Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 23:12
Behavioral task
behavioral1
Sample
da13022097518d123a91a3958be326da.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
da13022097518d123a91a3958be326da.exe
Resource
win10v2004-20240226-en
General
-
Target
da13022097518d123a91a3958be326da.exe
-
Size
884KB
-
MD5
da13022097518d123a91a3958be326da
-
SHA1
24a71ab462594d5a159bbf176588af951aba1381
-
SHA256
25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5
-
SHA512
a82aa97a92cd21ee2d4b556448fd3293396eb7c01d3626ebdb6c3816277783578686830c430014b6b2fc3280bc1301df27da079937f88834c2d35641eb5fc26f
-
SSDEEP
12288:Sw41dVZvThPCsM18GLHe7wlDdkPAQEtxr0fflvRmhEBWtdUJiAUtP/T/kAfMvgVt:dod1HDmlDdkZ4YXPpaTTXMw
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\EGdu_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2724 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2304 wevtutil.exe 752 wevtutil.exe 2036 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1552-0-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-1-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-2-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-5-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-6-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-24-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-145-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-1663-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-2716-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-3426-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-3467-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-4589-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-5618-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-7179-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-7815-0x0000000000200000-0x0000000000512000-memory.dmp upx behavioral1/memory/1552-8005-0x0000000000200000-0x0000000000512000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\jfluid-server_zh_CN.jar.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwXdVFkIEd47W9fom_9-gZgS.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\picturePuzzle.js da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239951.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVEg2NHqOFjOb_umU91WGwJ.uj1ps da13022097518d123a91a3958be326da.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\EGdu_HOW_TO_DECRYPT.txt da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqlxmlx.rll.mui da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmplayer.exe.mui da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\THMBNAIL.PNG.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVrs26QlLpwdkh6r9qpKCN2.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08758_.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwXNfI6mjWu0Fzn2Eq-53-Ed.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01046J.JPG.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVHB1t6tizGcdWcEncoSLUj.uj1ps da13022097518d123a91a3958be326da.exe File created C:\Program Files\Java\jre7\lib\images\cursors\EGdu_HOW_TO_DECRYPT.txt da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4ADT.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwXMbhV1RqHYE8rhh6b6G94k.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_ja_4.4.0.v20140623020002.jar.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwX_8oYtREbvOV5YIQclofAs.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18252_.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwUz3A7OKQoCS0yHI-VFVqZk.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\computericon.jpg.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwW9FenIMv5lfymSkQ2YGqUo.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NEWS.DPV.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVOQbWM01laHIwpPqln2ktG.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV.HXS.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWCTpG2JkRSeWRw5fO7lEEO.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_Premium.gif.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWrevRj7udYB0XqQ0igXGp4.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR23F.GIF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwX_nXxyro7AbJk2UE6yuoAE.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\flyout.html da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jvmti.h.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWvNXj5QNF8SxqLh8ywOnp5.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.nl_ja_4.4.0.v20140623020002.jar.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVs877sY8HYXobgF8SOiOxd.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\row_over.png da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.sig da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00172_.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwUUShDW8kXpEZJZQdNifUgB.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_05.MID.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVuD7JZztfmb0U80OaeXb8m.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\OFFICE10.MMW.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwU9Dl2--8w-faYNYAuenBIl.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVmczG177NrNv22ugA8FUIS.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\de-DE\msaddsr.dll.mui da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02055_.GIF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwUwoI63Wy8wM5hdRAQnf_90.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Auto.jpg.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwXJgqWgnGxNOU6a_rSpgTxJ.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\clock.css da13022097518d123a91a3958be326da.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\EGdu_HOW_TO_DECRYPT.txt da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVYH7iQQeVGAlCf2M_W3Q5j.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox.nl_zh_4.4.0.v20140623020002.jar.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwV5No-uGVepXT-sXF7NnlZj.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator.nl_ja_4.4.0.v20140623020002.jar.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwUz-K0GZRUQfbIiI6DCdNV3.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\SpiderSolitaire.exe.mui.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwXKR9gh87ttJGFAz1h7qsdn.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-It.otf.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwX4egYHmKBVTlBv9DW5YqMO.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0233018.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWpSNR-W2LcNXjwboyCV-Ad.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginMergeLetter.Dotx.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVT4ilGN9wpCEL91XFuMf0r.uj1ps da13022097518d123a91a3958be326da.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\EGdu_HOW_TO_DECRYPT.txt da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-templates.xml.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwXq1vDRV4b8CP4M9w4wBAdR.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh88.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWmeUP_0VsWUCP2JCNJTbYb.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN01165_.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwX_q-pKE-IqI1EqV_o1To40.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199727.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWWjdGlzCDBXmWgyAg-E1ku.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15169_.GIF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwU0s5CLapPSHmswyTIv8U4m.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR7F.GIF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVce-M36oybYy0_O4Fn59Z7.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Internet Explorer\en-US\networkinspection.dll.mui da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_ja.jar.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwX7a0pYWpApM7oaf8GNYIwt.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\library.js da13022097518d123a91a3958be326da.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\EGdu_HOW_TO_DECRYPT.txt da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\ECLIPSE_.RSA.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwUSr2Qma2NlJJCX1sGxulw1.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_left.png da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00267_.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwUkz-uwyGekYQa1hcjMyrsh.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185818.WMF.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWWb42cRJosSBwCoA1Pk5MT.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_flyout.png da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-util-enumerations_ja.jar.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwVzBt6X-3gJFiKyPx03BA8S.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Java\jre7\COPYRIGHT.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwWZxT0Jcuh4DG68ugweJst7.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwU8D14VtOgdNoVjvILJMGkF.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\settings.html da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-full_partly-cloudy.png da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange.css.wqqPLPgeOAEgpB2GP05EhgjX1X5o6bHCVaIDBtVpbwU0DJ2x2eaOFQVAQzIkLrYr.uj1ps da13022097518d123a91a3958be326da.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\gadget.xml da13022097518d123a91a3958be326da.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 756 sc.exe 824 sc.exe 2692 sc.exe 2796 sc.exe 2828 sc.exe 2872 sc.exe 1976 sc.exe 1624 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2948 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2616 powershell.exe 476 powershell.exe 1552 da13022097518d123a91a3958be326da.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeSecurityPrivilege 2304 wevtutil.exe Token: SeBackupPrivilege 2304 wevtutil.exe Token: SeSecurityPrivilege 752 wevtutil.exe Token: SeBackupPrivilege 752 wevtutil.exe Token: SeSecurityPrivilege 2036 wevtutil.exe Token: SeBackupPrivilege 2036 wevtutil.exe Token: SeIncreaseQuotaPrivilege 632 wmic.exe Token: SeSecurityPrivilege 632 wmic.exe Token: SeTakeOwnershipPrivilege 632 wmic.exe Token: SeLoadDriverPrivilege 632 wmic.exe Token: SeSystemProfilePrivilege 632 wmic.exe Token: SeSystemtimePrivilege 632 wmic.exe Token: SeProfSingleProcessPrivilege 632 wmic.exe Token: SeIncBasePriorityPrivilege 632 wmic.exe Token: SeCreatePagefilePrivilege 632 wmic.exe Token: SeBackupPrivilege 632 wmic.exe Token: SeRestorePrivilege 632 wmic.exe Token: SeShutdownPrivilege 632 wmic.exe Token: SeDebugPrivilege 632 wmic.exe Token: SeSystemEnvironmentPrivilege 632 wmic.exe Token: SeRemoteShutdownPrivilege 632 wmic.exe Token: SeUndockPrivilege 632 wmic.exe Token: SeManageVolumePrivilege 632 wmic.exe Token: 33 632 wmic.exe Token: 34 632 wmic.exe Token: 35 632 wmic.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 476 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2584 1552 da13022097518d123a91a3958be326da.exe 28 PID 1552 wrote to memory of 2584 1552 da13022097518d123a91a3958be326da.exe 28 PID 1552 wrote to memory of 2584 1552 da13022097518d123a91a3958be326da.exe 28 PID 1552 wrote to memory of 2584 1552 da13022097518d123a91a3958be326da.exe 28 PID 2584 wrote to memory of 2456 2584 net.exe 30 PID 2584 wrote to memory of 2456 2584 net.exe 30 PID 2584 wrote to memory of 2456 2584 net.exe 30 PID 2584 wrote to memory of 2456 2584 net.exe 30 PID 1552 wrote to memory of 2612 1552 da13022097518d123a91a3958be326da.exe 31 PID 1552 wrote to memory of 2612 1552 da13022097518d123a91a3958be326da.exe 31 PID 1552 wrote to memory of 2612 1552 da13022097518d123a91a3958be326da.exe 31 PID 1552 wrote to memory of 2612 1552 da13022097518d123a91a3958be326da.exe 31 PID 2612 wrote to memory of 2716 2612 net.exe 33 PID 2612 wrote to memory of 2716 2612 net.exe 33 PID 2612 wrote to memory of 2716 2612 net.exe 33 PID 2612 wrote to memory of 2716 2612 net.exe 33 PID 1552 wrote to memory of 2836 1552 da13022097518d123a91a3958be326da.exe 34 PID 1552 wrote to memory of 2836 1552 da13022097518d123a91a3958be326da.exe 34 PID 1552 wrote to memory of 2836 1552 da13022097518d123a91a3958be326da.exe 34 PID 1552 wrote to memory of 2836 1552 da13022097518d123a91a3958be326da.exe 34 PID 2836 wrote to memory of 2472 2836 net.exe 36 PID 2836 wrote to memory of 2472 2836 net.exe 36 PID 2836 wrote to memory of 2472 2836 net.exe 36 PID 2836 wrote to memory of 2472 2836 net.exe 36 PID 1552 wrote to memory of 2720 1552 da13022097518d123a91a3958be326da.exe 37 PID 1552 wrote to memory of 2720 1552 da13022097518d123a91a3958be326da.exe 37 PID 1552 wrote to memory of 2720 1552 da13022097518d123a91a3958be326da.exe 37 PID 1552 wrote to memory of 2720 1552 da13022097518d123a91a3958be326da.exe 37 PID 2720 wrote to memory of 2500 2720 net.exe 39 PID 2720 wrote to memory of 2500 2720 net.exe 39 PID 2720 wrote to memory of 2500 2720 net.exe 39 PID 2720 wrote to memory of 2500 2720 net.exe 39 PID 1552 wrote to memory of 1212 1552 da13022097518d123a91a3958be326da.exe 40 PID 1552 wrote to memory of 1212 1552 da13022097518d123a91a3958be326da.exe 40 PID 1552 wrote to memory of 1212 1552 da13022097518d123a91a3958be326da.exe 40 PID 1552 wrote to memory of 1212 1552 da13022097518d123a91a3958be326da.exe 40 PID 1212 wrote to memory of 2444 1212 net.exe 42 PID 1212 wrote to memory of 2444 1212 net.exe 42 PID 1212 wrote to memory of 2444 1212 net.exe 42 PID 1212 wrote to memory of 2444 1212 net.exe 42 PID 1552 wrote to memory of 2464 1552 da13022097518d123a91a3958be326da.exe 43 PID 1552 wrote to memory of 2464 1552 da13022097518d123a91a3958be326da.exe 43 PID 1552 wrote to memory of 2464 1552 da13022097518d123a91a3958be326da.exe 43 PID 1552 wrote to memory of 2464 1552 da13022097518d123a91a3958be326da.exe 43 PID 2464 wrote to memory of 2480 2464 net.exe 45 PID 2464 wrote to memory of 2480 2464 net.exe 45 PID 2464 wrote to memory of 2480 2464 net.exe 45 PID 2464 wrote to memory of 2480 2464 net.exe 45 PID 1552 wrote to memory of 2516 1552 da13022097518d123a91a3958be326da.exe 46 PID 1552 wrote to memory of 2516 1552 da13022097518d123a91a3958be326da.exe 46 PID 1552 wrote to memory of 2516 1552 da13022097518d123a91a3958be326da.exe 46 PID 1552 wrote to memory of 2516 1552 da13022097518d123a91a3958be326da.exe 46 PID 2516 wrote to memory of 2620 2516 net.exe 48 PID 2516 wrote to memory of 2620 2516 net.exe 48 PID 2516 wrote to memory of 2620 2516 net.exe 48 PID 2516 wrote to memory of 2620 2516 net.exe 48 PID 1552 wrote to memory of 2992 1552 da13022097518d123a91a3958be326da.exe 49 PID 1552 wrote to memory of 2992 1552 da13022097518d123a91a3958be326da.exe 49 PID 1552 wrote to memory of 2992 1552 da13022097518d123a91a3958be326da.exe 49 PID 1552 wrote to memory of 2992 1552 da13022097518d123a91a3958be326da.exe 49 PID 2992 wrote to memory of 2128 2992 net.exe 51 PID 2992 wrote to memory of 2128 2992 net.exe 51 PID 2992 wrote to memory of 2128 2992 net.exe 51 PID 2992 wrote to memory of 2128 2992 net.exe 51 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\da13022097518d123a91a3958be326da.exe"C:\Users\Admin\AppData\Local\Temp\da13022097518d123a91a3958be326da.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:2456
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2472
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2500
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2444
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2480
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2620
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2128
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2796
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2872
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1624
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:756
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:824
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:2692
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2752
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1020
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:612
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1192
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1644
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:836
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1316
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2968
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1264
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2756
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:2016
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2164
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:2884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1740
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1880
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1604
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1568
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:772
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1844
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3060
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2108
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1068
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:700
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:3048
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3012
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2948
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵PID:2420
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2568
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2636
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2496
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e68cfad3f3cbef5406c90fd9e9d7931
SHA1504d53957bbed8e1a612c791eec7abdd17bd15bc
SHA25651dc299391f9b3eca411936a0d01781ad68799d282655e0d20c8c8521aa8e014
SHA51278c89847c3a7c128e5d54c3fff0e41c89a61722730b9d02d9c7e0b6985ce8188c3c37b6357a71c30f7e34c8b78f94599a186be6c189e56f6ccb832033e77172a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD567965aa48c3bacb2e1f1872a498dc3f6
SHA10107d1d4085df0dbfd8054a1470634ea22fe1714
SHA25649ffa6e8843a271090fa0e22f863454717d5a65d41082ca1999a253ca11eddd5
SHA5128be09d56c59b53cd841e4518cd03ed7acf1a67d8bb6bc10c2db2c24255d013824c76e617f267654ee679d99c1da662ebcd98e2e27bae48d856fd48a76286f2a0