrote to memory of 2608 1548 cmd.exe 32 PID 1548 wrote to memory of 2608 1548 cmd.exe 32 PID 2004 wrote to memory of 2740 2004 cmd.exe 33 PID 2004 wrote to memory of 2740 2004 cmd.exe 33 PID 2004 wrote to memory of 2740 2004 cmd.exe 33 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe"C:\Users\Admin\AppData\Local\Temp\f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5931110ea113bba486f1da440b9812dfd
SHA1fbfb286a9a348086767094181762f484c50a1698
SHA256a19e30ac2cc5d93c307d113c876ea8516a5e1d0484c5eaf9c44854605fcfa91e
SHA512464b37a2c89d6b559372c0e6dad3645a3119e7523132b66aff82c20c9367bbfbe2308118d04a2565668e3e74e6bf4525353ed0982566b96416f812b4f0001814