Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 14:10
Behavioral task
behavioral1
Sample
105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe
Resource
win10v2004-20240802-en
General
-
Target
105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe
-
Size
146KB
-
MD5
a5f2eeb4c5cbb2c2ff3b103e304c4a37
-
SHA1
604025da6efc564ae2b3b92c33eb3a2995ca81a4
-
SHA256
105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398
-
SHA512
96e766e4f3aefacada98a5336320db9d26c5d7d5d150125183e5415786b57d46b3383880910cfbdcd0928960d4abcaeba19c0854b0fb4a863391f0b13617bf4e
-
SSDEEP
1536:NzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDrZ5bKzpnSPyZxedH4UnFgDXv0R:eqJogYkcSNm9V7DmSPNHnFsvCT
Malware Config
Extracted
C:\RCl10Ol9q.README.txt
328N9mKT6xFe6uTvtpxeKSymgWCbbTGbK2
Signatures
-
Renames multiple (8938) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 3060 4ECC.tmp -
Executes dropped EXE 1 IoCs
pid Process 3060 4ECC.tmp -
Loads dropped DLL 1 IoCs
pid Process 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\RCl10Ol9q.bmp" 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\RCl10Ol9q.bmp" 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3060 4ECC.tmp -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02115_.WMF 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_ja_4.4.0.v20140623020002.jar.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00130_.WMF 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EAST_01.MID.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00452_.WMF 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationUp_ButtonGraphic.png 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\calendar.js 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LABEL98.POC 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.databinding_1.6.200.v20140528-1422.jar.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02009_.WMF.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_autodel_plugin.dll.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\MSB1ENES.ITS 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower.png 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Asuncion.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_COL.HXC 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099155.JPG 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-modules-appui.xml 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\PYCC.pf 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\DVD Maker\en-US\WMM2CLIP.dll.mui 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME37.CSS 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01146_.WMF 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099171.WMF.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\MSOINTL.REST.IDX_DLL.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guyana.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libtcp_plugin.dll 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\F12Tools.dll.mui 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\PurblePlace.exe.mui 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_partly-cloudy.png 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME39.CSS.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.FR.XML 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00685_.WMF 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jre7\lib\content-types.properties.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\IpsMigrationPlugin.dll.mui 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanMergeLetter.Dotx 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\107.accdt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0280468.WMF 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-10 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\Sidebar.exe.mui 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\gadget.xml 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OFFOWCI.DLL.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232803.WMF.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\bckgRes.dll.mui 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Internet Explorer\jsprofilerui.dll 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\wmpnssui.dll.mui 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewFrame.html 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099154.JPG 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01607U.BMP 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01241_.GIF.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_hi.dll 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\vlc.mo.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\RCl10Ol9q.README.txt 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\TAB_ON.GIF.RCl10Ol9q 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe File opened for modification C:\Program Files\Java\jre7\bin\eula.dll 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ECC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\Desktop\WallpaperStyle = "10" 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp 3060 4ECC.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeDebugPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: 36 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeImpersonatePrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeIncBasePriorityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeIncreaseQuotaPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: 33 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeManageVolumePrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeProfSingleProcessPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeRestorePrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSystemProfilePrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeTakeOwnershipPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeShutdownPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeDebugPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeBackupPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe Token: SeSecurityPrivilege 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1864 wrote to memory of 3060 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 33 PID 1864 wrote to memory of 3060 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 33 PID 1864 wrote to memory of 3060 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 33 PID 1864 wrote to memory of 3060 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 33 PID 1864 wrote to memory of 3060 1864 105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe 33 PID 3060 wrote to memory of 688 3060 4ECC.tmp 34 PID 3060 wrote to memory of 688 3060 4ECC.tmp 34 PID 3060 wrote to memory of 688 3060 4ECC.tmp 34 PID 3060 wrote to memory of 688 3060 4ECC.tmp 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe"C:\Users\Admin\AppData\Local\Temp\105912c9995a1d718c5442349d2cc4bb99426f75ff34554cdfd9a7272eeca398.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\ProgramData\4ECC.tmp"C:\ProgramData\4ECC.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\4ECC.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:688
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD59785d36147a441c7a0ce3c63d4e363a7
SHA1cb3b5bbfd4356b1d6763e357d79378699cd07029
SHA256c513027cd6415ff218439a2ff44d1548973a9737ca300d42ed82046ab68f674d
SHA5120cfeaf37cc25375cbac42efd6caa8024fd5295a81016983024dfb0f80f36fe0064f4c8cccde57f59da980e99a76259556c490b98e00a38326b0f7822d9ff68af
-
Filesize
1KB
MD56c20c5b93268232ba3bcb18e6dd215af
SHA12008645dde0884ad7bed5732a4005968472e7ca2
SHA256ce7e57b1ee943eeb6ec10d4556da9b16f2cb02401109d60590bb8f78ddbde478
SHA5124a2465070eff7a0e3d99fe137634f2a7768f5df383f4b10fb00f214c40f4843e0712c117c1b0e422ce7650d3ae04e5d1b4993b7029f3007a52fb68e408a1346c
-
C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
Filesize146KB
MD5e3ce527aa6cbf372c9413d795ac1ce2b
SHA17c4569e81f8844bd449206547ff71162fd4db6a7
SHA256fdae0acce45b865ae463a843687b4ab886a37c6e68c2cc2690f5e2c6c8da40e9
SHA5128e852a561e88a49c228c8877af003a40ce807a4ec2ab85d1f4e67c7c7ff2f64ed1770bb2625cd3fe3bf39e816f2dc34ac80211a2d1a0ec49f52aa4e3e8e9a1cb
-
Filesize
129B
MD51929ea3ceff3aed87ded0feca360b0c2
SHA19301f1f5c258bd786014b522d77508c61fd4a6b1
SHA256fd6d5f96537f0e4ecb1bc26010086ad82d509c7c5eecbce13d92beab8957edc3
SHA51236aaa431ad1265f0c4fca211d30447eeb30f4e800eff195568f1b961db2045fb0816763e38835758026a624d8a1556add73569919f5632577bd09124e6ce83af
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf