Overview
overview
10Static
static
32272954a2c...5a.exe
windows7-x64
102272954a2c...5a.exe
windows10-2004-x64
1072716d15ea...21.exe
windows7-x64
772716d15ea...21.exe
windows10-2004-x64
7Bit Paymer.exe
windows7-x64
10Bit Paymer.exe
windows10-2004-x64
10KeepCalm.exe
windows7-x64
1KeepCalm.exe
windows10-2004-x64
1LockedIn.exe
windows7-x64
9LockedIn.exe
windows10-2004-x64
9NotPetya.dll
windows7-x64
10NotPetya.dll
windows10-2004-x64
10Purge.exe
windows7-x64
1Purge.exe
windows10-2004-x64
1Scarab.exe
windows7-x64
10Scarab.exe
windows10-2004-x64
10a631ad1b1a...4b.exe
windows7-x64
6a631ad1b1a...4b.exe
windows10-2004-x64
6a9053a3a52...bc.exe
windows7-x64
7a9053a3a52...bc.exe
windows10-2004-x64
7b764629e1f...1c.exe
windows7-x64
10b764629e1f...1c.exe
windows10-2004-x64
10cf89f70633...5c.exe
windows7-x64
1cf89f70633...5c.exe
windows10-2004-x64
3e951e82867...50.exe
windows7-x64
1e951e82867...50.exe
windows10-2004-x64
1fa0c321e1a...d2.exe
windows7-x64
9fa0c321e1a...d2.exe
windows10-2004-x64
8fc184274ad...27.exe
windows7-x64
10fc184274ad...27.exe
windows10-2004-x64
10Resubmissions
18-07-2024 07:25
240718-h84wjs1hpb 1018-07-2024 07:19
240718-h51pqa1gng 1017-07-2024 20:55
240717-zqkhmaydmq 1017-07-2024 19:21
240717-x2pwdaycjb 10Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Bit Paymer.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Bit Paymer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
KeepCalm.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
KeepCalm.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
LockedIn.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
LockedIn.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
NotPetya.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
NotPetya.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Purge.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Purge.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Scarab.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Scarab.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win10v2004-20240709-en
General
-
Target
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
-
Size
121KB
-
MD5
eac0a08470ee67c63b14ae2ce7f6aa61
-
SHA1
285c0163376d5d9a5806364411652fe73424d571
-
SHA256
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7
-
SHA512
f3fd7eeae18843d049443f0d5e818302eb3b3f73ad85e26c01e1ddc0a102a0a22b065afe01879aafc95ff3a2d15b5c302394bd03d91e6c4401648cd4222bddc5
-
SSDEEP
1536:3THoX8wNjiMsyPcjgbKx534oU6Llg/iLBkZhifkdol9LYuVF5yZbn:DjksYKx5o3Slg/itMg8+LYu9ubn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation BC1C9B74EA.exe -
Executes dropped EXE 2 IoCs
pid Process 5028 BC1C9B74EA.exe 4968 BC1C9B74EA.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\00FF1C9B74EA = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe\"" fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BC1C9B74EA = "\"C:\\Users\\Admin\\AppData\\Roaming\\BC1C9B74EA.exe\"" fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\00FF1C9B74EA = "\"C:\\Users\\Admin\\AppData\\Roaming\\BC1C9B74EA.exe\"" BC1C9B74EA.exe -
Drops desktop.ini file(s) 25 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Searches\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\Libraries\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Documents\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\Music\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Links\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Videos\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\Desktop\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\Downloads\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\Pictures\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\Documents\desktop.ini BC1C9B74EA.exe File opened for modification C:\Users\Public\Videos\desktop.ini BC1C9B74EA.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4824 set thread context of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 5028 set thread context of 4968 5028 BC1C9B74EA.exe 126 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\_HELP_INSTRUCTION.TXT BC1C9B74EA.exe File opened for modification C:\Program Files (x86)\_HELP_INSTRUCTION.TXT BC1C9B74EA.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\_HELP_INSTRUCTION.TXT BC1C9B74EA.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1440 sc.exe 2088 sc.exe 660 sc.exe 1312 sc.exe 2472 sc.exe 2800 sc.exe 5084 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings BC1C9B74EA.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\BC1C9B74EA.exe:Zone.Identifier fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3928 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 4824 wrote to memory of 2056 4824 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 94 PID 2056 wrote to memory of 1032 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 95 PID 2056 wrote to memory of 1032 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 95 PID 2056 wrote to memory of 1032 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 95 PID 2056 wrote to memory of 4332 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 97 PID 2056 wrote to memory of 4332 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 97 PID 2056 wrote to memory of 4332 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 97 PID 2056 wrote to memory of 4612 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 99 PID 2056 wrote to memory of 4612 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 99 PID 2056 wrote to memory of 4612 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 99 PID 2056 wrote to memory of 528 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 101 PID 2056 wrote to memory of 528 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 101 PID 2056 wrote to memory of 528 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 101 PID 2056 wrote to memory of 4528 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 103 PID 2056 wrote to memory of 4528 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 103 PID 2056 wrote to memory of 4528 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 103 PID 1032 wrote to memory of 2088 1032 cmd.exe 105 PID 1032 wrote to memory of 2088 1032 cmd.exe 105 PID 1032 wrote to memory of 2088 1032 cmd.exe 105 PID 2056 wrote to memory of 4856 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 106 PID 2056 wrote to memory of 4856 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 106 PID 2056 wrote to memory of 4856 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 106 PID 2056 wrote to memory of 3264 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 108 PID 2056 wrote to memory of 3264 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 108 PID 2056 wrote to memory of 3264 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 108 PID 2056 wrote to memory of 3044 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 110 PID 2056 wrote to memory of 3044 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 110 PID 2056 wrote to memory of 3044 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 110 PID 2056 wrote to memory of 464 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 112 PID 2056 wrote to memory of 464 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 112 PID 2056 wrote to memory of 464 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 112 PID 4332 wrote to memory of 660 4332 cmd.exe 113 PID 4332 wrote to memory of 660 4332 cmd.exe 113 PID 4332 wrote to memory of 660 4332 cmd.exe 113 PID 4612 wrote to memory of 1312 4612 cmd.exe 115 PID 4612 wrote to memory of 1312 4612 cmd.exe 115 PID 4612 wrote to memory of 1312 4612 cmd.exe 115 PID 2056 wrote to memory of 1596 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 116 PID 2056 wrote to memory of 1596 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 116 PID 2056 wrote to memory of 1596 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 116 PID 528 wrote to memory of 2472 528 cmd.exe 118 PID 528 wrote to memory of 2472 528 cmd.exe 118 PID 528 wrote to memory of 2472 528 cmd.exe 118 PID 4528 wrote to memory of 2800 4528 cmd.exe 119 PID 4528 wrote to memory of 2800 4528 cmd.exe 119 PID 4528 wrote to memory of 2800 4528 cmd.exe 119 PID 4856 wrote to memory of 1440 4856 cmd.exe 120 PID 4856 wrote to memory of 1440 4856 cmd.exe 120 PID 4856 wrote to memory of 1440 4856 cmd.exe 120 PID 3264 wrote to memory of 5084 3264 cmd.exe 121 PID 3264 wrote to memory of 5084 3264 cmd.exe 121 PID 3264 wrote to memory of 5084 3264 cmd.exe 121 PID 2056 wrote to memory of 5028 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 125 PID 2056 wrote to memory of 5028 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 125 PID 2056 wrote to memory of 5028 2056 fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe"C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe"C:\Users\Admin\AppData\Local\Temp\fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop VVS3⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\sc.exesc stop VVS4⤵
- Launches sc.exe
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\sc.exesc stop wscsvc4⤵
- Launches sc.exe
PID:660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wuauserv3⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\sc.exesc stop wuauserv4⤵
- Launches sc.exe
PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop BITS3⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\sc.exesc stop BITS4⤵
- Launches sc.exe
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop ERSvc3⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\sc.exesc stop ERSvc4⤵
- Launches sc.exe
PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop WerSvc3⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\sc.exesc stop WerSvc4⤵
- Launches sc.exe
PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All /Quiet3⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled No3⤵PID:464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:1596
-
-
C:\Users\Admin\AppData\Roaming\BC1C9B74EA.exeC:\Users\Admin\AppData\Roaming\BC1C9B74EA.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5028 -
C:\Users\Admin\AppData\Roaming\BC1C9B74EA.exeC:\Users\Admin\AppData\Roaming\BC1C9B74EA.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_HELP_INSTRUCTION.TXT5⤵
- Opens file in notepad (likely ransom note)
PID:3928
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562e53ce26db5098f76a5337cbfd7bf64
SHA1db36b49263c1eddd6874f0ba667a5adc0e3ba644
SHA2562cf42abd200c8ca9bf5337752b495d7bf6b3143f61a5894a8ea2443a2a178cf9
SHA512d4e6a9aefe0ed07d443b8d2ecde211b94ea7a0c810e7f1696ed52ec46400a34dc6761c70a35440081ed20d47eeba0c37b699bd8c90bbf7e24680c6b42849097a
-
Filesize
121KB
MD5eac0a08470ee67c63b14ae2ce7f6aa61
SHA1285c0163376d5d9a5806364411652fe73424d571
SHA256fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7
SHA512f3fd7eeae18843d049443f0d5e818302eb3b3f73ad85e26c01e1ddc0a102a0a22b065afe01879aafc95ff3a2d15b5c302394bd03d91e6c4401648cd4222bddc5