Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 10:52
Static task
static1
Behavioral task
behavioral1
Sample
33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe
Resource
win10v2004-20240226-en
General
-
Target
33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe
-
Size
374KB
-
MD5
d3018d3c959c827fe446af2e857ea65a
-
SHA1
2a6f5d811deb5f4f3130915532a9926b6d26afe0
-
SHA256
33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd
-
SHA512
be9792cdb0e5aad09f3e926076bc788ccb06503e23ab6f2ea1f9ce537371ff9cfc018e5549b1823b74e8e347436e5f5fe66ab274c1352af61c69385c28b806e8
-
SSDEEP
6144:d0dryUTkT5ZLewnleutuIsjrwtO/C3mT+OFGMTZGzxvBKq:0yUc5ZLnc6uIsjrwtv2TPFGMVGzqq
Malware Config
Extracted
\Device\HarddiskVolume1\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1444 bcdedit.exe 4960 bcdedit.exe -
Renames multiple (6519) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\G: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\I: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\O: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\P: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\W: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\Z: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\S: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\D: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\E: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\B: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\H: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\J: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\K: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\Q: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\T: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\X: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\N: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\V: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\Y: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\L: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\M: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\R: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened (read-only) \??\U: 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\es-es\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.scale-200.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-30.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\MedTile.scale-200.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filterselected-dark-hover_32.svg 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailWideTile.scale-400.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-sl\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\rt.jar 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Grace-ppd.xrm-ms 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ONENOTE_COL.HXC 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\sql90.xsl 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionWideTile.scale-400.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reminders_18.svg 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-tw\ui-strings.js 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_close2x.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\main.css 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-20.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-72_altform-unplated_contrast-white.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\smsconnect\SMSConnect2x.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailSmallTile.scale-100.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\187.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalStoreLogo.scale-200.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-36_altform-unplated_contrast-white.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\COPYING.LGPLv2.1.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File created C:\Program Files\VideoLAN\VLC\locale\id\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-high\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Retail-pl.xrm-ms 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-30.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-GB\en-GB_female_TTS\prompts_en-GB_TTS.lua 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VRecMDL2.ttf 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_patterns_header.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-32_contrast-black.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EVRGREEN\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Trial-pl.xrm-ms 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-pl.xrm-ms 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\wordvisi.ttf 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Yahoo-Dark.scale-250.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\bg-BG\View3d\3DViewerProductDescription-universal.xml 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\BadgeLogo.scale-400_contrast-black.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_PrepidBypass-ppd.xrm-ms 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sql2000.xsl 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\Icons_Icon_Wind_sm.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_he.json 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\EnsoUI\dashboard_slomo_ON.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\ui-strings.js 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\ui-strings.js 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\root\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmpnscfg.exe.mui 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextLight.scale-125.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-150_contrast-black.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUECALM\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\limited\local_policy.jar 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedAppList.scale-200_contrast-black.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoPreview.xbf 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\MedTile.scale-200.png 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\HOW TO BACK FILES.txt 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeDebugPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe Token: SeTakeOwnershipPrivilege 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4056 wrote to memory of 392 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe 91 PID 4056 wrote to memory of 392 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe 91 PID 4056 wrote to memory of 5108 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe 92 PID 4056 wrote to memory of 5108 4056 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe 92 PID 5108 wrote to memory of 1444 5108 cmd.exe 97 PID 5108 wrote to memory of 1444 5108 cmd.exe 97 PID 392 wrote to memory of 4960 392 cmd.exe 98 PID 392 wrote to memory of 4960 392 cmd.exe 98 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe"C:\Users\Admin\AppData\Local\Temp\33e2ab2c90488bb9435acdad2b4e63189f67a4eeaab5b38b1dfdbc707f83c4fd.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4056 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:4960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD542f2f23eda61c4728b446d02db663136
SHA1c0b4470752106306c8b4ce15d42bfa48fc99d8db
SHA2568353241f95112af734c7a668eec9fee09f79fc2f26570e61c6c31c604e2381f6
SHA512ac6ef5dd287aba1a1911d218cd3ce1166d9a8dcc3698c007e1528c14cca7a5c5436cc4a4e09b31f8599651884cb349890872fb5de63267aad6f90121c86ec671