Malware Analysis Report

2024-09-22 16:15

Sample ID 240402-l6e17aeb7y
Target dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.zip
SHA256 e43f27f2101a087da35d6c614e18fb551b5d1813725b1937057e7e1fbd321ee6
Tags
avaddon evasion persistence ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e43f27f2101a087da35d6c614e18fb551b5d1813725b1937057e7e1fbd321ee6

Threat Level: Known bad

The file dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.zip was found to be: Known bad.

Malicious Activity Summary

avaddon evasion persistence ransomware trojan

UAC bypass

Avaddon

Deletes shadow copies

Renames multiple (280) files with added filename extension

Renames multiple (136) files with added filename extension

Enumerates connected drives

Adds Run key to start application

Checks whether UAC is enabled

Drops desktop.ini file(s)

Looks up external IP address via web service

Enumerates physical storage devices

Interacts with shadow copies

Suspicious use of WriteProcessMemory

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

System policy modification

Uses Volume Shadow Copy service COM API

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-02 10:08

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-02 10:08

Reported

2024-04-02 10:14

Platform

win7-20240319-en

Max time kernel

150s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe"

Signatures

Avaddon

ransomware avaddon

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Deletes shadow copies

ransomware

Renames multiple (280) files with added filename extension

ransomware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\update = "C:\\Users\\Admin\\AppData\\Roaming\\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\update = "C:\\Users\\Admin\\AppData\\Roaming\\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-2610426812-2871295383-373749122-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.myip.com N/A N/A
N/A api.myip.com N/A N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1460 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1460 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe
PID 1460 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\vssadmin.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe

"C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe"

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.myip.com udp
US 104.26.9.59:443 api.myip.com tcp

Files

memory/1460-0-0x0000000001FD0000-0x00000000020D9000-memory.dmp

memory/1460-1-0x0000000000400000-0x00000000006C9000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Tar4763.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\432268-readme.html

MD5 67acf1282706f74ee6562b3077e46474
SHA1 9339faf783d73ca09261b0200c186a62ec73d4b3
SHA256 0cf1e7afe18bc0cc61fabba09677a7e51f2008be296d0d7e9c3fa1bc8c99ab8f
SHA512 238299fe4b951a59489772fad924e4ef0002bd8fd6f89cd0f0dda490db9a6fde23df38df55f886ba52841cc14ba3877518039b1ec696c6496bf256b6f4f83859

memory/1460-388-0x0000000000400000-0x00000000006C9000-memory.dmp

memory/1460-899-0x0000000000400000-0x00000000006C9000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-02 10:08

Reported

2024-04-02 10:14

Platform

win10v2004-20240226-en

Max time kernel

146s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe"

Signatures

Avaddon

ransomware avaddon

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Renames multiple (136) files with added filename extension

ransomware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\update = "C:\\Users\\Admin\\AppData\\Roaming\\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\update = "C:\\Users\\Admin\\AppData\\Roaming\\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-1904519900-954640453-4250331663-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.myip.com N/A N/A
N/A api.myip.com N/A N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1616 wrote to memory of 4432 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 4432 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 4432 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 3280 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 3280 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 1616 wrote to memory of 3280 N/A C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe C:\Windows\SysWOW64\Wbem\wmic.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe

"C:\Users\Admin\AppData\Local\Temp\dccc689c986e357d5dbdc987e72e6b8a0e9017cbf347449b27c84b8b7b9d507a.exe"

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=2304,i,7548677271533893574,11048237606705436109,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 249.110.86.104.in-addr.arpa udp
US 8.8.8.8:53 api.myip.com udp
US 104.26.8.59:443 api.myip.com tcp
US 8.8.8.8:53 59.8.26.104.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
N/A 10.127.1.1:445 tcp
N/A 10.127.1.1:139 tcp
US 8.8.8.8:53 1.1.127.10.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
N/A 10.127.1.2:445 tcp
US 13.107.246.64:443 tcp
N/A 10.127.1.2:139 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 2.1.127.10.in-addr.arpa udp
N/A 10.127.1.3:445 tcp
N/A 10.127.1.3:139 tcp
US 8.8.8.8:53 3.1.127.10.in-addr.arpa udp
N/A 10.127.1.4:445 tcp
N/A 10.127.1.4:139 tcp
US 8.8.8.8:53 4.1.127.10.in-addr.arpa udp
N/A 10.127.1.5:445 tcp
N/A 10.127.1.5:139 tcp
US 8.8.8.8:53 5.1.127.10.in-addr.arpa udp
N/A 10.127.1.6:445 tcp
N/A 10.127.1.6:139 tcp

Files

memory/1616-0-0x00000000024F0000-0x00000000025F9000-memory.dmp

memory/1616-1-0x0000000000400000-0x00000000006C9000-memory.dmp

C:\Users\Admin\Desktop\227805-readme.html

MD5 dcfb7ce7f51f941a2b6b2291f1f08453
SHA1 669fef9f5551af587a3743bb30289606468ad646
SHA256 ce68a58931876858725b7e0d25b76ab4f18260ce436c12913e3ef037b9636ee8
SHA512 fe3751f9eed8be7b8425623ee7663df9d0a342224c29ec5e76dadc8ab7eb40b7f47458c7f296a421f235297aea96e3529a43d2ae77cb6e269b56354fb9119170

memory/1616-418-0x0000000000400000-0x00000000006C9000-memory.dmp