Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe
Resource
win10v2004-20231215-en
General
-
Target
8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe
-
Size
337KB
-
MD5
5ffeb931b50e87b4916efeff6d5dfc5f
-
SHA1
fffde47659b90a099808f72655ca479c9d808ba2
-
SHA256
8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24
-
SHA512
69303d78fb5072f24493832959b96e3450a5d977324895d4f38ee066b1ab047e58f645689b9937d600c3ec3ceb9eb13efd162bbd0dec1798231a21ffb7e519b7
-
SSDEEP
6144:Z10d91SHBFBnJwsOE/4tHzhvN3zXPyWYoJulae92:Z7HBFBnOc/4tHddz/yLv
Malware Config
Extracted
F:\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2536 bcdedit.exe 2600 bcdedit.exe -
Renames multiple (2697) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Loads dropped DLL 11 IoCs
pid Process 1844 MsiExec.exe 1844 MsiExec.exe 1844 MsiExec.exe 1844 MsiExec.exe 1844 MsiExec.exe 1844 MsiExec.exe 1176 msiexec.exe 1176 msiexec.exe 2872 MsiExec.exe 1176 msiexec.exe 1176 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\R: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\U: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\I: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\J: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\K: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\Y: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\A: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\O: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\V: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\Q: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\S: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\X: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\G: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\M: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\D: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\W: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\Z: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_super.gif 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Scoresbysund 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HTECH_01.MID 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099150.JPG 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107182.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCHDRESN.CFG 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Panama 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099154.JPG 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239057.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Manaus 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02417_.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0212701.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTFORM.DAT 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\attention.gif 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop.wmv 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0158007.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File created C:\Program Files\VideoLAN\VLC\locale\is\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB11.BDR 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105276.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0301432.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00734_.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00610_.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00211_.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\tab_on.gif 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CERT.XML 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099196.GIF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.ja_5.5.0.165303.jar 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01084_.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00011_.GIF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\Chess.exe.mui 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187859.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.IE.XML 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jdwpTransport.h 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Memories_buttonClear.png 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Gibraltar 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ROMAN.TXT 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01299_.GIF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\TAB_ON.GIF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_SelectionSubpicture.png 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-core_ja.jar 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299763.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieResume.dotx 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\HOW TO BACK FILES.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00135_.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExpenseReport.xltx 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Hovd 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\vlm.xml 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01181_.WMF 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Concourse.eftx 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_SelectionSubpicture.png 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Installer\f7611eb.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI1306.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI1558.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI15E6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1664.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI16F1.tmp msiexec.exe File opened for modification C:\Windows\Installer\f7611eb.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI1239.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI12D6.tmp msiexec.exe File created C:\Windows\Installer\f7611ef.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI15D6.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 1176 msiexec.exe 1176 msiexec.exe 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 1176 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeDebugPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Token: SeTakeOwnershipPrivilege 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2892 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 28 PID 2272 wrote to memory of 2892 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 28 PID 2272 wrote to memory of 2892 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 28 PID 2272 wrote to memory of 2936 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 30 PID 2272 wrote to memory of 2936 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 30 PID 2272 wrote to memory of 2936 2272 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe 30 PID 2892 wrote to memory of 2536 2892 cmd.exe 32 PID 2892 wrote to memory of 2536 2892 cmd.exe 32 PID 2892 wrote to memory of 2536 2892 cmd.exe 32 PID 2936 wrote to memory of 2600 2936 cmd.exe 33 PID 2936 wrote to memory of 2600 2936 cmd.exe 33 PID 2936 wrote to memory of 2600 2936 cmd.exe 33 PID 1176 wrote to memory of 1844 1176 msiexec.exe 36 PID 1176 wrote to memory of 1844 1176 msiexec.exe 36 PID 1176 wrote to memory of 1844 1176 msiexec.exe 36 PID 1176 wrote to memory of 1844 1176 msiexec.exe 36 PID 1176 wrote to memory of 1844 1176 msiexec.exe 36 PID 1176 wrote to memory of 1844 1176 msiexec.exe 36 PID 1176 wrote to memory of 1844 1176 msiexec.exe 36 PID 1176 wrote to memory of 2872 1176 msiexec.exe 37 PID 1176 wrote to memory of 2872 1176 msiexec.exe 37 PID 1176 wrote to memory of 2872 1176 msiexec.exe 37 PID 1176 wrote to memory of 2872 1176 msiexec.exe 37 PID 1176 wrote to memory of 2872 1176 msiexec.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "1" 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe"C:\Users\Admin\AppData\Local\Temp\8e826361942a80ad091ebd86b78d5cd66de8e65608a69a6f26b7a9b1ace99a24.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2600
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding ADE1538CA7A5FCBBE92218332E24B2472⤵
- Loads dropped DLL
PID:1844
-
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 96525174C789712727A7DA03C439A8BA2⤵
- Loads dropped DLL
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
28KB
MD585221b3bcba8dbe4b4a46581aa49f760
SHA1746645c92594bfc739f77812d67cfd85f4b92474
SHA256f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f
SHA512060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
1KB
MD5768365a6f2fd3c95ae64e723c02cc71d
SHA148ff0a97025839adf1eaef13395c8c7add7e56f7
SHA256c109244ce1c69fc883f79ccdd0b319604456cbf9d2044d0c320bbffac61676ea
SHA512046171f03946920aa40f5e66ea589ecd1a4db345ffe994b0444e1d87a77f6213733275144c39d88900ec308ff3d424be895814fdb187baf9f668b10a10b8bc09
-
Filesize
2.0MB
MD590337628f1e989316f1347b71356276c
SHA1a856f464469a08cadfea5a4dcad45ee80f06a74d
SHA25602af0bc52cf2dda77f672a7e93099f4de511436ea3c3a2308d2bbe90788d06e3
SHA51271dc61de5888ab4e642970928eb91a2e555ad9d538a7cbc09b12d8f0f268683d0c7ebf4fd5dca61db58b94edd397d75ec241885aef016d3ed1d8ecc27131c779
-
Filesize
86KB
MD5ff58cd07bf4913ef899efd2dfb112553
SHA1f14c1681de808543071602f17a6299f8b4ba2ae8
SHA2561afafe9157ff5670bbec8ce622f45d1ce51b3ee77b7348d3a237e232f06c5391
SHA51223e27444b6cdc17fe56f3a80d6325c2be61ae84213bc7cdaad7bb96daa7e8d2d3defc1b96c3cee4a3f32dc464b0e05720bcf1c0e99626bf83de1b6d5aac000a3