Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
Resource
win10v2004-20231215-en
General
-
Target
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
-
Size
370KB
-
MD5
7219e5aa812c246f68f63491ccdb9f77
-
SHA1
fcf0be55446d921b89c645e6ae5db56d3ceeec84
-
SHA256
f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1
-
SHA512
99f1e14f5b54806432cd0beb4555d26f5b6f9ffa0a105b869195a8dfd8f67c98d6e8a09808cb0e70024c63b1e92ae8dd64c3ae3e8e80dea7c05f3180eb6b1cdf
-
SSDEEP
6144:50H9JCRYd6SkwEcXDVVArElO2Z3WhrGJpVxFW5cQZ2BCn:AJSYd6SJxhVArELBWhGJpVaNEy
Malware Config
Extracted
\Device\HarddiskVolume1\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1428 bcdedit.exe 2140 bcdedit.exe -
Renames multiple (7274) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\W: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\A: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\B: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\G: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\M: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\R: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\S: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\X: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\Z: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\D: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\E: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\K: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\N: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\P: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\Q: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\U: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\V: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\H: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\I: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\J: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\L: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\O: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened (read-only) \??\Y: f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nipigon f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143749.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_zh_4.4.0.v20140623020002.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPTSFrame.png f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01545_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152702.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR50F.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert.css f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00117_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_COL.HXC f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR22F.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCalls.h f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.el_2.2.0.v201303151357.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs-nio2.xml f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\DVD Maker\Eurosti.TTF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HTECH_01.MID f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185670.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\BriefcaseIconMask.bmp f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core_2.3.0.v20131211-1531.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03380I.JPG f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-templates.xml_hidden f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01151_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241773.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR11F.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLPERF.H f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\APPLAUSE.WAV f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Tucuman f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Rothera f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia.api f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152626.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21518_.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\INVITE11.POC f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Halifax f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santiago f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00330_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00097_.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt_0.12.100.v20140530-1436.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10299_.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.engine_2.3.0.v20140506-1720.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring-fallback.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Monaco f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.nl_ja_4.4.0.v20140623020002.jar f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341561.JPG f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\TAB_ON.GIF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-common.xml f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-favorites.xml f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216874.WMF f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\HOW TO BACK FILES.txt f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeDebugPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe Token: SeTakeOwnershipPrivilege 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 844 wrote to memory of 2256 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 28 PID 844 wrote to memory of 2256 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 28 PID 844 wrote to memory of 2256 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 28 PID 844 wrote to memory of 2268 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 29 PID 844 wrote to memory of 2268 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 29 PID 844 wrote to memory of 2268 844 f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe 29 PID 2256 wrote to memory of 1428 2256 cmd.exe 32 PID 2256 wrote to memory of 1428 2256 cmd.exe 32 PID 2256 wrote to memory of 1428 2256 cmd.exe 32 PID 2268 wrote to memory of 2140 2268 cmd.exe 33 PID 2268 wrote to memory of 2140 2268 cmd.exe 33 PID 2268 wrote to memory of 2140 2268 cmd.exe 33 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe"C:\Users\Admin\AppData\Local\Temp\f3c882b85652bce6fe1fdfff97b092a28e610c691e1d13d11372aebed9a615c1.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:844 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD520ca5b11a08044c1ec491a06e637a823
SHA101fa2d1ab7d84497cdb819662cc136dfb59b0a21
SHA25688e6ff67ba54670ba37194511be281578ae0b50f472c8fbc01301803ab23b74c
SHA51252a65d65fbf8d335f306a5e5554c1b61d019cb04644ad045159a56ef776d7121ff02adda029c576b5e29f5fae1471543bc0e8d0037a48c7a06afc496708f2aa7