Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0633631727771a19c3593b678268e8f9.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_0633631727771a19c3593b678268e8f9.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_0633631727771a19c3593b678268e8f9.exe
-
Size
276KB
-
MD5
0633631727771a19c3593b678268e8f9
-
SHA1
2c8af799af11e03abc5face54f3943c2b3071203
-
SHA256
dd754c7e866babc27f01d9e9b3bbac680dcc3e83b8a748d39e026b871052b527
-
SHA512
f705f51b7f49f51a13c4509909b80e7eaeecf2914867b41f42dd13f655ad1e815355366cb05b9a6093c1887dae569f204b9ca7ad5761a3f1952b3cbc9b31645b
-
SSDEEP
6144:wL+ROMHXZ99JX2WngMNSYZh1r0CLf2dWsLf2EUOH9:wQ7J9PgMN7LsqEUO
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+sacou.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/CAA3D01874756BD4
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/CAA3D01874756BD4
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/CAA3D01874756BD4
http://xlowfznrg4wf7dli.ONION/CAA3D01874756BD4
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (436) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2868 cmd.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe -
Executes dropped EXE 2 IoCs
pid Process 2512 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\dyidjqp = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\exhkqpjxdgng.exe" exhkqpjxdgng.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2928 set thread context of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2512 set thread context of 2820 2512 exhkqpjxdgng.exe 34 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_glass.png exhkqpjxdgng.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\calendar.css exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref_PAL.wmv exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\System\msadc\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Java\jre7\lib\management\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\1047x576black.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg exhkqpjxdgng.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows NT\TableTextService\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\9.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)alertIcon.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Journal\it-IT\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_right.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\System\es-ES\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows NT\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_ReCoVeRy_+sacou.html exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_MATTE2_PAL.wmv exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_ReCoVeRy_+sacou.png exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_ReCoVeRy_+sacou.txt exhkqpjxdgng.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\settings.js exhkqpjxdgng.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\softedges.png exhkqpjxdgng.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\exhkqpjxdgng.exe VirusShare_0633631727771a19c3593b678268e8f9.exe File opened for modification C:\Windows\exhkqpjxdgng.exe VirusShare_0633631727771a19c3593b678268e8f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000febd12c7e5ffe9b5817cfb407b810efb0121e3f54985ec531748d884b78aca84000000000e80000000020000200000002ede93fb2252bdaab76a0c5decffef05754ba65e53e4dfb2874e896884ff699920000000d919739318924748ddbab8a3f81a587f661d041297f471cc27a54eb07fcfc90e400000005d6297cf25ca9a074c066fa475862c5108e9c9f3b02a6ecc11884b2bd416694956bc965b1e803d6c2fe92f9a6beaede28b682781eb5c46e50666881c061a63b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05c157620bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A18F84B1-2713-11EF-BADF-D62CE60191A1} = "0" iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1796 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe 2820 exhkqpjxdgng.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe Token: SeDebugPrivilege 2820 exhkqpjxdgng.exe Token: SeIncreaseQuotaPrivilege 280 WMIC.exe Token: SeSecurityPrivilege 280 WMIC.exe Token: SeTakeOwnershipPrivilege 280 WMIC.exe Token: SeLoadDriverPrivilege 280 WMIC.exe Token: SeSystemProfilePrivilege 280 WMIC.exe Token: SeSystemtimePrivilege 280 WMIC.exe Token: SeProfSingleProcessPrivilege 280 WMIC.exe Token: SeIncBasePriorityPrivilege 280 WMIC.exe Token: SeCreatePagefilePrivilege 280 WMIC.exe Token: SeBackupPrivilege 280 WMIC.exe Token: SeRestorePrivilege 280 WMIC.exe Token: SeShutdownPrivilege 280 WMIC.exe Token: SeDebugPrivilege 280 WMIC.exe Token: SeSystemEnvironmentPrivilege 280 WMIC.exe Token: SeRemoteShutdownPrivilege 280 WMIC.exe Token: SeUndockPrivilege 280 WMIC.exe Token: SeManageVolumePrivilege 280 WMIC.exe Token: 33 280 WMIC.exe Token: 34 280 WMIC.exe Token: 35 280 WMIC.exe Token: SeIncreaseQuotaPrivilege 280 WMIC.exe Token: SeSecurityPrivilege 280 WMIC.exe Token: SeTakeOwnershipPrivilege 280 WMIC.exe Token: SeLoadDriverPrivilege 280 WMIC.exe Token: SeSystemProfilePrivilege 280 WMIC.exe Token: SeSystemtimePrivilege 280 WMIC.exe Token: SeProfSingleProcessPrivilege 280 WMIC.exe Token: SeIncBasePriorityPrivilege 280 WMIC.exe Token: SeCreatePagefilePrivilege 280 WMIC.exe Token: SeBackupPrivilege 280 WMIC.exe Token: SeRestorePrivilege 280 WMIC.exe Token: SeShutdownPrivilege 280 WMIC.exe Token: SeDebugPrivilege 280 WMIC.exe Token: SeSystemEnvironmentPrivilege 280 WMIC.exe Token: SeRemoteShutdownPrivilege 280 WMIC.exe Token: SeUndockPrivilege 280 WMIC.exe Token: SeManageVolumePrivilege 280 WMIC.exe Token: 33 280 WMIC.exe Token: 34 280 WMIC.exe Token: 35 280 WMIC.exe Token: SeBackupPrivilege 1904 vssvc.exe Token: SeRestorePrivilege 1904 vssvc.exe Token: SeAuditPrivilege 1904 vssvc.exe Token: SeIncreaseQuotaPrivilege 2224 WMIC.exe Token: SeSecurityPrivilege 2224 WMIC.exe Token: SeTakeOwnershipPrivilege 2224 WMIC.exe Token: SeLoadDriverPrivilege 2224 WMIC.exe Token: SeSystemProfilePrivilege 2224 WMIC.exe Token: SeSystemtimePrivilege 2224 WMIC.exe Token: SeProfSingleProcessPrivilege 2224 WMIC.exe Token: SeIncBasePriorityPrivilege 2224 WMIC.exe Token: SeCreatePagefilePrivilege 2224 WMIC.exe Token: SeBackupPrivilege 2224 WMIC.exe Token: SeRestorePrivilege 2224 WMIC.exe Token: SeShutdownPrivilege 2224 WMIC.exe Token: SeDebugPrivilege 2224 WMIC.exe Token: SeSystemEnvironmentPrivilege 2224 WMIC.exe Token: SeRemoteShutdownPrivilege 2224 WMIC.exe Token: SeUndockPrivilege 2224 WMIC.exe Token: SeManageVolumePrivilege 2224 WMIC.exe Token: 33 2224 WMIC.exe Token: 34 2224 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2300 iexplore.exe 2152 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 2928 wrote to memory of 1320 2928 VirusShare_0633631727771a19c3593b678268e8f9.exe 28 PID 1320 wrote to memory of 2512 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 29 PID 1320 wrote to memory of 2512 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 29 PID 1320 wrote to memory of 2512 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 29 PID 1320 wrote to memory of 2512 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 29 PID 1320 wrote to memory of 2868 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 30 PID 1320 wrote to memory of 2868 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 30 PID 1320 wrote to memory of 2868 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 30 PID 1320 wrote to memory of 2868 1320 VirusShare_0633631727771a19c3593b678268e8f9.exe 30 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2512 wrote to memory of 2820 2512 exhkqpjxdgng.exe 34 PID 2820 wrote to memory of 280 2820 exhkqpjxdgng.exe 35 PID 2820 wrote to memory of 280 2820 exhkqpjxdgng.exe 35 PID 2820 wrote to memory of 280 2820 exhkqpjxdgng.exe 35 PID 2820 wrote to memory of 280 2820 exhkqpjxdgng.exe 35 PID 2820 wrote to memory of 1796 2820 exhkqpjxdgng.exe 43 PID 2820 wrote to memory of 1796 2820 exhkqpjxdgng.exe 43 PID 2820 wrote to memory of 1796 2820 exhkqpjxdgng.exe 43 PID 2820 wrote to memory of 1796 2820 exhkqpjxdgng.exe 43 PID 2820 wrote to memory of 2300 2820 exhkqpjxdgng.exe 44 PID 2820 wrote to memory of 2300 2820 exhkqpjxdgng.exe 44 PID 2820 wrote to memory of 2300 2820 exhkqpjxdgng.exe 44 PID 2820 wrote to memory of 2300 2820 exhkqpjxdgng.exe 44 PID 2300 wrote to memory of 2448 2300 iexplore.exe 46 PID 2300 wrote to memory of 2448 2300 iexplore.exe 46 PID 2300 wrote to memory of 2448 2300 iexplore.exe 46 PID 2300 wrote to memory of 2448 2300 iexplore.exe 46 PID 2820 wrote to memory of 2224 2820 exhkqpjxdgng.exe 47 PID 2820 wrote to memory of 2224 2820 exhkqpjxdgng.exe 47 PID 2820 wrote to memory of 2224 2820 exhkqpjxdgng.exe 47 PID 2820 wrote to memory of 2224 2820 exhkqpjxdgng.exe 47 PID 2820 wrote to memory of 2304 2820 exhkqpjxdgng.exe 50 PID 2820 wrote to memory of 2304 2820 exhkqpjxdgng.exe 50 PID 2820 wrote to memory of 2304 2820 exhkqpjxdgng.exe 50 PID 2820 wrote to memory of 2304 2820 exhkqpjxdgng.exe 50 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" exhkqpjxdgng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System exhkqpjxdgng.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_0633631727771a19c3593b678268e8f9.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_0633631727771a19c3593b678268e8f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\VirusShare_0633631727771a19c3593b678268e8f9.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_0633631727771a19c3593b678268e8f9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\exhkqpjxdgng.exeC:\Windows\exhkqpjxdgng.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\exhkqpjxdgng.exeC:\Windows\exhkqpjxdgng.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2820 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT5⤵
- Opens file in notepad (likely ransom note)
PID:1796
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\EXHKQP~1.EXE5⤵PID:2304
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE3⤵
- Deletes itself
PID:2868
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD50c7c78ea2bd9028a18614e6372db86f5
SHA114462531477c99e1026d236a7862c26d071bfbda
SHA256154d53b57d3549820dbafabaab1f9647a6bc4e1b3a33b7d3e2fb314cbe33c926
SHA512fc1ce8db2eb2eba18010b1a06d1728be159575ded704ea3f4c66dd24d1257ed95065a0a88f0110f3445e583e2c57d5942799f4d7873c7e2f75c397c87281a6a0
-
Filesize
65KB
MD5270f538beceff606d50f7b1c705fa56d
SHA1018e7410ebc50ec631f8a85f7ea78a8268f64587
SHA2560269301b7076291958dbe5e46cb419c108725fc0870b03b8ba7b2fcdfd240793
SHA512b8238644c8548d383d17f42b4faa58f023a6f1c92cd32611d6e3464ce1354269c0c20e3af4d26cf1b9baefc05a0d5282a3cb4c2c25f184768fbcdbe8ef5187f6
-
Filesize
1KB
MD5b4ebc6f86ed2aad763455bb57f8b5b0a
SHA1df316306f07a6a673d2161aaf03b979b435defbf
SHA256089b96c2ea83c7531b87840507eb808652a6ba13d62d8ad7cfc4151d821ed00d
SHA512415ee0f7c32ed4ad2301f74facd7315df2ffa060b7ff133541b8ab3f9ad2c8e985778c314de8f732892f0fd3ab55d59a2f79b4f0ac2d3a5509a800d654f3ce4a
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD58a9d54219e0d7bb18c610b6f44c0bbb5
SHA1eeb74fabe56a82ad703c2846266c7d30b7477d29
SHA25695a31ac43190309f0ed5335eab1444228f6e2d36468bd43ecec153cde9a33ef9
SHA5122886cdc86c17b2b005ee547b0e931056fa4486b285e27801e50887058a60474bce627ef123c948f2b89e90c5fc56b48052a4ac9c1522be8592b2ddfce15a8947
-
Filesize
109KB
MD5cdcac6afb321341f4652ebc061e4b30c
SHA1be0fe861aa8b6e7b97d5097d8109303ba2c13f03
SHA25685df0ddf4f685201ff78e6f35423235580ae59690b6dc2fde99ed0bf24fc6879
SHA512723f55815edaf27e07d89e685850763598f70c52dfb65a7aedfbb48c4572c4bed95deff00de22c6966feabaf2f0e6be141d65d76244692b9bbf7056a8a2da4c3
-
Filesize
173KB
MD59bc019a7eacda21e34f14316390eb8b0
SHA1030dd7c1c2d06e377557d9be0a8ec7376a4ca683
SHA2561c70a81fc0495792f67bd0767fb461edb6e2de08fa8e96527b89d824b649998c
SHA5127f98e8c4f996285e40549d9e31580209599ac9807ea44cfcf9699bc4a6408154bc9d1f1e05228a720850ce604ffd407cfb37b475f495458cb33f3059e52cc4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87420ff9e6b9c9f7dce89ae0d208f0c
SHA117fab44c4c77101686b85aef27098389d517c9e4
SHA256feda70eae758e98d4d257f0ca292c2cf7d1db84ae23d813a51bdbc1b586c0bd0
SHA512b85603ae8b002cccf6b05a6e3afc1f65bde00161899bc6c2f2ff3cef1632d52486466b37901534cbf094718b210bd2b9df8be3192ae93a2c717a4a5f0440ce53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505c20a1f36b3408cc19f1150f220965
SHA12a4d69817d89c8411d0453f0becac390685c657b
SHA25679c6ecc41ea3872b78ba412353ca8dcb579466447d5531ad366ca1ffb4d3659d
SHA5129c1482630e5907cbb452862ebd78dd1a3e242c134ca0b642d4041b06bcaa857441c481fa25ac52c577a45a414f70fb4264d18b7f49445213e9d1b2781717ec0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedd1870240cfbdd965553278d65e636
SHA1b360aaa76d30f5f84e7de47600f7357acb4bc44e
SHA256b5ae095931204bcb3767e5bf5d585bbbd98a083ec3a4f35ff2e66ddea9f2fdb8
SHA512f742c88a1767a23fae871f27ac7daf74401ff4b6ac522198ef64a63f6900d6d9df22f567aa3dc8b4154ca6b1a84ebcd7f26c0c677a4414910517a9d78d1be3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9fcde2eeb5716abb671b95a0ecf0af
SHA12f5a12e1ed7d1ccc64d2c1806b7fd23db3013a23
SHA256a29b68a236e2fef196269d074fb299bb1b1a120baf81c59341fcbbaddc1edf22
SHA512e6fceee1d5fa5c8d5662c8b0fa996c35968484938953fcd9abbb1524820eff9831a5cef8c0e7e64cb609faee62f672504872a38daa6aec58c3ede4572a2d0d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffcc420c8da9ebd7c1ff17c54412f9e
SHA1a3107afe171314e4d3821b5eb105757a170818be
SHA256e91288dce1a089d36085d1a6a6b2684ebeeb79b01a47b473b24fc65beace64f0
SHA512b54bd5c8be28c22f1fbde49167735ca7769b1b4bcd98c332e859b27393de0acce0ca1ab932d6b1f9bca60a6debaf42a8a59dea7c4f771456900c027de2bc429b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30a20b6ebbd917628bd1d5eab0afee3
SHA15839bc71d254531ff728ce508cd9c38d2b033b0f
SHA256213873db9035c3ad28642451d5213f43b030117a04e9571ac6851e6756399508
SHA512ff75424ebd9c6ba88b45d89cc821dfe84134732102ded0cdb5685906d565ba6964c24e9cb767338813f19fbdc26459af7de347e92af20765add0b7b18233c9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe18b701aabf7a389a3dff7bec22d43e
SHA1983cc6e708983b7eebfdb39917f01ff6196156a9
SHA256aafbcdd10e67d46c86513f748897a68bcb9140771b620ebbda44d8d94dedb90c
SHA512b24235263844077f9aedd0955eb1457341a3724151ea2cb95b9e3dbbc6215f46aa838799aecfa72dcf6c716d477f98551a455ce97295ab9af13f27365ef62555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4bb96b41d4d22349b8a2adab38000d0
SHA1baf97d6795afdc19510c9d80e130d8fe53ab488b
SHA256e79e0f7e6bd728f7a4fdc526517c9b9377528e8234795a2aa1c0c19b8ebaf948
SHA512976e36381697ed778422d6c4372b9beab3150087d939435cf0692905a58adff6a64c8872f5213b1cb942b7abafca8317006598bcf880717c855851caef32ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56104ff937a832e73ee89acf4fa99cfa7
SHA13a582c9e4f4a53a671d15a5989c13f34a9d54b5b
SHA2562ddf39ef069ebf48bde82a22613299449571341730708aa85d6783ad058581f3
SHA51269053a7abb09844f71584ae6e3ad79c5a537d3ae1ca478b64bab1756f9a11f98872a6344ae84002aab18e7bde395024bf04403c9f5a2b0e49dbe009bcf12f2b0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
276KB
MD50633631727771a19c3593b678268e8f9
SHA12c8af799af11e03abc5face54f3943c2b3071203
SHA256dd754c7e866babc27f01d9e9b3bbac680dcc3e83b8a748d39e026b871052b527
SHA512f705f51b7f49f51a13c4509909b80e7eaeecf2914867b41f42dd13f655ad1e815355366cb05b9a6093c1887dae569f204b9ca7ad5761a3f1952b3cbc9b31645b