Analysis
-
max time kernel
585s -
max time network
596s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240426-en
Errors
General
-
Target
XClient.exe
-
Size
1.3MB
-
MD5
0e7dbde65ff6eb526caf5a8517b3ef14
-
SHA1
326b1a54238ff6560dea85053bbea1c521dddd62
-
SHA256
3a23809b4f8c295cc07fb589966ef0c695d6df61c244e28127be54874ef38ec4
-
SHA512
f6fd535c17c5ea57eb9ee6a0f6705885b58b628801b3cd6e792da1518d5e1e490a007dbb9f1e72341ba2e60c635c2549762faed878fcdfac7633f3074dc55302
-
SSDEEP
6144:HCvSkBoOd7x9JR0hg5efTfnxPQ6EgjDcOKeSZhzjnnpDnC5QQfWMFH6n/8sJdaTp:HCvTo+GTfnxPQlgyymKJ162d0jLifU
Malware Config
Extracted
C:\Users\Admin\Pictures\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 8 IoCs
resource yara_rule behavioral2/files/0x0007000000023450-79.dat family_chaos behavioral2/memory/1960-86-0x0000000000FD0000-0x000000000101E000-memory.dmp family_chaos behavioral2/files/0x0007000000023454-99.dat family_chaos behavioral2/files/0x000700000002345a-107.dat family_chaos behavioral2/memory/1076-109-0x0000000000430000-0x000000000043A000-memory.dmp family_chaos behavioral2/files/0x0007000000023467-256.dat family_chaos behavioral2/files/0x000700000002346d-264.dat family_chaos behavioral2/memory/2936-267-0x0000000000320000-0x000000000032A000-memory.dmp family_chaos -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation test.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation test.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation EthicalHackingTools.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation XClient.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe -
Executes dropped EXE 14 IoCs
pid Process 1164 kwdxjh.exe 1960 bzydhn.exe 1076 test.exe 4632 svchost.exe 2936 test.exe 2420 svchost.exe 4516 zulcyg.exe 3252 baslvl.exe 2800 sqnrsw.exe 4444 xzjaer.exe 2520 whpjfn.exe 4288 EthicalHackingTools.exe 3596 mbrnote.exe 2768 ddd.exe -
resource yara_rule behavioral2/files/0x000d0000000233bb-55.dat upx behavioral2/memory/1164-61-0x0000000000400000-0x00000000007BF000-memory.dmp upx behavioral2/memory/1164-74-0x0000000000400000-0x00000000007BF000-memory.dmp upx behavioral2/files/0x0009000000023465-275.dat upx behavioral2/memory/4516-282-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-292-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-313-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-314-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-315-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-317-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-318-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-319-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-320-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-321-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-323-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4516-324-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/3252-347-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/3252-348-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/3252-349-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/3252-350-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/files/0x0007000000023472-377.dat upx behavioral2/memory/2520-383-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2520-386-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/files/0x000700000002347d-432.dat upx behavioral2/memory/3596-434-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3596-436-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3596-437-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3596-446-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3596-447-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32_4709_toolbar = "C:\\Users\\Admin\\Desktop\\testing.bat" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\ProgramData\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Store = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 16 IoCs
description ioc Process File created F:\$RECYCLE.BIN\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini svchost.exe File created C:\Users\Admin\Downloads\desktop.ini svchost.exe File created C:\Users\Admin\Pictures\desktop.ini svchost.exe File created C:\Users\Admin\OneDrive\desktop.ini svchost.exe File created C:\Users\Admin\Favorites\desktop.ini svchost.exe File created C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File created C:\Users\Admin\Videos\desktop.ini svchost.exe File created C:\Users\Admin\Desktop\desktop.ini svchost.exe File created C:\Users\Admin\Links\desktop.ini svchost.exe File created C:\Users\Admin\Music\desktop.ini svchost.exe File created C:\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File created C:\Users\Admin\Saved Games\desktop.ini svchost.exe File created C:\Users\Admin\Contacts\desktop.ini svchost.exe File created C:\Users\Admin\Documents\desktop.ini svchost.exe File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File created C:\Users\Admin\Searches\desktop.ini svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ddd.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4516-292-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-313-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-314-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-315-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-317-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-318-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-319-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-320-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-321-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-323-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/4516-324-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/3252-347-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/3252-348-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/3252-349-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe behavioral2/memory/3252-350-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 52 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\B:\autorun.inf cmd.exe File opened for modification \??\S:\autorun.inf cmd.exe File created \??\W:\autorun.inf cmd.exe File created \??\J:\autorun.inf cmd.exe File opened for modification \??\B:\autorun.inf cmd.exe File created \??\M:\autorun.inf cmd.exe File opened for modification \??\X:\autorun.inf cmd.exe File created \??\A:\autorun.inf cmd.exe File opened for modification C:\autorun.inf cmd.exe File opened for modification \??\Z:\autorun.inf cmd.exe File opened for modification \??\Y:\autorun.inf cmd.exe File opened for modification D:\autorun.inf cmd.exe File opened for modification \??\O:\autorun.inf cmd.exe File created \??\S:\autorun.inf cmd.exe File opened for modification \??\T:\autorun.inf cmd.exe File created \??\L:\autorun.inf cmd.exe File created \??\N:\autorun.inf cmd.exe File created \??\R:\autorun.inf cmd.exe File created \??\V:\autorun.inf cmd.exe File created D:\autorun.inf cmd.exe File created \??\H:\autorun.inf cmd.exe File created \??\I:\autorun.inf cmd.exe File created \??\K:\autorun.inf cmd.exe File opened for modification \??\K:\autorun.inf cmd.exe File opened for modification \??\P:\autorun.inf cmd.exe File opened for modification \??\E:\autorun.inf cmd.exe File opened for modification \??\L:\autorun.inf cmd.exe File opened for modification \??\N:\autorun.inf cmd.exe File created F:\autorun.inf cmd.exe File created \??\O:\autorun.inf cmd.exe File created \??\T:\autorun.inf cmd.exe File opened for modification \??\Q:\autorun.inf cmd.exe File opened for modification \??\R:\autorun.inf cmd.exe File created \??\X:\autorun.inf cmd.exe File created \??\Z:\autorun.inf cmd.exe File opened for modification \??\U:\autorun.inf cmd.exe File created C:\autorun.inf cmd.exe File opened for modification F:\autorun.inf cmd.exe File opened for modification \??\H:\autorun.inf cmd.exe File opened for modification \??\J:\autorun.inf cmd.exe File created \??\E:\autorun.inf cmd.exe File opened for modification \??\I:\autorun.inf cmd.exe File created \??\Y:\autorun.inf cmd.exe File opened for modification \??\M:\autorun.inf cmd.exe File created \??\Q:\autorun.inf cmd.exe File created \??\G:\autorun.inf cmd.exe File opened for modification \??\G:\autorun.inf cmd.exe File created \??\U:\autorun.inf cmd.exe File opened for modification \??\A:\autorun.inf cmd.exe File created \??\P:\autorun.inf cmd.exe File opened for modification \??\V:\autorun.inf cmd.exe File opened for modification \??\W:\autorun.inf cmd.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\EthicalHackingTools1.1\ransom_builder.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\ddostool.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\mbrimage.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\msgspammer.$$A sqnrsw.exe File opened for modification C:\Program Files (x86)\EthicalHackingTools1.1\Uninstal.exe sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\1234.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\exel_icon.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\Uninstal.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\Form1.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\mbrnote.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\thematrix.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\trojangen.$$A sqnrsw.exe File created C:\Program Files (x86)\EthicalHackingTools1.1\EthicalHackingTools.$$A sqnrsw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1704 2768 WerFault.exe 139 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 zulcyg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" mbrnote.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" mbrnote.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 bzydhn.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 bzydhn.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell zulcyg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" bzydhn.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" zulcyg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 zulcyg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" bzydhn.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\MRUListEx = ffffffff zulcyg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" bzydhn.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell mbrnote.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\0\MRUListEx = 00000000ffffffff mbrnote.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings mbrnote.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\0\0\MRUListEx = ffffffff mbrnote.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff bzydhn.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell bzydhn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" bzydhn.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" zulcyg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 = 19002f433a5c000000000000000000000000000000000000000000 zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 zulcyg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 mbrnote.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU bzydhn.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe1100000096c7af35d697da0165473838d697da0129c8fb38d697da0114000000 bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff bzydhn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" mbrnote.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff bzydhn.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 020000000100000000000000ffffffff zulcyg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg bzydhn.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 bzydhn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\SniffedFolderType = "Generic" mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" zulcyg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" zulcyg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 mbrnote.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" bzydhn.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" bzydhn.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} zulcyg.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 mbrnote.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" mbrnote.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ zulcyg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" zulcyg.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} mbrnote.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 bzydhn.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3492 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4632 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 powershell.exe 2084 powershell.exe 2420 powershell.exe 2420 powershell.exe 4484 powershell.exe 4484 powershell.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 2004 XClient.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 1076 test.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 4632 svchost.exe 2004 XClient.exe 2004 XClient.exe 2936 test.exe 2936 test.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 1960 bzydhn.exe 4516 zulcyg.exe 2004 XClient.exe 3252 baslvl.exe 3596 mbrnote.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2004 XClient.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 4484 powershell.exe Token: SeDebugPrivilege 2004 XClient.exe Token: SeDebugPrivilege 1076 test.exe Token: SeDebugPrivilege 4632 svchost.exe Token: SeDebugPrivilege 2936 test.exe Token: SeDebugPrivilege 2420 svchost.exe Token: 33 676 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 676 AUDIODG.EXE Token: SeDebugPrivilege 2768 ddd.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1960 bzydhn.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe 4516 zulcyg.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2004 XClient.exe 1960 bzydhn.exe 1960 bzydhn.exe 4516 zulcyg.exe 4444 xzjaer.exe 4288 EthicalHackingTools.exe 3596 mbrnote.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2084 2004 XClient.exe 89 PID 2004 wrote to memory of 2084 2004 XClient.exe 89 PID 2004 wrote to memory of 2420 2004 XClient.exe 91 PID 2004 wrote to memory of 2420 2004 XClient.exe 91 PID 2004 wrote to memory of 4484 2004 XClient.exe 93 PID 2004 wrote to memory of 4484 2004 XClient.exe 93 PID 2004 wrote to memory of 1164 2004 XClient.exe 98 PID 2004 wrote to memory of 1164 2004 XClient.exe 98 PID 2004 wrote to memory of 1164 2004 XClient.exe 98 PID 1164 wrote to memory of 2496 1164 kwdxjh.exe 100 PID 1164 wrote to memory of 2496 1164 kwdxjh.exe 100 PID 1164 wrote to memory of 2496 1164 kwdxjh.exe 100 PID 2004 wrote to memory of 1960 2004 XClient.exe 101 PID 2004 wrote to memory of 1960 2004 XClient.exe 101 PID 1960 wrote to memory of 2040 1960 bzydhn.exe 102 PID 1960 wrote to memory of 2040 1960 bzydhn.exe 102 PID 2040 wrote to memory of 3448 2040 csc.exe 104 PID 2040 wrote to memory of 3448 2040 csc.exe 104 PID 1076 wrote to memory of 4632 1076 test.exe 108 PID 1076 wrote to memory of 4632 1076 test.exe 108 PID 4632 wrote to memory of 3492 4632 svchost.exe 109 PID 4632 wrote to memory of 3492 4632 svchost.exe 109 PID 1960 wrote to memory of 5084 1960 bzydhn.exe 113 PID 1960 wrote to memory of 5084 1960 bzydhn.exe 113 PID 5084 wrote to memory of 908 5084 csc.exe 115 PID 5084 wrote to memory of 908 5084 csc.exe 115 PID 2936 wrote to memory of 2420 2936 test.exe 117 PID 2936 wrote to memory of 2420 2936 test.exe 117 PID 2004 wrote to memory of 4516 2004 XClient.exe 118 PID 2004 wrote to memory of 4516 2004 XClient.exe 118 PID 2004 wrote to memory of 4516 2004 XClient.exe 118 PID 4056 wrote to memory of 2352 4056 cmd.exe 122 PID 4056 wrote to memory of 2352 4056 cmd.exe 122 PID 2004 wrote to memory of 3252 2004 XClient.exe 124 PID 2004 wrote to memory of 3252 2004 XClient.exe 124 PID 2004 wrote to memory of 3252 2004 XClient.exe 124 PID 2004 wrote to memory of 2800 2004 XClient.exe 125 PID 2004 wrote to memory of 2800 2004 XClient.exe 125 PID 2004 wrote to memory of 2800 2004 XClient.exe 125 PID 2004 wrote to memory of 4444 2004 XClient.exe 126 PID 2004 wrote to memory of 4444 2004 XClient.exe 126 PID 2004 wrote to memory of 4444 2004 XClient.exe 126 PID 2004 wrote to memory of 2520 2004 XClient.exe 127 PID 2004 wrote to memory of 2520 2004 XClient.exe 127 PID 2004 wrote to memory of 2520 2004 XClient.exe 127 PID 4288 wrote to memory of 3596 4288 EthicalHackingTools.exe 131 PID 4288 wrote to memory of 3596 4288 EthicalHackingTools.exe 131 PID 4288 wrote to memory of 3596 4288 EthicalHackingTools.exe 131 PID 4288 wrote to memory of 1592 4288 EthicalHackingTools.exe 133 PID 4288 wrote to memory of 1592 4288 EthicalHackingTools.exe 133 PID 4288 wrote to memory of 1592 4288 EthicalHackingTools.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\XClient.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\kwdxjh.exe"C:\Users\Admin\AppData\Local\Temp\kwdxjh.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3861.tmp\SpongebobFuck.cmd""3⤵PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\bzydhn.exe"C:\Users\Admin\AppData\Local\Temp\bzydhn.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ioscifxo\ioscifxo.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFBCB.tmp" "c:\Users\Admin\Desktop\CSC30CFA79422A4C90B95B12B85EA85EA6.TMP"4⤵PID:3448
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c4vy00dz\c4vy00dz.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE030.tmp" "c:\Users\Admin\Desktop\CSC79656A0EDF64EEBA613D3C09B32EE4C.TMP"4⤵PID:908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zulcyg.exe"C:\Users\Admin\AppData\Local\Temp\zulcyg.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\baslvl.exe"C:\Users\Admin\AppData\Local\Temp\baslvl.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\sqnrsw.exe"C:\Users\Admin\AppData\Local\Temp\sqnrsw.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\xzjaer.exe"C:\Users\Admin\AppData\Local\Temp\xzjaer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\whpjfn.exe"C:\Users\Admin\AppData\Local\Temp\whpjfn.exe"2⤵
- Executes dropped EXE
PID:2520
-
-
C:\Users\Admin\Desktop\test.exe"C:\Users\Admin\Desktop\test.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:3492
-
-
-
C:\Users\Admin\Desktop\test.exe"C:\Users\Admin\Desktop\test.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\testing.bat" "1⤵
- Drops autorun.inf file
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\reg.exereg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_4709_toolbar" /t "REG_SZ" /d "C:\Users\Admin\Desktop\testing.bat" /f2⤵
- Adds Run key to start application
PID:2352
-
-
C:\Program Files (x86)\EthicalHackingTools1.1\EthicalHackingTools.exe"C:\Program Files (x86)\EthicalHackingTools1.1\EthicalHackingTools.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files (x86)\EthicalHackingTools1.1\mbrnote.exe"C:\Program Files (x86)\EthicalHackingTools1.1\mbrnote.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\EthicalHackingTools1.1\ddostool.bat" "2⤵PID:1592
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x4081⤵
- Suspicious use of AdjustPrivilegeToken
PID:676
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2132
-
C:\Users\Admin\Desktop\ddd.exe"C:\Users\Admin\Desktop\ddd.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 4882⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2768 -ip 27681⤵PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD553e061fea2a5569c480b715579d306ef
SHA10eab4fe52de5678d7e3e1e6cfaf87c6d81a10918
SHA2564f3a5eea1ae0517bacf2edf4c762a4680ac5ddfba5b83ef46860ca517b08113f
SHA512482a76192e97f8c39c8233fce31dd1fc33b75f0b294d1dd24704110d211ac9424e50ab72581de0e85f83cafb6f54ae85ba5c013417f8aea3dc2dfbd31d5ed9cb
-
Filesize
254B
MD5b23c59562f4f79ace361c2a05c91d11d
SHA16b17fbff2d7afd2cb4a6c623e941ee6567b222a9
SHA256bc95616208f2681f38ac51b578cdb2e6d3003cb5c1873ec1095f074ffab498e1
SHA5120f83295b69e486a24b5a0046c77aa41b41d87621ffabfe41e4b3d9c28977f6f0c07738f282bac2305082d6ac02822d8aa7befd8e965656b7f0d43098dab3d95d
-
Filesize
303KB
MD5631e45f7bd3d32363362f09cbfbdfbae
SHA16ae1e59d037b64f3c57c334ee521f8e9be6ea96f
SHA256fef9f05fbb339b16a15848a1b4d743857ccca6e347818cad687dfc78119803e0
SHA5127ee88c4d4f8543cbdb0e42e04cd6f5aa523c016d3753927a56fe8078f89d538adcb022d7ac95998fb1b0c5398c8c3cd9ec70d2b24ced2cca1f91fd8d6d62e429
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
226B
MD528d7fcc2b910da5e67ebb99451a5f598
SHA1a5bf77a53eda1208f4f37d09d82da0b9915a6747
SHA2562391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c
SHA5122d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD596e3b86880fedd5afc001d108732a3e5
SHA18fc17b39d744a9590a6d5897012da5e6757439a3
SHA256c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294
SHA512909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d
-
Filesize
11KB
MD57a918ed93f7fb297e05464edccc46756
SHA19464288fed7ba5d88928265882def5e05ffbe7db
SHA25682fcb47b437dc1bedb77648755770b7cd9a29342fd2ab972c8bd063968d04604
SHA512cb70d6023b4bf23f35646e399c4ca7f0ab11ebf0a1e44cf0627afaa4025676c2a20ab82ffa28ed4a196dc8cf56b33b104bf457cf21d750a163955927dcba3cb1
-
Filesize
1KB
MD51cd757e214c73a64f3edde328d019116
SHA115e13f4d7b146e56a4736141147c9fb898ff9d7d
SHA256b0103f5a3099fbc75bf72bd8de22134805597c61901aae78786e99bfa9c6303c
SHA51265b44518bcfe16c8aee62d7487de01f12e1c32b225ea2dca7f7250062d1f1e3a1956220bd7e6d5a770cc6fa5ad0b15e137aa0f598e1a3116a82a8d73f5e5ae54
-
Filesize
1KB
MD5ee11dc98945d96d1871802f481e8cbc6
SHA184868fc4a7d70d045e06f71dcd64a2a2ad4040f9
SHA256f82a52372d379a4f2a4d115d1bc126b102cc3acbce455ade4aa3c30b1d4d78d5
SHA512467dad1f9337f2b05193565fc85561d9da248c2f419abe39dc14e6ed5f43bb1c689262251e3c1664a3f15bc62cf21acd5ceead51a777b8eb5c8763a84aa61f2e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
287KB
MD5b20d5ada2e81683bda32aa80cd71c025
SHA11ab3daa872761d887ef0be9ace528ee323201211
SHA2560d8b4a07e91e02335f600332644e8f0e504f75ab19899a58b2c85ecb0887c738
SHA51294da5ae4e43e6b0fdc8d0a83d8a3f2991a47b6e12f6781cc6aecb2d8d97a2d0da6dc456e3618c1a36697862e1a7a50b27a036b3569f33889452fe921c6981d91
-
Filesize
2.3MB
MD5ff4a17c39d21c1142b374bb10958eb26
SHA116ffa640cdc8c5d379d3d0f1ea99b8ae3f37013e
SHA2562d6a69e59a296086964f4f1b54a6ec0f63c804754839996735f0dce4cdd853f2
SHA512172b9fbd373b039c2c99314804676f87d7526d8d59bcf8314351502350002cdd104f3ba492536651f834df5b90c28abec5ff972cf49bac34013649e0779fa8e1
-
Filesize
15.2MB
MD534a8f8ec1c50d5fd0c252d4937e54079
SHA1680dc45eaf7419752fa259c996b9df1a53efa5d5
SHA256953a03ddd88ad382e46e3b24add5708ec22081d6f2e31c9a25749556b5d94d31
SHA5123d42e657edca311aad8632f0b9f8637a3aaa7af7313e640fb2afc27e8e4db204559c95400091f56044ae5f1617466a92a32cf18e71fbb4b0720c55397839bab7
-
Filesize
192KB
MD5c8f5f007e75f79d7289568406b450a21
SHA1424232cd270b7e7d255d440d25188097b9f0e465
SHA256be0830713d84ebe82e0fd2a9380d4e4fba59b547691a14069ea024c8562396d4
SHA5124de27d38bfcdfda879d81703d44a02d3699ce28d924ea509cabb106df9cdd03365f7386afcfdce5a8915555e733579221c152091802061c44c1a920f40873b73
-
Filesize
600KB
MD50b43b506e0010463bf57fd24709e142e
SHA1d8221e4984180537c838182c124e5981ba233bd9
SHA256b381f91ddc80eaa54ca07e6b0e0efe786cfe9cfd42b04e1798e205e08eb8fcf6
SHA512b4092096fd784de8f0e4fc51583f2a7a7e4bad6c1de2b44e37d7c39189aa0fb92e81b4f41345f9e6d39a07d77adcc216abbdccc7580d3a9e7e51a1180765ae01
-
Filesize
390KB
MD575256220b5bfc94348a32685985af787
SHA1a63e1eba08e1d0b520ca5e3ba92d07d0e938f430
SHA256d6a5b4ac0b84250c190475874969626dc170ace6f51ccd9e5dea2d133fc377d5
SHA51240a2642ac858546f477c98f3f50c9a3f8985a904e25438cc14de19ec1ac41fe681d5d8bcda8ec44f2c82c9076da279936bf852949deaa96f04780ab433c9b36d
-
Filesize
1KB
MD55c761b7515be2dc13256cee02334d954
SHA13921f2408ff2275baece5606478e1ad0fb3b4c50
SHA256fff0fca43a6cd9cd468c11502ebdcc668e1c4af6a0986273ae5c4b5506ccd3ec
SHA512862504937b2d3f2c508f53dc7f471908ca69f5b5c5892c813b9056fd6fe32419398b182a437d2e455f4a3af4643664dc6b1098465db256d9211448c517d9e169
-
Filesize
47KB
MD5b7f82b9aa806dbe9f106415f68a04b6e
SHA1b327ed3fb7e2e62dc518700cba9cf862993c6a66
SHA2568216f7ba09a98f434114a7ebd651a750fdda49f07e93e89e8b66a1f449cbf6aa
SHA51266c45c8b7bfba1dc3aa5f25b9d0a9e5243b651c18208adf810646146c1ae9f6376377dd36e422dd1d6d5c8ee01529eb6adc0a233f507fd7c7aaf26f8765d1183
-
Filesize
15KB
MD5988204f5136f890cd7a4f154f8231c57
SHA16b462b89049e1ff082c6701c7aee96648d5a8a91
SHA256f45378db30ff8143848065ba043f4c5ab66bc6b0ec9fb6fd314cd7dc6c616a75
SHA51256605c7419d3e1b3d6201798e23adc64fb7b78cdf1aaacaa4a812038f3399776eb219eed1042e0c44f996c54adf463ff76ad80a296e2aed4bc154fb326d0eea1
-
Filesize
15KB
MD56944032d26e06baed796a9742251ac31
SHA162301958d5edb416be3b8c2b0502ce3d4d1787c6
SHA256a9f431fe2e57a2d7bd75e09e9b9fb014ded5c5769895bea6b6eb013275f5331b
SHA512f266bdfc2e6737808cf492630f75c21b150b18221f4c9c1acb7f269cacdfde24edfb24805268e786b7330f6f621a0727d27cf20c3831bb0af64f77bf05937087
-
Filesize
7KB
MD5064b315ebff516e67211c40f4e14f149
SHA1014493d17c8d88f38565a6d1c4e9dcd85facaf52
SHA256a48d8fcac4a3adfa9d6cf238e349ae6932c52bc1b61ea963847ef1803a57dcde
SHA5125a000c6f52004a12745cabfb080751e581a844d1bdc3c6cfb12ea91d93a316f130a5d12c31c44d476d40a021c72a23cd9e83dbc496ffc60713cbfac177ca761f
-
Filesize
877B
MD59814b140eb85668b095096dc0ac32702
SHA127e792330b4526b0f1ccb1eb212f9a80262353fd
SHA2563d3a137cdf8a12a35f67451a8afead595b6281f3de271673606ee80a47de9eb0
SHA5124caa4a28649dd76b4e845e928eb0893ad1a50cd4aaa6d58d3123303dcf07f42379171740a4d2c77ceb854b54c86f3c430ef6429bd5d10ad2b96fbcfef0a4fb13
-
Filesize
18KB
MD56346a98ae5907a512a4909a09972bb6f
SHA1c10aaa27793d2a7446f816614c3b407147aa05c3
SHA2567103779b4fed55e7c7756bbecc3d89bd3f15c315dac89d299771cd8ca9e20ab6
SHA512151334e5fd39e5eab91107e5771bfa8d189f989dd946e58a104741ece317f8b76cb418c439ff135c9816284a8d0c0e4841a6d533847b8a64e40606e1917886ed
-
Filesize
330B
MD5fa2d06a91d3e8cf9a622bd319f95437c
SHA124435240f4bc1e487267cf5b35ec805c696e8177
SHA256d00284b54eb03909168f55b06eca727dc4557b7be65e438ff21915f35cc9b09b
SHA512beada5a19f5ecdfbac88fbdd2fc2c3fd3e0ccb6ff45e6e7d8af0ca19747b73d1b0634889af3931a5fab150bf1cef469a2fdc6229b3bfe3141eb5c7f9f30d6756
-
Filesize
18KB
MD5158456bd9ff760a8da3b189f5b1d2835
SHA19d058b9912746a53a44d910d528497c1c7c145d9
SHA256360ebd343d86d333df49dfae46813385bdd524e70f435034d7941c37b35e1874
SHA5125a4ff6b5c631ed52ecc74d73e37d3749c8920ab5fcdd0433a94580d8f3413769d2b26729d1d2cb5e0194cda9c258fd959f09f90a5e0cd6d9cfcb8c98456957a3
-
Filesize
330B
MD5e879a5fec61f35c17d43c576fdf7b0cc
SHA11c1198c73fb32692cdae74c1c397a2065d41ff8f
SHA25654702ac2745aa5d6655d2ba00a2110d9503c4c0126f4926f8877149528f9922a
SHA512acbbc218354efa7bb77bf716752ddb112716db1f2e0f5b3cecfe05c461e834c5e0d677e1a89d5c3dbbb32d53169f33a40894b54008bb7072e4d4c08b5613f566
-
Filesize
1KB
MD54a8b69d1b2c8695736b8c2273da513dc
SHA16519bfd357318ebc69831e8c9a12626c5a34dc2e
SHA256d9edfacf147f183b116c4ba680fe1087d13f04fa7dc92ca7e9bc9f2fdbca24b6
SHA512e4bf306c4ff1b6be85fa7824ba7e9c50906e965553fcbcb9debd966220b0328134d99ceedc6d563296332056c243dd310e8fe36e2fee2c3864f7aa67fde225e5