Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
KatyushaRansomware.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
KatyushaRansomware.exe
Resource
win10v2004-20240802-en
General
-
Target
KatyushaRansomware.exe
-
Size
2.4MB
-
MD5
7f87db33980c0099739de40d1b725500
-
SHA1
f0626999b7f730f9003ac1389d3060c50068da5a
-
SHA256
d00ee0e6eab686424f8d383e151d22005f19adbda5b380a75669629e32fe12a6
-
SHA512
1bf8e63a09ee7618102982a1d8c39c2eada1e7c52452d0cadb0df9010421799171880580dd6e4d5fb371d314ee7676d438ab827ef1695bb9de95835ac7cb47f8
-
SSDEEP
49152:tzlhgyBIjVpPZHZlPpLPk0vglJIAc/8KYBsxdO0G7x+dP1Y+:zy9jRZlFknvzcEKY8dOD7x8NY
Malware Config
Extracted
C:\_how_to_decrypt_you_files.txt
3ALmvAWLEothnMF5BjckAFaKB5S6zan9PK
https://www.bithumb.com/
http://www.coinone.com/
https://www.gopax.co.kr/
http://www.localbitcoins.com/
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3124) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/memory/4040-61-0x0000000140000000-0x0000000140106000-memory.dmp mimikatz -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation ktsi.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation KatyushaRansomware.exe -
Executes dropped EXE 3 IoCs
pid Process 3896 zkts.exe 4040 m64.exe 4848 ktsi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: ktsi.exe File opened (read-only) \??\P: ktsi.exe File opened (read-only) \??\G: ktsi.exe File opened (read-only) \??\K: ktsi.exe File opened (read-only) \??\N: ktsi.exe File opened (read-only) \??\Q: ktsi.exe File opened (read-only) \??\R: ktsi.exe File opened (read-only) \??\X: ktsi.exe File opened (read-only) \??\Y: ktsi.exe File opened (read-only) \??\H: ktsi.exe File opened (read-only) \??\I: ktsi.exe File opened (read-only) \??\U: ktsi.exe File opened (read-only) \??\W: ktsi.exe File opened (read-only) \??\E: ktsi.exe File opened (read-only) \??\S: ktsi.exe File opened (read-only) \??\M: ktsi.exe File opened (read-only) \??\T: ktsi.exe File opened (read-only) \??\V: ktsi.exe File opened (read-only) \??\Z: ktsi.exe File opened (read-only) \??\J: ktsi.exe File opened (read-only) \??\L: ktsi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial3-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-ul-phn.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Grace-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL054.XML.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL083.XML.katyusha ktsi.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\vlc.mo.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\LargeTile.scale-125_contrast-white.png.katyusha ktsi.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\santuario.md.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_Subscription-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-REGULAR.TTF.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubMedTile.scale-125_contrast-white.png.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription5-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ul-phn.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSSRINTL.DLL.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Trial-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ul-phn.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-100.png.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-125_contrast-black.png.katyusha ktsi.exe File created C:\Program Files\Java\jre-1.8\lib\ext\sunpkcs11.jar.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp3-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Trial-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Grace-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\javafx.properties.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp3-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp4-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\LargeTile.scale-125.png.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntry2019R_PrepidBypass-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.h.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL065.XML.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\OIMG.DLL.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\NPSPWRAP.DLL.katyusha ktsi.exe File created C:\Program Files\Java\jre-1.8\lib\jfr.jar.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Grace-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-white_scale-180.png.katyusha ktsi.exe File created C:\Program Files\7-Zip\Lang\tk.txt.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_OEM_Perp-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.scale-100.png.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer_eula.txt.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\DSMESSAGES.XML.katyusha ktsi.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\glib.md.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ppd.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\jpeg_fx.md.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymb.ttf.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\AppPackageMedTile.scale-100_contrast-black.png.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-pl.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\jpeg_fx.md.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_KMS_Client_AE-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-ul-oob.xrm-ms.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Office16\CSIRESOURCES.DLL.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\PhotosWideTile.scale-125.png.katyusha ktsi.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml.katyusha ktsi.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription3-ppd.xrm-ms.katyusha ktsi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KatyushaRansomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4872 vssadmin.exe 5008 vssadmin.exe -
Kills process with taskkill 14 IoCs
pid Process 2424 taskkill.exe 5068 taskkill.exe 3272 taskkill.exe 3840 taskkill.exe 1720 taskkill.exe 2632 taskkill.exe 220 taskkill.exe 404 taskkill.exe 4704 taskkill.exe 2756 taskkill.exe 3824 taskkill.exe 2960 taskkill.exe 4812 taskkill.exe 1108 taskkill.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132948" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d00000000020000000000106600000001000020000000cae4dff52d0ae43c4be4d170d06ed3bc1fe5aab6a9b5a16ec92cc80028ff1fe4000000000e800000000200002000000022e6c0c5858c9b372899d1cb8055afa28dc3b7bd4c81426703c2948302bb3d8b20000000870ae84cd296a12a2e7e6fd73ec925d9fad1036585d49437050456355084b345400000009363e6be92b9dec18183bec3939ed032592da174a554cf6378aa84e6ed5185fee391435e80306ca6d9fd1e308ea105c91cf46ba9863e0eb599c60a44029c9921 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4189322827" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132948" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05613fa140ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d000000000200000000001066000000010000200000002eb7a948b2b03e16d2efc9c1046094d61f9643847da3299908956bdc5c90a18e000000000e8000000002000020000000233cbf82832c894d06dc35ccb310c0c39d448d189d52c15ef948858351e7449f200000000200f4cfc3ac7ff42d39976c86a9d9cc157739e6676d261878ee09d25abda4a640000000f28ce9b5b80e05c087c87cc83277819e78997527979fd5a1631cd388b1ba7d9ef5d8eb1fff834a934a4b3af3baac943a0d6092e83afde1a3f0497fb798f960ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433791111" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cc1cfa140ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3400000071000000ba040000d6020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132948" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4190572929" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4189322827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4190572929" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{25375FC7-7908-11EF-84CD-762C928CCA03} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132948" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings ktsi.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2032 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4040 m64.exe 4040 m64.exe 4040 m64.exe 4040 m64.exe 4040 m64.exe 4040 m64.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 4040 m64.exe Token: SeDebugPrivilege 2424 taskkill.exe Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 2632 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 220 taskkill.exe Token: SeDebugPrivilege 404 taskkill.exe Token: SeDebugPrivilege 5068 taskkill.exe Token: SeDebugPrivilege 3272 taskkill.exe Token: SeDebugPrivilege 4704 taskkill.exe Token: SeDebugPrivilege 3840 taskkill.exe Token: SeDebugPrivilege 2756 taskkill.exe Token: SeDebugPrivilege 3824 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1108 taskkill.exe Token: SeBackupPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe Token: SeBackupPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe Token: SeBackupPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe Token: SeBackupPrivilege 4576 vssvc.exe Token: SeRestorePrivilege 4576 vssvc.exe Token: SeAuditPrivilege 4576 vssvc.exe Token: SeBackupPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe Token: SeBackupPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe Token: SeBackupPrivilege 4848 ktsi.exe Token: SeSecurityPrivilege 4848 ktsi.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4680 iexplore.exe 4680 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4680 iexplore.exe 4680 iexplore.exe 668 IEXPLORE.EXE 668 IEXPLORE.EXE 668 IEXPLORE.EXE 668 IEXPLORE.EXE 1832 AcroRd32.exe 1832 AcroRd32.exe 1832 AcroRd32.exe 1832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 3488 216 KatyushaRansomware.exe 83 PID 216 wrote to memory of 3488 216 KatyushaRansomware.exe 83 PID 216 wrote to memory of 3488 216 KatyushaRansomware.exe 83 PID 3488 wrote to memory of 3896 3488 cmd.exe 84 PID 3488 wrote to memory of 3896 3488 cmd.exe 84 PID 3488 wrote to memory of 3896 3488 cmd.exe 84 PID 216 wrote to memory of 3868 216 KatyushaRansomware.exe 85 PID 216 wrote to memory of 3868 216 KatyushaRansomware.exe 85 PID 216 wrote to memory of 3868 216 KatyushaRansomware.exe 85 PID 3868 wrote to memory of 4040 3868 cmd.exe 86 PID 3868 wrote to memory of 4040 3868 cmd.exe 86 PID 216 wrote to memory of 4848 216 KatyushaRansomware.exe 87 PID 216 wrote to memory of 4848 216 KatyushaRansomware.exe 87 PID 216 wrote to memory of 4848 216 KatyushaRansomware.exe 87 PID 4848 wrote to memory of 3592 4848 ktsi.exe 89 PID 4848 wrote to memory of 3592 4848 ktsi.exe 89 PID 4848 wrote to memory of 3592 4848 ktsi.exe 89 PID 3592 wrote to memory of 2424 3592 cmd.exe 90 PID 3592 wrote to memory of 2424 3592 cmd.exe 90 PID 3592 wrote to memory of 2424 3592 cmd.exe 90 PID 4848 wrote to memory of 2180 4848 ktsi.exe 92 PID 4848 wrote to memory of 2180 4848 ktsi.exe 92 PID 4848 wrote to memory of 2180 4848 ktsi.exe 92 PID 2180 wrote to memory of 2960 2180 cmd.exe 93 PID 2180 wrote to memory of 2960 2180 cmd.exe 93 PID 2180 wrote to memory of 2960 2180 cmd.exe 93 PID 4848 wrote to memory of 3532 4848 ktsi.exe 94 PID 4848 wrote to memory of 3532 4848 ktsi.exe 94 PID 4848 wrote to memory of 3532 4848 ktsi.exe 94 PID 3532 wrote to memory of 2632 3532 cmd.exe 95 PID 3532 wrote to memory of 2632 3532 cmd.exe 95 PID 3532 wrote to memory of 2632 3532 cmd.exe 95 PID 4848 wrote to memory of 2268 4848 ktsi.exe 96 PID 4848 wrote to memory of 2268 4848 ktsi.exe 96 PID 4848 wrote to memory of 2268 4848 ktsi.exe 96 PID 2268 wrote to memory of 4812 2268 cmd.exe 97 PID 2268 wrote to memory of 4812 2268 cmd.exe 97 PID 2268 wrote to memory of 4812 2268 cmd.exe 97 PID 4848 wrote to memory of 1400 4848 ktsi.exe 98 PID 4848 wrote to memory of 1400 4848 ktsi.exe 98 PID 4848 wrote to memory of 1400 4848 ktsi.exe 98 PID 1400 wrote to memory of 220 1400 cmd.exe 99 PID 1400 wrote to memory of 220 1400 cmd.exe 99 PID 1400 wrote to memory of 220 1400 cmd.exe 99 PID 4848 wrote to memory of 2568 4848 ktsi.exe 100 PID 4848 wrote to memory of 2568 4848 ktsi.exe 100 PID 4848 wrote to memory of 2568 4848 ktsi.exe 100 PID 2568 wrote to memory of 404 2568 cmd.exe 101 PID 2568 wrote to memory of 404 2568 cmd.exe 101 PID 2568 wrote to memory of 404 2568 cmd.exe 101 PID 4848 wrote to memory of 4428 4848 ktsi.exe 102 PID 4848 wrote to memory of 4428 4848 ktsi.exe 102 PID 4848 wrote to memory of 4428 4848 ktsi.exe 102 PID 4428 wrote to memory of 5068 4428 cmd.exe 103 PID 4428 wrote to memory of 5068 4428 cmd.exe 103 PID 4428 wrote to memory of 5068 4428 cmd.exe 103 PID 4848 wrote to memory of 4572 4848 ktsi.exe 104 PID 4848 wrote to memory of 4572 4848 ktsi.exe 104 PID 4848 wrote to memory of 4572 4848 ktsi.exe 104 PID 4572 wrote to memory of 3272 4572 cmd.exe 105 PID 4572 wrote to memory of 3272 4572 cmd.exe 105 PID 4572 wrote to memory of 3272 4572 cmd.exe 105 PID 4848 wrote to memory of 5000 4848 ktsi.exe 106 PID 4848 wrote to memory of 5000 4848 ktsi.exe 106 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\KatyushaRansomware.exe"C:\Users\Admin\AppData\Local\Temp\KatyushaRansomware.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:/windows/temp/zkts.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\windows\temp\zkts.exec:/windows/temp/zkts.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:/windows/temp/m64.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\windows\temp\m64.exec:/windows/temp/m64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
-
C:\Windows\temp\ktsi.exe"C:\Windows\temp\ktsi.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM mysqld.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM httpd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM httpd.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM sqlservr.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM sqlwriter.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM w3wp.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM w3wp.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM sqlagent.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM fdhost.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM fdhost.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM fdlauncher.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM fdlauncher.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM reportingservicesservice.exe3⤵
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM reportingservicesservice.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM omtsreco.exe3⤵
- System Location Discovery: System Language Discovery
PID:3444 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM omtsreco.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM tnslsnr.exe3⤵
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tnslsnr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM oracle.exe3⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM emagent.exe3⤵
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM emagent.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /F /IM mysqld-nt.exe3⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin delete shadows /all /quiet&vssadmin delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
PID:4296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin delete shadows /all /quiet&vssadmin delete shadows /all /quiet3⤵PID:4452
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4872
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:5008
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\_how_to_decrypt_you_files.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2032
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" c:/ProgramData/_how_to_decrypt_you_files.txt3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4680 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:668
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1240
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Documents\SelectCompare.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:868 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=825C9ABFED41933749F2F30E99174AD1 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4CAA2A21A9C5DFC9EA8C095E2380E451 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4CAA2A21A9C5DFC9EA8C095E2380E451 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0637F13746DB6B41374554B70E54FE2A --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A865A6471069911C2DC06BEDE53049FD --mojo-platform-channel-handle=1988 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AA4DDE22F94F93BDFB2A7AD7ECBC53DC --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4004
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1288
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD53173bbd2ae64894e4afba3f47a28128d
SHA123e62000a94b9799dd33cd45f83913bc58c07ba9
SHA25605ac352e33925f173e6afa1891dc20a261418a328f69330758690aa6bd60acd8
SHA5123a64aa8498cf9d8978f042ca7bcd78df312255be1c355568127641e7dde8af80a3122dd3d67b8abe4563eb7caff250409b3e5f81c3a438a085063d6db17da875
-
Filesize
128B
MD5be1081b75d684e6592b87990510dec2e
SHA1717fbb6f08cdcca881c9addc506e6b04789ae8db
SHA2563e7e6f9f7b46cf16c6b98b707160384c4c6838938f0cc0f76004806a736631b4
SHA5125d36a8162a0d46a5ad30df30e6ece8091d0fcc755e3e2c9554502fc2a2bfbecf9f1461c04bb227acca97e87e3d6e5792624276fa0180069fd5ec0ffd6f5c6936
-
Filesize
128B
MD55e79b329be54997222be5997f2ab9e7b
SHA1a4d88e21648158140a7c81f21557abd44c071844
SHA256c95a3f27a00f52188992819779ddf71ba304604ca14572953898482154d82480
SHA5123d001deeda072cebbe3b4b920b4f87b4f8c6b9e467800e99eb7af48c4f4b1dd7daa20f9d72f7ae3b9aa3cdbe3f58b57ca7b04eac3bb7c767a2f8ae5efd0f1a3c
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\OWSHLP10.CHM.katyusha
Filesize16B
MD5354041862b7a7385fe499708e2e62737
SHA199970688220f9866a899b7a42b6d7a17b9671795
SHA256921117a4f7aadfb221165e56412dd7d7989b1d17fd254d89c82f74abddf3c741
SHA5128fe6064ff9fb4990b7862a154a31f511584c3c253619310b6326f7d758dabc2d29c33c2098f7f8c9af1f02f7314975c1a6ada28ade8f298d2621c749c165204b
-
Filesize
831KB
MD55d8ad4eb774bb9924ff1c7562249e39f
SHA12c52af413c0a08d8c9b908f73401a4941f4aba6a
SHA25624b3cf4514d50cc9d196c925900c4d3bdc7ac68cc9285e5f1beb704599371af9
SHA5121c3d5907ee436423c1ef0cf41ac0108ea67905734eac4da296b5a92f9cb7d9596d69fc0385fb8a842a87d2b0b579159cea8a5ceb793a6fbbb0f03d8a777b34c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD59b8ac9d890f8dda853d1c95079ac73f5
SHA1e265a8851607e6e5b25489a85181774840ad4c12
SHA25607a9f21865eb7c1380f39a1b00ba4fca51890507feb94b033a602478dada2d48
SHA5124da957e5b350ce6013cc0e739b36dc6592937204c1336f39b1be4a39870ce062e836cf05a0d7ed5fc62e5af702b2f50accb536ee14381386af510129a3beaf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5f8c0d3173b78d1b71517cdcd7e62471b
SHA1ed9676b4f2a8896b283e5227f3a67ddaec1ca77d
SHA2561eced8641dee8b32e74b3da08d57fb3c88b14872905b63825c629858f98dc64b
SHA51277fba9843dcf13ce875703bf19aaea6199afa30fb40ca5dba0f85938c3ccd632095e74ab38f2d0bf97ea65891be3cf53426527e6f8ee78c74e03a6bb9f1c6add
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
450B
MD56e4df4a230f62f0af9066d018218eba6
SHA1dbe9633e08d9f982ad71d552bffc3227ef2b7465
SHA2566289a5cbc6e1c7e591b2342d58c52c3af37334a89699d5f3e338f536326ef610
SHA5129217f301d9da6565cce9a96d6ca20e5bb84718e5425d0a8e8b7aa6c51a5603de0f998ebd50ccb88820442804d7edfa10056688d6d50e3803a24952773ec4ed39
-
Filesize
16KB
MD5e1e2326ceaef7f6bb7ecdd4a1cde69c6
SHA16aca04d6e88d8947c388e61935652d1e33c2c29c
SHA256b27c8d650bdeceb7e52b4d7fb5d967b32bfdad7131b2a7be02c70bc9a30da3ef
SHA51251503d7a9913c04ad12fccb2b05041564f3678d7872dafb6fb9ed3b3ceb2f4eaf87b592eec47d29d7ff415687b87504a1603b4a85b4d24c3d53fba42dd4cd250
-
Filesize
328KB
MD5dd2e5fd5109c54cc90b30b88ec0c585a
SHA1927dc541fd29ef6341b041321fe06bf04b0efcd7
SHA256a3dabb63f11e208a0d1d9b43b3d2575e2dc2a7d87c14eb654d3062f3bc0ad12d
SHA51220b19f742daf20de510b0232fb5f5bb231487d5e9da05b8e7037df79b7110c53b4db2e7969a6b978606e8dfd15b6d40eeae84e64b289f2b0f68dddbc8061441e
-
Filesize
363KB
MD52d2e3b0d8a9723eb49bd6f817cbe2e22
SHA10de80d21c389061e69dd3a0c61ac3ba225b9bb44
SHA256db995430707d2d34de8e5ce5fb4b22a87422f5a7b4d38960ed6615d4ea3d9495
SHA5121cc074eb26526b5572b1b1013a0330ed68ba130e95943d22d9f429d0cfa878e6b5fd48aa970af493f2f92908714cff278b921de96864be42285c43438f261bf3
-
Filesize
1.8MB
MD55d74e736c5c4224b813bea351093c27f
SHA1740e59ec36ebec339f9245071f366cf601edbad7
SHA2567f5f134fd3ec2c14956acd7362c76e66759b8ecc51f986ef80bbf9f7f94b89fe
SHA5120628bf7d60b8e6428a0a5203fab8084788a6cafac159eff0f866a6b2b3934c44cee94b8a6f6f6f293b758384dbea3cca083df2131cc2d3e8ccf58c5769975524
-
Filesize
1KB
MD55069149d6ab203ce4f8bd7d9db3a6b5f
SHA171a85334850fb6ddbd63717b3b4e232684872486
SHA256b875a4177b4eefd45dd61ff4a783725ff6a3b1fb2c9650357d82a62df862ddb1
SHA512cb10731692b6a35330f8c6344797bb647cbf8426a1a1f8f59fa6aae439e77be009393b1ab4fc358feaaccd03a6be857fdd06dbf409dc1537d6c5ee647628a80b
-
Filesize
322KB
MD50b5469b69a0d2e205640b78157ca225a
SHA1b2d7079a39fe7bbb835090ec74512d4bfa5c44cf
SHA2564179a1bff4c698ea6958bacb1f1734b9ab804cef35ecaf0e2a2b4b2eadf8e935
SHA512d6f2bf2a03a274df9034aeed0c4dfaa09c0d005a827cd782a67aef8b8f91a66fa9636d5ddbf8cf569ae392ef3a250c86314620f818f42c1be4a50e5645e43ca2