Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe
Resource
win10v2004-20241007-en
General
-
Target
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe
-
Size
146KB
-
MD5
521666a43aeb19e91e7df9a3f9fe76ba
-
SHA1
663081e2767df7083f765a3a8a994982959d4cbe
-
SHA256
ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd
-
SHA512
cd1414158094328ee2f56a995ee4724604f05c0df5a08f4ae1c653e19cb0158a58ffa2cafc3a2363fc13ef617320979e11bc6281c4c79066a6787c0545c6ec54
-
SSDEEP
3072:S4PDTrekAooSPxQQvYO3ppr4nwd/T7YfeJFDGfYfaPLmy816SX:SOrNAmPiUprWKTMferDGmaP17SX
Malware Config
Signatures
-
Renames multiple (7738) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe -
Executes dropped EXE 1 IoCs
pid Process 4860 LPW5.tmp -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\N: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\T: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\Z: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\B: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\H: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\I: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\M: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\O: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\P: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\S: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\F: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\E: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\R: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\U: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\V: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\X: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\Y: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\L: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\J: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\K: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\Q: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\W: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\D: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened (read-only) \??\A: ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations_retina.png.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-60_contrast-white.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\PAPYRUS.INF ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-white\SmallTile.scale-125.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_es_135x40.svg ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\tr-tr\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\PackageManagementDscUtilities.strings.psd1.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-fr\ui-strings.js.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-24.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.scale-100.png.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNewNoteMedTile.scale-125.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\TestsRunningInCleanRunspace.Tests.ps1.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lv-LV\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-pl.xrm-ms ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-64.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\MedTile.scale-100.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_150.png.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Candara.xml ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\Weather_TileSmallSquare.scale-100.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Dark.scale-125.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-tw\ui-strings.js ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Google.scale-250.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-LIGHT.TTF.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_PigNose.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\plugin.js ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\dd_arrow_small2x.png.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\de-de\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ul-phn.xrm-ms.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.scale-100.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MinionPro-Regular.otf.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square150x150\PaintMedTile.scale-200.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-phn.xrm-ms.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013bw.dotx ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-disabled.svg ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\ui-strings.js ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\hr-hr\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-64_altform-lightunplated.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\EmptyShare.scale-400.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MicrosoftLogo.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\MSFT_PackageManagementSource.schema.mfl ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\ui-strings.js ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ru-ru\ui-strings.js ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-ma\ui-strings.js ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\nb-no\ui-strings.js ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial3-pl.xrm-ms.Cylance ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\es-ES.mail.config ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\InputPersonalization.exe.mui ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\FileIcons\FileLogoExtensions.targetsize-20.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSmallTile.scale-100.png ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\Describe.snippets.ps1xml ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_empty_state.svg ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\root\CYLANCE_README.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LPW5.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4328 PING.EXE 3640 cmd.exe 3812 PING.EXE 3332 cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3812 PING.EXE 4328 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Token: SeRestorePrivilege 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Token: SeBackupPrivilege 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Token: SeTakeOwnershipPrivilege 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Token: SeAuditPrivilege 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Token: SeSecurityPrivilege 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Token: SeIncBasePriorityPrivilege 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe Token: SeBackupPrivilege 244 vssvc.exe Token: SeRestorePrivilege 244 vssvc.exe Token: SeAuditPrivilege 244 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2528 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3868 wrote to memory of 4200 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 85 PID 3868 wrote to memory of 4200 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 85 PID 3868 wrote to memory of 4200 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 85 PID 4200 wrote to memory of 1400 4200 cmd.exe 88 PID 4200 wrote to memory of 1400 4200 cmd.exe 88 PID 4200 wrote to memory of 1400 4200 cmd.exe 88 PID 3868 wrote to memory of 3708 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 113 PID 3868 wrote to memory of 3708 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 113 PID 3868 wrote to memory of 3708 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 113 PID 3868 wrote to memory of 4468 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 115 PID 3868 wrote to memory of 4468 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 115 PID 3868 wrote to memory of 4468 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 115 PID 3868 wrote to memory of 3332 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 117 PID 3868 wrote to memory of 3332 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 117 PID 3868 wrote to memory of 3332 3868 ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe 117 PID 3708 wrote to memory of 4860 3708 cmd.exe 119 PID 3708 wrote to memory of 4860 3708 cmd.exe 119 PID 3708 wrote to memory of 4860 3708 cmd.exe 119 PID 4468 wrote to memory of 1712 4468 cmd.exe 120 PID 4468 wrote to memory of 1712 4468 cmd.exe 120 PID 4468 wrote to memory of 1712 4468 cmd.exe 120 PID 3332 wrote to memory of 4328 3332 cmd.exe 121 PID 3332 wrote to memory of 4328 3332 cmd.exe 121 PID 3332 wrote to memory of 4328 3332 cmd.exe 121 PID 4860 wrote to memory of 3640 4860 LPW5.tmp 122 PID 4860 wrote to memory of 3640 4860 LPW5.tmp 122 PID 4860 wrote to memory of 3640 4860 LPW5.tmp 122 PID 3640 wrote to memory of 3812 3640 cmd.exe 124 PID 3640 wrote to memory of 3812 3640 cmd.exe 124 PID 3640 wrote to memory of 3812 3640 cmd.exe 124 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe"C:\Users\Admin\AppData\Local\Temp\ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe" /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\LPW5.tmp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\ProgramData\LPW5.tmpC:\ProgramData\LPW5.tmp3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 5 > nul & del "C:\ProgramData\LPW5.tmp"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 55⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3812
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Update BETA" /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Update BETA" /F3⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\ec8952dc14bac73174cef02a489539e244b378b7de76c771126a8ba7ce532efd.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4328
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3940
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538aa4cc478c9256f32512e2e7ccbd9d2
SHA1f54cc3fa07fea8d745e7c1a84935091f719e49c3
SHA25630a49b4694c9b68f8343714a69c3f9fc96ac24c1d275da4cae47115428ffbf2b
SHA512d94a315c0cefce6dab0687a4b0fcb18218b064ccdc300ea84ae07e48165b49c94f2c4ace54f214bec97af36336459f86806c7f8da0226299b85cabaa5378d464
-
Filesize
5KB
MD5ab65af4349e7c5b0872c8b808d036980
SHA1414b2a2748b7ea6176c1d2453f89fdc8a2d349d0
SHA256a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2
SHA5122c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize13KB
MD542d04272230248b3f66292dbebae8db8
SHA16ae765f035b21e1d6fc17be1dc77f9dd50c4985a
SHA256b6ac9df8d83928f31c00320e57f3f68cd6d542eb6ce8c063334400bd493831f6
SHA512b93165544a57f8fe2ac8a120f11077c17a2b9499f49083bb44e8648f212e1c746e21ea6aeba99ec90bc316e722698bd548a1c10f51b068ce36307e8029c563bf
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD5ae634e124f836ea195b85c26b1a8a9d0
SHA1b2f573a5f386297f9955d4dfc8944a1e14a30037
SHA25645c60ee55e84d574aabed0240ec23a1e7459f271c1510a62707636bf710d1691
SHA512b115c7388c1389abd33beca0b3d5bd9516206f5c2b839c14cd7f42e7373479e7209020aae35ebddfdcc5772921451df06566fd9ca03757527185b138d471a879