Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 11:58
Static task
static1
Behavioral task
behavioral1
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
Resource
win11-20240508-en
General
-
Target
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe
-
Size
115KB
-
MD5
63a945da1a63a8e56e8220c4ccf7fd0c
-
SHA1
a99cf1a2426edeac97c789d0a4b7d38606d7aa45
-
SHA256
ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195
-
SHA512
34006d84587ea90e243ebe0dd6bde8bd502ed688001a412898cd4e4c16a5de5788a9fa4c53d3ea79e4307adaa74496e05b205bf9717ac833db976551b1a7c89c
-
SSDEEP
1536:ikB/Ih3+7QuoZVQgf5GV2jSzGpAyZ4ICS4AwnfxnuLdSbSmoNUExd9M4dgS:gFW7gSzKDin5nWhw4dgS
Malware Config
Extracted
C:\Users\swffdjo9-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/98B7F72715337990
http://decryptor.cc/98B7F72715337990
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\O: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\A: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\J: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\L: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\N: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\I: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\M: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\R: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\V: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\K: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\S: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Z: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\W: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\X: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\G: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\H: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\P: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Q: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\U: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\B: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\T: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\Y: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\D: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened (read-only) \??\F: ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w25le81.bmp" ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification \??\c:\program files\UndoSync.mpeg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UninstallTest.wmv ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UseOut.mid ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File created \??\c:\program files (x86)\swffdjo9-readme.txt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RevokeSend.wma ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\SearchResume.txt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UnregisterWrite.mpeg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\SubmitCheckpoint.mpg ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\UseStop.ppsx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File created \??\c:\program files\swffdjo9-readme.txt ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\ConnectAssert.js ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RegisterMount.ADTS ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RequestCopy.ps1xml ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\RevokeHide.crw ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\SetJoin.pcx ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe File opened for modification \??\c:\program files\WriteNew.ttf ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133629264275010705" chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 4512 powershell.exe 4512 powershell.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe Token: SeDebugPrivilege 4512 powershell.exe Token: SeBackupPrivilege 100 vssvc.exe Token: SeRestorePrivilege 100 vssvc.exe Token: SeAuditPrivilege 100 vssvc.exe Token: SeTakeOwnershipPrivilege 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe Token: SeShutdownPrivilege 1908 chrome.exe Token: SeCreatePagefilePrivilege 1908 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3804 wrote to memory of 4512 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 85 PID 3804 wrote to memory of 4512 3804 ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe 85 PID 1908 wrote to memory of 4956 1908 chrome.exe 101 PID 1908 wrote to memory of 4956 1908 chrome.exe 101 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 2720 1908 chrome.exe 102 PID 1908 wrote to memory of 272 1908 chrome.exe 103 PID 1908 wrote to memory of 272 1908 chrome.exe 103 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 PID 1908 wrote to memory of 2696 1908 chrome.exe 104 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe"C:\Users\Admin\AppData\Local\Temp\ffe7fe45327645a48ca83b7dd4586de22618206001b7a7354d9d285e0308f195.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1652
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:100
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\swffdjo9-readme.txt1⤵PID:3840
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\swffdjo9-readme.txt1⤵PID:3320
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcdcdcab58,0x7ffcdcdcab68,0x7ffcdcdcab782⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:22⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2292 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3108 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3808 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4580 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4956 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4636 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4844 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4812 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4164 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4312 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5056 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1968,i,10323346119196957492,2015298316286170098,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5605f13e4eef1a9c06c938436f88968e6
SHA1616005bed33ffd02f5b193319e85a66afffbf854
SHA2565fcc6026d99ac151fc3b28ae3e825182bf281e8a544000b841126af37b8f7387
SHA512eb116ac50c856ab7b369cea4817a4300a914c61a0c830835ec721ec321dcbdad37996ee328f4fc6bc9eb4ce3e556726afa7e5a2e71341d54b3fd3f5df0d8247e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\05360459-8b80-4eca-b2d0-edbbdc4058dd.tmp
Filesize2KB
MD589a92aced05ba866dd1c79b7e4326ff2
SHA1a8163c30ce674cda026627ae297d01e459591817
SHA256b0951837de211ac2153baac401bc17926d532677e9f551d6ca06091e7e72dee3
SHA5123327df7c5b5a6f16f3297636a65467113ed434be805b80a8e8050f1e4acdcc6cd43039c43180a9f790b2546b8c6ffad83de46f8463b823d72cae7a2eab9da273
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD561332d8a508adffc4882521d0cbb48d2
SHA1915fd81d15ae034d2ea04282a8e851bedfba5593
SHA256377991fef8ed4018a88c6ad571810de8433dfcd5ad66b98d3d33426134a3ab8e
SHA5123a723d0aedc8cdbcb41e112a4b813d107fa1c45424d0c2658c24ab2954c1efd20befd7a08605df08696a02daf04b84a67aeb9feaf325c47832675aa149c94ae7
-
Filesize
356B
MD508ca3e796c8e11af528d2b65e4b38165
SHA12597b9af92d23a5dd6bf019b186cad55ce95458c
SHA2565edef192d1000a57c79fda9cd88fe7fa7d2dfcb52ce9a051f2bbfbed6ec226a6
SHA512c9ada160f7881dfca4286b777c13f9e43f5b25c80ae59d215e5b6bfcfe548c32a08b840c1353368112023d05ad52ae67ed1f6572280b7c378a1385ee3469c018
-
Filesize
6KB
MD5f9d474a25ea3108ec41a7f1a63032ecd
SHA17c10240c98ff00d7af95a79c099e70671407a897
SHA256a5b1583b6336e9e25375dd3117e3e90a862f29e186dfe48a95a4d419c6db597f
SHA512564bdc7060e9155dc7e232c7a31e49f173fa3cb4dd13291dda3efb074ff27141ac5287c2e41a442e5173771990c9dd39e9471924f7b88fa60fab778030ca5c4c
-
Filesize
7KB
MD51b4b50751968cf805d68087cc4ae86cf
SHA1ef3b33920cae05825df0a6973ea4ffd7726fe905
SHA256f7d995a72979891fd44786297e5d8aca79bd987055b7a5815485ceb075c60b79
SHA5120477ab9131eacb9215d65ecd26d969eea1fda0ce7808b927335af0e37cc8842cf4f698c2ac6757dbdece19b1924119beb0817400cbe39288cc77ddaa361c910c
-
Filesize
7KB
MD5bb658de28b0d11dc3fa91424769264cc
SHA146a5e93da3b7f03b3fcec5eba78495bec9df63f5
SHA256c382e733bdee488d742a5c85b3fd1b1384a9c0ef286407d0ca49c6631160bb7a
SHA5126bc79d28611bff08203397e08899a9eddb0ee7345ac89e8d9c3a137ec28eb3d31f00fec47354567b4cd949a167f8114dd3fc7a7b1f9545187228ceeb813315ca
-
Filesize
16KB
MD5e2f05c64eb9d3730348e3162f6fdf3de
SHA1bed6a06e5ca8f5ef8438f92061d5e29070d890e0
SHA25639aa2ec09131ccb78fc31062ce3e10d9c514d7e5ba1404cde2c106d371c46153
SHA512dcc7329bce855626f0c464a776e9a0a2930599bc5a206309ab19a4173c97ebf0217ac5e0575efdbdd5b002534d764c1a2769ef9593e2c3880e8917b0528d3dcb
-
Filesize
276KB
MD5052c783ce92943d6a1f627f72b68da08
SHA179c3eda641599fc5ee443969babe90a66cc615d3
SHA256f8009abe459fce4ef7ef8f05ab26038a7217ad3919c7df480bc6436709a8af1e
SHA512c75d30cb9f9dc04f241d93daa636a0d163b50430b7e09177d6f752761ed95a5fb7e5976268e9ba246fa3317286fe17615bb39142dd2057696c01d61fc934934d
-
Filesize
276KB
MD5308282d02d4d82c968661f5aada97cf3
SHA1956c588c5c9f0418ae841ce92c99aa3d04561123
SHA25656ebbb1d4368947e98d93db555bc0679909251b186a5ec03625b9e4ef1d51084
SHA512115c5d1f38aa3fd0c1fb451fe12745d3be9aa61b5e683af6bc55e1d56de8f16fc969e32b1d73ada4d43cae57cd643cc5be59358d391de0474f54d019dd7701c7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
7KB
MD59f20627f879c79bec39473697e707b25
SHA176ac21ac13f38992e9384da676a55493b1082b87
SHA2569bf9eedd4fb245a8ca5d4afe59d71eb070cadc475111e6e9ca711a2b8727b1e2
SHA51220af665a0b6417a7e24aaf4a98725c6abe694a082ded2c362c67f1fa8bfb6026a5230f6e37e9172b140e7df035daee50532a7288647ba374a1f69d2dd2ab5766