Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe
Resource
win10v2004-20240226-en
General
-
Target
3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe
-
Size
337KB
-
MD5
52650b037a3c20c4405cd699510d7047
-
SHA1
7bc89286b3e1cd777881a7ab44d7c384d097d140
-
SHA256
3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5
-
SHA512
ce64e5f74396e33b8465a16dca8319ae3c02a6e3a36038153c8c91289284fd515985c45eec964ac7343f779eafb0793399ca0421e3b2a7b042d4d35b933e5107
-
SSDEEP
6144:y10d91SHBFBnJwsOE/4tHzhvN3zXPyWYUJular92:y7HBFBnOc/4tHddz/yLr
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2528 bcdedit.exe 2572 bcdedit.exe -
Renames multiple (2715) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\A: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\B: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\M: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\U: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\L: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\Q: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\R: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\Y: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\D: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\G: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\I: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\J: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\H: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\O: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\V: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\S: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\T: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\W: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\Z: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\E: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\K: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\N: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened (read-only) \??\P: 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Noumea 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME47.CSS 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Urban.eftx 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-utilities_ja.jar 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0188667.WMF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00820_.WMF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15018_.GIF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.HTM 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\New_York 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02265_.WMF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Havana 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\00_musicbrainz.luac 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-uihandler.xml 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR41F.GIF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_mid_disable.gif 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository_1.2.100.v20131209-2144.jar 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Syowa 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Windows Journal\Templates\Graph.jtp 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\VCTRN_01.MID 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01875_.WMF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsBrowserUpgrade.html 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR46F.GIF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Zaporozhye 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jre7\README.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187849.WMF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01268_.GIF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_GreenTea.gif 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00154_.GIF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZFORM.XML 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-io.xml 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Dawson 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santiago 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\eBook.api 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\JNGLE_01.MID 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Pushpin.xml 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\BUTTON.GIF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_K_COL.HXK 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DataViewIconImages.jpg 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.jasper.glassfish_2.2.2.v201205150955.jar 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107446.WMF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\RADAR.WAV 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\vlc.mo 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\TAB_ON.GIF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_ok.gif 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.HXS 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsPreviewTemplate.html 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\HOW TO BACK FILES.txt 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\accessibility.properties 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\jfluid-server_zh_CN.jar 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeDebugPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Token: SeTakeOwnershipPrivilege 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2584 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe 28 PID 2040 wrote to memory of 2584 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe 28 PID 2040 wrote to memory of 2584 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe 28 PID 2040 wrote to memory of 2704 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe 29 PID 2040 wrote to memory of 2704 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe 29 PID 2040 wrote to memory of 2704 2040 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe 29 PID 2584 wrote to memory of 2528 2584 cmd.exe 32 PID 2584 wrote to memory of 2528 2584 cmd.exe 32 PID 2584 wrote to memory of 2528 2584 cmd.exe 32 PID 2704 wrote to memory of 2572 2704 cmd.exe 33 PID 2704 wrote to memory of 2572 2704 cmd.exe 33 PID 2704 wrote to memory of 2572 2704 cmd.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "1" 3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe"C:\Users\Admin\AppData\Local\Temp\3742b60308d2a7fb47c69a625dfdaae16561db5ee7353ce9a8a02110961192f5.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f27aec71d50612f9bf4c0ab411034d76
SHA14c39bd43636e9927539d9f4f2c254ebec0c013b1
SHA25688beb06d20d875690d7312747781c682af489295f134379783b649d60c8b7d0d
SHA5128bb554d9f026f0b79cf61ae36c0c207b07dc4cb41b6cacc72c21ecdf931948a3b3bf745ddf8851dbec8955c3c417eb0da5f2fb07df0e85470732c38ea3f7234b