Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 10:02
Behavioral task
behavioral1
Sample
220629-p7hp9ahfel.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
220629-p7hp9ahfel.exe
Resource
win10v2004-20240226-en
General
-
Target
220629-p7hp9ahfel.exe
-
Size
7.7MB
-
MD5
a7ab0969bf6641cd0c7228ae95f6d217
-
SHA1
002971b6d178698bf7930b5b89c201750d80a07e
-
SHA256
117fc30c25b1f28cd923b530ab9f91a0a818925b0b89b8bc9a7f820a9e630464
-
SHA512
7e1cce428e3b80b60635c354801af6e86354c9437ba7a661ca6a922c17057a16439a97d1ea11873eb359c05018df9eb6040b72fa97b30cf4d04cae56bf052b8a
-
SSDEEP
49152:mwHittZSrb/TjvO90dL3BmAFd4A64nsfJTGNHltPgQjre0Q2hEsj2kcR9RsU/2LU:mwUs3dfC2at9kDXdmG55wuzZqGdE
Malware Config
Extracted
agenda
-
company_id
OnHnnBvUej
-
note
-- Agenda Your network/system was encrypted. Encrypted files have new extension. -- Compromising and sensitive data We have downloaded compromising and sensitive data from you system/network If you refuse to communicate with us and we do not come to an agreementyour data will be published. Data includes: - Employees personal dataCVsDLSSN. - Complete network map including credentials for local and remote services. - Financial information including clients databillsbudgetsannual reportsbank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... -- Warning 1) If you modify files - our decrypt software won't able to recover data 2) If you use third party software - you can damage/modify files (see item 1) 3) You need cipher key / our decrypt software to restore you files. 4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. -- Recovery 1) Download tor browser: https://www.torproject.org/download/ 2) Go to domain 3) Enter credentials -- Credentials Extension: OnHnnBvUej Domain: login: bd61eb78-64a3-4ee0-9a8e-543b8bc12b5e password: 14158620-fb98-4889-87cb-f5251368fc21
Extracted
C:\$Recycle.Bin\OnHnnBvUej-RECOVER-README.txt
agenda
Signatures
-
Agenda Ransomware
A ransomware with multiple variants written in Golang and Rust first seen in August 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detects command variations typically used by ransomware 1 IoCs
Processes:
resource yara_rule C:\Users\Public\enc.exe INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
Processes:
resource yara_rule C:\Users\Public\enc.exe INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Detects executables referencing many IR and analysis tools 1 IoCs
Processes:
resource yara_rule C:\Users\Public\enc.exe INDICATOR_SUSPICIOUS_References_SecTools -
Renames multiple (158) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
220629-p7hp9ahfel.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 220629-p7hp9ahfel.exe -
Executes dropped EXE 3 IoCs
Processes:
svchost.exeenc.exeenc.exepid process 4560 svchost.exe 2708 enc.exe 1368 enc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
220629-p7hp9ahfel.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*aster = "C:\\Users\\Public\\enc.exe" 220629-p7hp9ahfel.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exesvchost.exeenc.exedescription ioc process File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Z: enc.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\B: enc.exe File opened (read-only) \??\K: enc.exe File opened (read-only) \??\T: enc.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\V: enc.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: enc.exe File opened (read-only) \??\Q: enc.exe File opened (read-only) \??\G: enc.exe File opened (read-only) \??\I: enc.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\L: enc.exe File opened (read-only) \??\U: enc.exe File opened (read-only) \??\X: enc.exe File opened (read-only) \??\Y: enc.exe File opened (read-only) \??\E: enc.exe File opened (read-only) \??\J: enc.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\O: enc.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\H: enc.exe File opened (read-only) \??\P: enc.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: enc.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\S: enc.exe File opened (read-only) \??\H: svchost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
enc.exedescription ioc process File created C:\Program Files\OnHnnBvUej-RECOVER-README.txt enc.exe File created C:\Program Files (x86)\OnHnnBvUej-RECOVER-README.txt enc.exe -
Drops file in Windows directory 1 IoCs
Processes:
enc.exedescription ioc process File created C:\Windows\OnHnnBvUej-RECOVER-README.txt enc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 2476 vssadmin.exe 4616 vssadmin.exe 1316 vssadmin.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
enc.exeenc.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" enc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" enc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" enc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
220629-p7hp9ahfel.exepid process 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe 2036 220629-p7hp9ahfel.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
220629-p7hp9ahfel.exevssvc.exesvchost.exeenc.exeenc.exesvchost.exedescription pid process Token: SeDebugPrivilege 2036 220629-p7hp9ahfel.exe Token: SeBackupPrivilege 1676 vssvc.exe Token: SeRestorePrivilege 1676 vssvc.exe Token: SeAuditPrivilege 1676 vssvc.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeAuditPrivilege 4484 svchost.exe Token: SeDebugPrivilege 1368 enc.exe Token: SeDebugPrivilege 2708 enc.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe Token: SeAuditPrivilege 3456 svchost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
220629-p7hp9ahfel.execmd.exesvchost.exeenc.exeenc.execmd.execmd.exedescription pid process target process PID 2036 wrote to memory of 3936 2036 220629-p7hp9ahfel.exe cmd.exe PID 2036 wrote to memory of 3936 2036 220629-p7hp9ahfel.exe cmd.exe PID 3936 wrote to memory of 1316 3936 cmd.exe vssadmin.exe PID 3936 wrote to memory of 1316 3936 cmd.exe vssadmin.exe PID 2036 wrote to memory of 4560 2036 220629-p7hp9ahfel.exe svchost.exe PID 4560 wrote to memory of 2708 4560 svchost.exe enc.exe PID 4560 wrote to memory of 2708 4560 svchost.exe enc.exe PID 4560 wrote to memory of 1368 4560 svchost.exe enc.exe PID 4560 wrote to memory of 1368 4560 svchost.exe enc.exe PID 1368 wrote to memory of 4936 1368 enc.exe cmd.exe PID 1368 wrote to memory of 4936 1368 enc.exe cmd.exe PID 2708 wrote to memory of 1168 2708 enc.exe cmd.exe PID 2708 wrote to memory of 1168 2708 enc.exe cmd.exe PID 4936 wrote to memory of 2476 4936 cmd.exe vssadmin.exe PID 4936 wrote to memory of 2476 4936 cmd.exe vssadmin.exe PID 1168 wrote to memory of 4616 1168 cmd.exe vssadmin.exe PID 1168 wrote to memory of 4616 1168 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Public\enc.exe"C:\Users\Public\enc.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4616 -
C:\Users\Public\enc.exe"C:\Users\Public\enc.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2476
-
C:\Users\Admin\AppData\Local\Temp\220629-p7hp9ahfel.exe"C:\Users\Admin\AppData\Local\Temp\220629-p7hp9ahfel.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1316
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53a29ccf8fcbac5d1797999d3699375b1
SHA19993778053593d2704992f9e9cd7b79f4bd4a244
SHA256534b085697b8406738b3281c1ca067cc90290ca8d44d2608eecdf4c0626c7e16
SHA51299c1c76acd7e6ba366505000a21dc77400cb5531203f658d311d4b3926db90f331b870bb4d0bd6cd7731a41657b97d62feedb6fab74cee602c8fd91cc1d73600
-
Filesize
7.7MB
MD5a7ab0969bf6641cd0c7228ae95f6d217
SHA1002971b6d178698bf7930b5b89c201750d80a07e
SHA256117fc30c25b1f28cd923b530ab9f91a0a818925b0b89b8bc9a7f820a9e630464
SHA5127e1cce428e3b80b60635c354801af6e86354c9437ba7a661ca6a922c17057a16439a97d1ea11873eb359c05018df9eb6040b72fa97b30cf4d04cae56bf052b8a
-
Filesize
91KB
MD5e966c38c5b1a05d0bd86eb0edc1d3b84
SHA1f10443e13b82c93f203c0428a357205aa55f2dee
SHA25628aeb2d6576b2437ecab535c0a1bf41713ee9864611965bf1d498a87cbdd2fab
SHA5126c80ec34f0d581e0924cb58f22e5bc70e36fcc6119db779744fad007bd943d95e5f646f06244e9a5aa40685649b7730e46dded68c0732e81559dded33a4dbe7b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e