Overview
overview
10Static
static
10malware.zip
windows11-21h2-x64
1Downloads/...za.exe
windows11-21h2-x64
3Downloads/...DC.exe
windows11-21h2-x64
3Downloads/...pt.exe
windows11-21h2-x64
10Downloads/...ing.db
windows11-21h2-x64
3Downloads/...ng.exe
windows11-21h2-x64
6Downloads/...ng.ini
windows11-21h2-x64
3Downloads/...g2.ini
windows11-21h2-x64
3Downloads/...32.dll
windows11-21h2-x64
3Downloads/...g64.7z
windows11-21h2-x64
3Downloads/...mi.exe
windows11-21h2-x64
10Downloads/...ns.ini
windows11-21h2-x64
3Downloads/...35.exe
windows11-21h2-x64
10Downloads/...40.exe
windows11-21h2-x64
10Downloads/...on.tmp
windows11-21h2-x64
3Downloads/...el.exe
windows11-21h2-x64
3Analysis
-
max time kernel
124s -
max time network
131s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-08-2024 08:17
Behavioral task
behavioral1
Sample
malware.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/7za.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/DC.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/[email protected]
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/Everything.db
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/Everything.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/Everything.ini
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/Everything2.ini
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/Everything32.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/Everything64.7z
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/Jami.exe
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/global_options.ini
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/gui35.exe
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/gui40.exe
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/session.tmp
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/xdel.exe
Resource
win11-20240802-en
General
-
Target
Downloads/C963AEC1-6D52-EB4D-61BC-64DB2602EE5F/[email protected]
-
Size
2.4MB
-
MD5
0bf7c0d8e3e02a6b879efab5deab013c
-
SHA1
4f93d2cda84e669eeddcfeb2e2fa2319901059a1
-
SHA256
b600e06f14e29b03f0b1456723a430b5024816518d704a831dde2dc9597ce9c9
-
SHA512
313f9a8ae5a0096488996f51ce0d2049f7040b5cba1f6efd6e7190517accffad9af4d72eb551755978e624f4089b9e5983eae792496b2e8e6da5a6cd7939ae5f
-
SSDEEP
49152:Va/RPnb1b+uL5KTu8l6VP/DOdmGtPY4ldPLuGHnKESY:Va/RTd56M9/DmmGmMiG
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Datadecrypt.txt
https://jami.net/
https://tox.chat/download.html
Signatures
-
Detects Mimic ransomware 2 IoCs
resource yara_rule behavioral4/files/0x000100000002aae3-31.dat family_mimic behavioral4/files/0x000100000002aaed-51.dat family_mimic -
Mimic
Ransomware family was first exploited in the wild in 2022.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Datadecrypt.exe -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2256 bcdedit.exe 2292 bcdedit.exe -
pid Process 4980 wbadmin.exe -
pid Process 1580 wbadmin.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oracle.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBIDPService.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VeeamDeploymentSvc.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tomcat6.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bedbh.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdlauncher.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsDtSrvr.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\java.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchProtocolHost.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdlauncher.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineElevatedCfg.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon64.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbserver.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbserver.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\node.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon64.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsa_service.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\axlbridge.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pvlsvr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\python.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgrN.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlagent.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsnapvss.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1cv8.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EnterpriseClient.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wpython.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wpython.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW64.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlmangr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xfssvccon.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Creative Cloud.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineSettings.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineSettings.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspub.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBIDPService.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW64.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xfssvccon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1cv8s.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocomm.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine_x86.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlagent.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsa_service.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\node.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isqlplussvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-nt.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineElevatedCfg.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VeeamDeploymentSvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsnapvss.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchProtocolHost.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Creative Cloud.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ssms.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agntsvc.exe Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bengien.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isqlplussvc.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW32.exe Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sql.exe Datadecrypt.exe -
Executes dropped EXE 7 IoCs
pid Process 1904 Datadecrypt.exe 2080 Datadecrypt.exe 4432 Datadecrypt.exe 4288 Datadecrypt.exe 2916 DC.exe 1988 Everything.exe 2576 Everything.exe -
Loads dropped DLL 4 IoCs
pid Process 1904 Datadecrypt.exe 2080 Datadecrypt.exe 4432 Datadecrypt.exe 4288 Datadecrypt.exe -
Modifies system executable filetype association 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command\ = "\"%1\" %*" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" Datadecrypt.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" [email protected] Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command\ = "\"%1\" %*" Datadecrypt.exe Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open [email protected] Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command Datadecrypt.exe Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command Datadecrypt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Datadecrypt = "\"C:\\Users\\Admin\\AppData\\Local\\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\\Datadecrypt.exe\" " [email protected] -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Datadecrypt.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\L: Everything.exe -
Power Settings 1 TTPs 15 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2716 powercfg.exe 4340 powercfg.exe 2560 powercfg.exe 3992 powercfg.exe 3480 powercfg.exe 3532 powercfg.exe 4480 powercfg.exe 968 powercfg.exe 2696 powercfg.exe 3572 powercfg.exe 3208 powercfg.exe 5044 powercfg.exe 1524 powercfg.exe 2308 powercfg.exe 892 powercfg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe -
pid Process 2672 powershell.exe 1884 powershell.exe 2788 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Datadecrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Datadecrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Datadecrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everything.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Datadecrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everything.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command\ = "\"%1\" %*" Datadecrypt.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command [email protected] Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command\ = "\"%1\" %*" [email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell Datadecrypt.exe Key created \REGISTRY\MACHINE\Software\Classes\.Jami_decryptionguy Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Jami_decryptionguy\ = "mimicfile" Datadecrypt.exe Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile [email protected] Key created \REGISTRY\MACHINE\Software\Classes\mimicfile\shell\open\command Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\Datadecrypt.txt\"" Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" [email protected] Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command [email protected] Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command Datadecrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" Datadecrypt.exe Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\exefile\shell\open\command Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile Datadecrypt.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe 1884 powershell.exe 1884 powershell.exe 2672 powershell.exe 2672 powershell.exe 2788 powershell.exe 2788 powershell.exe 1884 powershell.exe 2672 powershell.exe 2788 powershell.exe 4432 Datadecrypt.exe 4432 Datadecrypt.exe 4288 Datadecrypt.exe 4288 Datadecrypt.exe 1904 Datadecrypt.exe 1904 Datadecrypt.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4568 [email protected] Token: SeSecurityPrivilege 4568 [email protected] Token: SeTakeOwnershipPrivilege 4568 [email protected] Token: SeLoadDriverPrivilege 4568 [email protected] Token: SeSystemProfilePrivilege 4568 [email protected] Token: SeSystemtimePrivilege 4568 [email protected] Token: SeProfSingleProcessPrivilege 4568 [email protected] Token: SeIncBasePriorityPrivilege 4568 [email protected] Token: SeCreatePagefilePrivilege 4568 [email protected] Token: SeBackupPrivilege 4568 [email protected] Token: SeRestorePrivilege 4568 [email protected] Token: SeShutdownPrivilege 4568 [email protected] Token: SeDebugPrivilege 4568 [email protected] Token: SeSystemEnvironmentPrivilege 4568 [email protected] Token: SeChangeNotifyPrivilege 4568 [email protected] Token: SeRemoteShutdownPrivilege 4568 [email protected] Token: SeUndockPrivilege 4568 [email protected] Token: SeManageVolumePrivilege 4568 [email protected] Token: SeImpersonatePrivilege 4568 [email protected] Token: SeCreateGlobalPrivilege 4568 [email protected] Token: 33 4568 [email protected] Token: 34 4568 [email protected] Token: 35 4568 [email protected] Token: 36 4568 [email protected] Token: SeIncreaseQuotaPrivilege 1904 Datadecrypt.exe Token: SeSecurityPrivilege 1904 Datadecrypt.exe Token: SeTakeOwnershipPrivilege 1904 Datadecrypt.exe Token: SeLoadDriverPrivilege 1904 Datadecrypt.exe Token: SeSystemProfilePrivilege 1904 Datadecrypt.exe Token: SeSystemtimePrivilege 1904 Datadecrypt.exe Token: SeProfSingleProcessPrivilege 1904 Datadecrypt.exe Token: SeIncBasePriorityPrivilege 1904 Datadecrypt.exe Token: SeCreatePagefilePrivilege 1904 Datadecrypt.exe Token: SeBackupPrivilege 1904 Datadecrypt.exe Token: SeRestorePrivilege 1904 Datadecrypt.exe Token: SeShutdownPrivilege 1904 Datadecrypt.exe Token: SeDebugPrivilege 1904 Datadecrypt.exe Token: SeSystemEnvironmentPrivilege 1904 Datadecrypt.exe Token: SeChangeNotifyPrivilege 1904 Datadecrypt.exe Token: SeRemoteShutdownPrivilege 1904 Datadecrypt.exe Token: SeUndockPrivilege 1904 Datadecrypt.exe Token: SeManageVolumePrivilege 1904 Datadecrypt.exe Token: SeImpersonatePrivilege 1904 Datadecrypt.exe Token: SeCreateGlobalPrivilege 1904 Datadecrypt.exe Token: 33 1904 Datadecrypt.exe Token: 34 1904 Datadecrypt.exe Token: 35 1904 Datadecrypt.exe Token: 36 1904 Datadecrypt.exe Token: SeIncreaseQuotaPrivilege 2080 Datadecrypt.exe Token: SeSecurityPrivilege 2080 Datadecrypt.exe Token: SeTakeOwnershipPrivilege 2080 Datadecrypt.exe Token: SeLoadDriverPrivilege 2080 Datadecrypt.exe Token: SeSystemProfilePrivilege 2080 Datadecrypt.exe Token: SeSystemtimePrivilege 2080 Datadecrypt.exe Token: SeProfSingleProcessPrivilege 2080 Datadecrypt.exe Token: SeIncBasePriorityPrivilege 2080 Datadecrypt.exe Token: SeCreatePagefilePrivilege 2080 Datadecrypt.exe Token: SeBackupPrivilege 2080 Datadecrypt.exe Token: SeRestorePrivilege 2080 Datadecrypt.exe Token: SeShutdownPrivilege 2080 Datadecrypt.exe Token: SeDebugPrivilege 2080 Datadecrypt.exe Token: SeSystemEnvironmentPrivilege 2080 Datadecrypt.exe Token: SeChangeNotifyPrivilege 2080 Datadecrypt.exe Token: SeRemoteShutdownPrivilege 2080 Datadecrypt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 Everything.exe 2576 Everything.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 1904 4568 [email protected] 83 PID 4568 wrote to memory of 1904 4568 [email protected] 83 PID 4568 wrote to memory of 1904 4568 [email protected] 83 PID 1904 wrote to memory of 4280 1904 Datadecrypt.exe 85 PID 1904 wrote to memory of 4280 1904 Datadecrypt.exe 85 PID 1904 wrote to memory of 4280 1904 Datadecrypt.exe 85 PID 1904 wrote to memory of 2080 1904 Datadecrypt.exe 86 PID 1904 wrote to memory of 2080 1904 Datadecrypt.exe 86 PID 1904 wrote to memory of 2080 1904 Datadecrypt.exe 86 PID 1904 wrote to memory of 4432 1904 Datadecrypt.exe 87 PID 1904 wrote to memory of 4432 1904 Datadecrypt.exe 87 PID 1904 wrote to memory of 4432 1904 Datadecrypt.exe 87 PID 1904 wrote to memory of 4288 1904 Datadecrypt.exe 88 PID 1904 wrote to memory of 4288 1904 Datadecrypt.exe 88 PID 1904 wrote to memory of 4288 1904 Datadecrypt.exe 88 PID 4280 wrote to memory of 2916 4280 cmd.exe 90 PID 4280 wrote to memory of 2916 4280 cmd.exe 90 PID 4280 wrote to memory of 2916 4280 cmd.exe 90 PID 1904 wrote to memory of 1524 1904 Datadecrypt.exe 95 PID 1904 wrote to memory of 1524 1904 Datadecrypt.exe 95 PID 1904 wrote to memory of 3208 1904 Datadecrypt.exe 96 PID 1904 wrote to memory of 3208 1904 Datadecrypt.exe 96 PID 1904 wrote to memory of 3480 1904 Datadecrypt.exe 97 PID 1904 wrote to memory of 3480 1904 Datadecrypt.exe 97 PID 1904 wrote to memory of 892 1904 Datadecrypt.exe 98 PID 1904 wrote to memory of 892 1904 Datadecrypt.exe 98 PID 1904 wrote to memory of 3992 1904 Datadecrypt.exe 99 PID 1904 wrote to memory of 3992 1904 Datadecrypt.exe 99 PID 1904 wrote to memory of 5044 1904 Datadecrypt.exe 100 PID 1904 wrote to memory of 5044 1904 Datadecrypt.exe 100 PID 1904 wrote to memory of 3572 1904 Datadecrypt.exe 101 PID 1904 wrote to memory of 3572 1904 Datadecrypt.exe 101 PID 1904 wrote to memory of 2560 1904 Datadecrypt.exe 102 PID 1904 wrote to memory of 2560 1904 Datadecrypt.exe 102 PID 1904 wrote to memory of 2308 1904 Datadecrypt.exe 103 PID 1904 wrote to memory of 2308 1904 Datadecrypt.exe 103 PID 1904 wrote to memory of 2696 1904 Datadecrypt.exe 104 PID 1904 wrote to memory of 2696 1904 Datadecrypt.exe 104 PID 1904 wrote to memory of 968 1904 Datadecrypt.exe 105 PID 1904 wrote to memory of 968 1904 Datadecrypt.exe 105 PID 1904 wrote to memory of 4480 1904 Datadecrypt.exe 106 PID 1904 wrote to memory of 4480 1904 Datadecrypt.exe 106 PID 1904 wrote to memory of 4340 1904 Datadecrypt.exe 107 PID 1904 wrote to memory of 4340 1904 Datadecrypt.exe 107 PID 1904 wrote to memory of 3532 1904 Datadecrypt.exe 108 PID 1904 wrote to memory of 3532 1904 Datadecrypt.exe 108 PID 1904 wrote to memory of 2716 1904 Datadecrypt.exe 109 PID 1904 wrote to memory of 2716 1904 Datadecrypt.exe 109 PID 1904 wrote to memory of 1884 1904 Datadecrypt.exe 110 PID 1904 wrote to memory of 1884 1904 Datadecrypt.exe 110 PID 1904 wrote to memory of 2672 1904 Datadecrypt.exe 111 PID 1904 wrote to memory of 2672 1904 Datadecrypt.exe 111 PID 1904 wrote to memory of 2788 1904 Datadecrypt.exe 112 PID 1904 wrote to memory of 2788 1904 Datadecrypt.exe 112 PID 1904 wrote to memory of 1988 1904 Datadecrypt.exe 131 PID 1904 wrote to memory of 1988 1904 Datadecrypt.exe 131 PID 1904 wrote to memory of 1988 1904 Datadecrypt.exe 131 PID 1904 wrote to memory of 2256 1904 Datadecrypt.exe 143 PID 1904 wrote to memory of 2256 1904 Datadecrypt.exe 143 PID 1904 wrote to memory of 2292 1904 Datadecrypt.exe 144 PID 1904 wrote to memory of 2292 1904 Datadecrypt.exe 144 PID 1904 wrote to memory of 4980 1904 Datadecrypt.exe 145 PID 1904 wrote to memory of 4980 1904 Datadecrypt.exe 145 PID 1904 wrote to memory of 1580 1904 Datadecrypt.exe 148 -
System policy modification 1 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HidePowerOptions = "1" Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection\AllowTelemetry = "0" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Policies\System Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Datadecrypt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" Datadecrypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection Datadecrypt.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Downloads\C963AEC1-6D52-EB4D-61BC-64DB2602EE5F\[email protected]"C:\Users\Admin\AppData\Local\Temp\Downloads\C963AEC1-6D52-EB4D-61BC-64DB2602EE5F\[email protected]"1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe"C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe"2⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd.exe /c DC.exe /D3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\DC.exeDC.exe /D4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe"C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe" -e watch -pid 1904 -!3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe"C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe" -e ul13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe"C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Datadecrypt.exe" -e ul23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -H off3⤵
- Power Settings
PID:1524
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 03⤵
- Power Settings
PID:3208
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 03⤵
- Power Settings
PID:3480
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 03⤵
- Power Settings
PID:892
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 03⤵
- Power Settings
PID:3992
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 03⤵
- Power Settings
PID:5044
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 03⤵
- Power Settings
PID:3572
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 03⤵
- Power Settings
PID:2560
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 03⤵
- Power Settings
PID:2308
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 03⤵
- Power Settings
PID:2696
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 03⤵
- Power Settings
PID:968
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 03⤵
- Power Settings
PID:4480
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 03⤵
- Power Settings
PID:4340
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c3⤵
- Power Settings
PID:3532
-
-
C:\Windows\SYSTEM32\powercfg.exepowercfg.exe -S e9a42b02-d5df-448d-aa00-03f14749eb613⤵
- Power Settings
PID:2716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Everything.exe"C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Everything.exe" -startup3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2256
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2292
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin.exe DELETE SYSTEMSTATEBACKUP3⤵
- Deletes System State backups
- Drops file in Windows directory
PID:4980
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:1580
-
-
C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Everything.exe"C:\Users\Admin\AppData\Local\CBB2A8F5-4542-61C5-1793-2D537E10FBCC\Everything.exe" -startup3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3092
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:1132
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:248
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:1556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
802KB
MD5ac34ba84a5054cd701efad5dd14645c9
SHA1dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b
SHA256c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e
SHA512df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a
-
Filesize
2.4MB
MD50bf7c0d8e3e02a6b879efab5deab013c
SHA14f93d2cda84e669eeddcfeb2e2fa2319901059a1
SHA256b600e06f14e29b03f0b1456723a430b5024816518d704a831dde2dc9597ce9c9
SHA512313f9a8ae5a0096488996f51ce0d2049f7040b5cba1f6efd6e7190517accffad9af4d72eb551755978e624f4089b9e5983eae792496b2e8e6da5a6cd7939ae5f
-
Filesize
28.7MB
MD55be65f749d8536954c242d0f541a21a6
SHA1ff2a66004ec61337c1dc2be777c8ea1ed75a8308
SHA256cf98330caf3aca7e70676b034507647c377bc487d8a666945b089d698de63b62
SHA512d8076764c0888e63d823185fdba4392d2bcea14a2f94c367d7fdd863afff518e49ce2d6b4f815450bd5e394db791911ba489bf82be6e884d159cd4af3a2c3081
-
Filesize
10.1MB
MD59af7e146da76270ffda2d1a582eaf5a5
SHA1e02002c3ee7e61d8dd65336b93b114ed8717b5dd
SHA256158b743c5ff578d25e9bd170465db6d0bf0a4d22bf241a4858722dcac5ddf9dc
SHA512a02aa8572ad777d104d9e29031b7e16e38f8dff2e4bae374fe0ee26487205ecc14094ea19322d6d88aac23827bf6a56db0999330824d52c2df206aa464003831
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
20KB
MD5b08dea2c475176c96e29eacc73667b24
SHA165ebd451669ae873b96df95d46ecec7de216293e
SHA2562a2a0fe8ba8f77a156d5bd3a5e9bf3628437afb19680964fe12a63b63959ab2f
SHA51247f4b74022c457bf2eec57284f24cd339496de389ba344f2ad5b067e0baf16c361bff6caf573721b022e544763a6d6b559213efa621d7a8b1fa334fc371a2fcd
-
Filesize
20KB
MD5242e9189c76fde53b305b5483194b4ef
SHA1d9444826fa06db19ef44a1ada3fe326652f2f1ac
SHA2565fc8455b67bc797b705a4df0dce70ae1c240950b9f48de4d4d94fd1e77dda665
SHA5125ef9b44c31f1c2bdc3c92de3979882ec285e24a8d63a66f4972bc16019ca589a21294cff97655dcf4af451bd1989c405817926391af885cc899072c3c73d3c54
-
Filesize
550B
MD551014c0c06acdd80f9ae4469e7d30a9e
SHA1204e6a57c44242fad874377851b13099dfe60176
SHA25689ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5
SHA51279b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
2.5MB
MD5e7cecb49da4cefd6f0b306ff09afdcb4
SHA15ea8f3e6a1243f12290b473ca1948fb3bec7be0f
SHA256b4c78dcf7c9bfe60c2c61cab64243fe72a94a2ba002d0c742fadd56b1a92bfdd
SHA51229589431b6e6e479c8a8cb0ad7e98905f5891e8c3b12d73a6a985e2cac40385d1c88529b14bcd8e614d01bfc6bc8068447274c4b485d35900677f583f49a3347
-
Filesize
2.4MB
MD57f861580d2292e2f2c438f875725fd2f
SHA120dd7b7d4cddf91aabcfe79d97dbaaaf277b7654
SHA256bd6775e772ad56d7dc4f1c7cec73fff98e6b03a2a9d109abe69a7c125a2c7828
SHA512a3ea904f97256840fc5a8636e9a2fb73d119de4e8979224b79e888c5bd3c4fc9eb748f264e13c9acd86e1de312d5f371b39197dd0f0d1e256c1c94566876f78d
-
Filesize
12KB
MD584f6a8f7607a096ba9c0cb704ae6ac8f
SHA148d951cc741484e87fdb6d08924385f8e1ae340d
SHA256d7724e06402a2b1fc49f95178c1f8f9006f9c6a0636a7be4e29cd5474339013d
SHA51260ae5fc39691dedebeb0f4e31630be778fb893f1c868996fa9d3b7ba4dd15be389e9a41a395f979357ac2d72eff80caa2fada5614428c569c68ef14d415d4b3a
-
Filesize
276KB
MD503a63c096b9757439264b57e4fdf49d1
SHA1a5007873ce19a398274aec9f61e1f90e9b45cc81
SHA25622ea129b0f57184f30b1771c62a3233ba92e581c1f111b4e8abfa318dc92cc46
SHA5120d656d807572f6be4574024e2bbcf0cbd291fe13a1adeb86a333177ee38db16b06da9a18509e599db0d2cf8206b84f6856a9674dba29a2cbeb844a216cb45ddd
-
Filesize
276KB
MD557850a4490a6afd1ef682eb93ea45e65
SHA1338d147711c56e8a1e75e64a075e5e2984aa0c05
SHA25631feff32d23728b39ed813c1e7dc5fe6a87dcd4d10aa995446a8c5eb5da58615
SHA51215cf499077e0c8f3421b95e09a18ae5468ae20a7b3a263f01cc8e6d445d54f09ca8a3189ecb40c87d0e6277c99b504424cdd0e35bbe493a1b0849900d21bccf8
-
Filesize
32B
MD5f3fecae31ffe8e63f962c2779e24f1f5
SHA1c1f3d5cba932ef8d8664e22da102e190ce64c60e
SHA256579c870a0f12af418e36b48b5f43bc5e38522d6aeca628b031dbc65ce82114be
SHA5129b1c9c4e685bdc5ee46c0ca297e398a6008766d3b3011de7bddca67c3fba3596b6121b5189093d0d22badd0031a22408ec520cd95aa28a33ca087815caeb0271
-
Filesize
350KB
MD5803df907d936e08fbbd06020c411be93
SHA14aa4b498ae037a2b0479659374a5c3af5f6b8d97
SHA256e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c
SHA5125b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532
-
Filesize
2KB
MD51f43c3c88d3c0e8c6bf39969391e5891
SHA138618bf833bbe691a6307d4f832d87d66b649f59
SHA256444b546728cfe4120d72fff22c7c98d1fd894ecbfa1b6658006c30623ddb5602
SHA512bd49bb786b3b9fb264593147d5e33b0c48f5feac7caa7d15cd8c8589798bffd67ee97e2816d93792f752f7ca91972c96fe3d6a822ae3436cb6e00db4567eac66
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD5e3840d9bcedfe7017e49ee5d05bd1c46
SHA1272620fb2605bd196df471d62db4b2d280a363c6
SHA2563ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f
SHA51276adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376
-
Filesize
1KB
MD5c31d9953e56bce77b19b1cb536e15418
SHA159fbd594b242a68bfbdf79103ce3c14486589cf5
SHA256f292cdf2d28e67b852845ab9cd2182d96cfefb524aa6f7951b51b1d9cfbe627b
SHA512912adf70e4cb7f153db9573833509e6e7d677017f4a97177e19e1761d8d79db84c178527d6c4e31ebe5b5332c3bf7d866cee0f15b8b532ea5639043cf6098cf8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD572d9b8f0f3db37ab02a3fc3b22f78073
SHA11151ae34a440040f6338b1835ec0f14e7442c7ff
SHA256ff3dd3a03bb7443ce734bb915ce06a65508c25932c3c6ae7cda321a75acf7ca5
SHA5126861d39fed1f7520d6ad4e0fe546ffc1fda7326384a352a2a1e6c733a523ddb6f863dedd1f14faf9fb5dd02b2e5cd86aaeb99c968932c16ed8437050c58c63c5