Analysis
-
max time kernel
1267s -
max time network
1269s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 10:16
Static task
static1
Behavioral task
behavioral1
Sample
cincinati.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cincinati.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
RomanticCopyright.exe
Resource
win7-20240903-en
General
-
Target
cincinati.zip
-
Size
982KB
-
MD5
4b1eee4ab5a46f1215f7397a650e385f
-
SHA1
93104208b9a3e25900e2c6489c398ec1ae07db56
-
SHA256
3d36c412f3e9bd9983629b45cc34dc5ac1d48cec7232a3d8ace19ae1181f7649
-
SHA512
c25c93642125540ac105932fe813243357df50d48cea289effa259a3e7cc2b272e3674c3119ae075412d214ca71b05d9e9414d0a6d50d033364bbf2258d07bb3
-
SSDEEP
24576:toTUYr0y8REypuQNALZmH5H81Dn81bQ1Sy:t4USz8REyc3LZmZKn91V
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Lumma family
-
Executes dropped EXE 3 IoCs
Processes:
RomanticCopyright.exeDept.comDept.compid Process 2728 RomanticCopyright.exe 600 Dept.com 2536 Dept.com -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid Process 1784 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid Process 1488 tasklist.exe 2584 tasklist.exe -
Drops file in Windows directory 8 IoCs
Processes:
RomanticCopyright.exedescription ioc Process File opened for modification C:\Windows\InsertedHe RomanticCopyright.exe File opened for modification C:\Windows\RecordedHeld RomanticCopyright.exe File opened for modification C:\Windows\ColdRecycling RomanticCopyright.exe File opened for modification C:\Windows\PleaseBehavioral RomanticCopyright.exe File opened for modification C:\Windows\ScenesConnecting RomanticCopyright.exe File opened for modification C:\Windows\IncidentsAerospace RomanticCopyright.exe File opened for modification C:\Windows\AssessmentsArmed RomanticCopyright.exe File opened for modification C:\Windows\FarRegistered RomanticCopyright.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dept.comDept.comDllHost.exetasklist.exefindstr.exetasklist.execmd.execmd.exeRomanticCopyright.execmd.exefindstr.exefindstr.exechoice.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dept.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dept.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RomanticCopyright.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Modifies registry class 34 IoCs
Processes:
Dept.comosk.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202 Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Dept.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8acc2016-04a3-4343-b8e1-1870e35d6a41}\1.0 osk.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11 Dept.com Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Dept.com Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Dept.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib osk.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Dept.com Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" Dept.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8acc2016-04a3-4343-b8e1-1870e35d6a41}\1.0\0 osk.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "11" Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg Dept.com Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" Dept.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8acc2016-04a3-4343-b8e1-1870e35d6a41}\1.0\0\win64 osk.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg Dept.com Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\TV_TopViewVersion = "0" Dept.com Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616257" Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Dept.com Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Dept.com Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202 Dept.com Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Dept.com Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} Dept.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8acc2016-04a3-4343-b8e1-1870e35d6a41} osk.exe -
Processes:
Dept.comdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Dept.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Dept.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Dept.com -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 2192 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Dept.com7zFM.exepid Process 600 Dept.com 600 Dept.com 600 Dept.com 2940 7zFM.exe 2940 7zFM.exe 2940 7zFM.exe 2940 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exeosk.exepid Process 2940 7zFM.exe 2908 osk.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
7zFM.exetasklist.exetasklist.exeAUDIODG.EXEAUDIODG.EXEdescription pid Process Token: SeRestorePrivilege 2940 7zFM.exe Token: 35 2940 7zFM.exe Token: SeSecurityPrivilege 2940 7zFM.exe Token: SeDebugPrivilege 1488 tasklist.exe Token: SeDebugPrivilege 2584 tasklist.exe Token: 33 2444 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2444 AUDIODG.EXE Token: 33 2444 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2444 AUDIODG.EXE Token: 33 3052 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3052 AUDIODG.EXE Token: 33 3052 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3052 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
7zFM.exeDept.comDept.comosk.exepid Process 2940 7zFM.exe 2940 7zFM.exe 600 Dept.com 600 Dept.com 600 Dept.com 2940 7zFM.exe 2536 Dept.com 2908 osk.exe -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
Dept.comosk.exepid Process 600 Dept.com 600 Dept.com 600 Dept.com 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
Processes:
Dept.comosk.exepid Process 2536 Dept.com 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe 2908 osk.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
7zFM.exeRomanticCopyright.execmd.exeutilman.exedescription pid Process procid_target PID 2940 wrote to memory of 2728 2940 7zFM.exe 31 PID 2940 wrote to memory of 2728 2940 7zFM.exe 31 PID 2940 wrote to memory of 2728 2940 7zFM.exe 31 PID 2940 wrote to memory of 2728 2940 7zFM.exe 31 PID 2728 wrote to memory of 1784 2728 RomanticCopyright.exe 32 PID 2728 wrote to memory of 1784 2728 RomanticCopyright.exe 32 PID 2728 wrote to memory of 1784 2728 RomanticCopyright.exe 32 PID 2728 wrote to memory of 1784 2728 RomanticCopyright.exe 32 PID 1784 wrote to memory of 1488 1784 cmd.exe 34 PID 1784 wrote to memory of 1488 1784 cmd.exe 34 PID 1784 wrote to memory of 1488 1784 cmd.exe 34 PID 1784 wrote to memory of 1488 1784 cmd.exe 34 PID 1784 wrote to memory of 1072 1784 cmd.exe 35 PID 1784 wrote to memory of 1072 1784 cmd.exe 35 PID 1784 wrote to memory of 1072 1784 cmd.exe 35 PID 1784 wrote to memory of 1072 1784 cmd.exe 35 PID 1784 wrote to memory of 2584 1784 cmd.exe 37 PID 1784 wrote to memory of 2584 1784 cmd.exe 37 PID 1784 wrote to memory of 2584 1784 cmd.exe 37 PID 1784 wrote to memory of 2584 1784 cmd.exe 37 PID 1784 wrote to memory of 752 1784 cmd.exe 38 PID 1784 wrote to memory of 752 1784 cmd.exe 38 PID 1784 wrote to memory of 752 1784 cmd.exe 38 PID 1784 wrote to memory of 752 1784 cmd.exe 38 PID 1784 wrote to memory of 2496 1784 cmd.exe 39 PID 1784 wrote to memory of 2496 1784 cmd.exe 39 PID 1784 wrote to memory of 2496 1784 cmd.exe 39 PID 1784 wrote to memory of 2496 1784 cmd.exe 39 PID 1784 wrote to memory of 2500 1784 cmd.exe 40 PID 1784 wrote to memory of 2500 1784 cmd.exe 40 PID 1784 wrote to memory of 2500 1784 cmd.exe 40 PID 1784 wrote to memory of 2500 1784 cmd.exe 40 PID 1784 wrote to memory of 1780 1784 cmd.exe 41 PID 1784 wrote to memory of 1780 1784 cmd.exe 41 PID 1784 wrote to memory of 1780 1784 cmd.exe 41 PID 1784 wrote to memory of 1780 1784 cmd.exe 41 PID 1784 wrote to memory of 600 1784 cmd.exe 42 PID 1784 wrote to memory of 600 1784 cmd.exe 42 PID 1784 wrote to memory of 600 1784 cmd.exe 42 PID 1784 wrote to memory of 600 1784 cmd.exe 42 PID 1784 wrote to memory of 524 1784 cmd.exe 43 PID 1784 wrote to memory of 524 1784 cmd.exe 43 PID 1784 wrote to memory of 524 1784 cmd.exe 43 PID 1784 wrote to memory of 524 1784 cmd.exe 43 PID 2632 wrote to memory of 2908 2632 utilman.exe 54 PID 2632 wrote to memory of 2908 2632 utilman.exe 54 PID 2632 wrote to memory of 2908 2632 utilman.exe 54
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\cincinati.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\7zOC7BFDB57\RomanticCopyright.exe"C:\Users\Admin\AppData\Local\Temp\7zOC7BFDB57\RomanticCopyright.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Uni Uni.cmd & Uni.cmd3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"4⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7969894⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "SigConsumptionDisciplinesSong" Envelope4⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Wan + ..\Module + ..\Is + ..\Read + ..\Bibliography + ..\Match + ..\Qld I4⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\796989\Dept.comDept.com I4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:600
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:524
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2380
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
C:\Users\Admin\AppData\Local\Temp\796989\Dept.com"C:\Users\Admin\AppData\Local\Temp\796989\Dept.com"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2536
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵PID:2744
-
C:\Windows\system32\utilman.exeutilman.exe /debug1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\System32\osk.exe"C:\Windows\System32\osk.exe"2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\796989\Dept.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2192
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}1⤵
- System Location Discovery: System Language Discovery
PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
489KB
MD535431b1f719e5f8edd3ee4c56d590bc9
SHA1c4667dc8990f03e9d3410e636957d5e9c73773c7
SHA256427536f6a144672b8c5cd873d89c0374dab2c6383256347eef80b291729b99b0
SHA512358ea29b484c7e7d493fec6270a7d3a6147852ba68f1c1f5fd9dc277e65dc24239b3718fb1ca986f354b5ebc954dae51f1e478db9d034a6f3417f6564d967fbd
-
Filesize
10.0MB
MD5a737e94c53a284ae8c712eb7b2a2d209
SHA1a5d4113415f38413b5bcc2698e4aaf573cf8217c
SHA256677b2f7ea578826adb9c0f359c6436c364f712803080b38d81ecc1f25e5b97f5
SHA512ab87ef25549d4860269015d279aaf90a35bfd4c26457271a84cacf64c0a0c97d0e4c435136fb9defd2c64307d1bc1e9596ee278c868e101f6a2c657f87bd80b6
-
Filesize
91KB
MD50124e182e6ab32c597551f987c8efc9e
SHA15b1504b161a4748cfdff1463b4a370b7ee6caf14
SHA2566484dd9a145b3178a2534dd802441a7b8d08a679c3241c11395c22bfa6ba6826
SHA51270e76a19d9f3382e14463e9f79dee0db404482e714f1ca9b0330ad144c055b6c6464d9be6bbb94e7e05048925b8f2dd1049276b4982722b7e8a2d8fe7e2dd010
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5930b977ce8cf5c68e617c0cc083b6915
SHA107ab167616b479dd68ea9cfdad2c51d180757596
SHA256cd56fdf1345808d2c8d7a099dabc0d8667581b2888fa973eba477509f7875f3e
SHA512a823ba03f129037c1feb58f7f5408070f512dc0d4044cbaa5aa28295a1e7d952b4172119a1609c271273e8b31ec6aed5d4b3a570cfc5bbc3846821eb1f791814
-
Filesize
56KB
MD584df1af81b44c0e9ac087f6b724dbfe1
SHA1c2604b423fa3a1dfd0d41fd05364f390db94e0f0
SHA256649f01b11633d4f45165010db7e1150d9ddf533fb2906cc7f26ebf4d3807d2c4
SHA512b69aca208184bac03392a91a04cb737772576a2e29ad8a9549d1917c88e86d2fe12e22d9d1a9d01dd08eb1fefa27c13c26a14c41a0551e75dc72f3d64ce97403
-
Filesize
81KB
MD5cce2e35fcd13802b894592bfa8bc4832
SHA1e4b2ebbcea783891bae927d45a5d20a99b0d2c57
SHA25649c9f0a08d446ac52e26ec0a79578d6e8cd0363adce44af727c537c2c127f278
SHA5121f2ac58895ebf1a4c3989a5d76ffac39012fe511030508bfef1c164e0d8301f5f7ce2b87381604b1fa1a0443b5f6ca59948061f7a2f7634d6cdfa0880dc33798
-
Filesize
86KB
MD5c3a23aa50702baadcffdb632c0781eaf
SHA126adb4b06851eb66a2fc3a4b2dc29055e6291e91
SHA256e27aec3fc7086af2906fbf8d5a1a17e3f6871651f2663f8e5a3f5b44dd1e7d61
SHA512545aefc06ba554d32183d8e96f3eafc6204e609d95c4bc8e8bbede315ccc78605d916533fabe995dd9e50b3a0ea63d12e64445e3346dafe24267281b8ca23284
-
Filesize
39KB
MD547b8c8360718381beb75b78cad9989d4
SHA1b1c9ed94b846670c0fbb0322b607b3e5affce120
SHA2560d7c733985efc3042c41b2b26c32b7b8ce65ff9071ebdd872c3d0520a18351ed
SHA512724d7030e1fab1adc5a9798e18cf75c11159cce1e57ab493a4595bdb14b68129c46a518616c427131963a7fd06e741965faca545fc5f007ab120cf28c1fe4d98
-
Filesize
62KB
MD5b09b69ffbbb1c92beb55c7fd798c8c66
SHA1a648e5a9721d8623dd6fca06d5295d1f07b13519
SHA2564b54975d3405ea89c477daa9802d93b4a56683a901039d31e8eb1218deb742fa
SHA51274d6cb22483b46a36887584c97060b16a1f8b6dcc280a8d9c7456d1c8c174b61487990af0bd7426b431ca7fde197ade2f5785784d27ab4371003feaecf2bb409
-
Filesize
919KB
MD54414fe8f2635b6344106903d0f52455d
SHA170f135830f92733b3f0bbdfa35b1f0e36e9e5746
SHA256578f765c46f2b2842f3455c37549326a9ea665aeedf5b86f6c3ff0be1a5f1244
SHA5123c818c29afc91ce177db19c91026017cb567e2e6b0727ba271d66cc5c4f107661a677abc4ea5d1c281c56b3de166ed8ceaf298fa2ecb8f50a08bc1fcb6a0c91f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
7KB
MD5df066c1e3038ff1c556a50a0782e0de1
SHA1ebad7031e3b7651898e3d916d0aa0cb09397d03a
SHA256cb4ca6cf393c39f6fffab51f095518826e38d4eff4fb0f42aa1fb9a4d7ef0b3a
SHA512649874ac78af57207d1d06059e9e5eac3814c13910d08e9325cb500434ad4cb553cdab659db3291839523d0ae636251ac925224db04ea29dde8be41e1d8cb194
-
Filesize
74KB
MD5cf96668f1c4973c8b43a72d90221e4d3
SHA13b512b9979650f556936a5b0866387820d112745
SHA256720160bb915923d8cf54be5d580ac5c13e67a261daf3ae65f972435dd716cd07
SHA5121d9c6299cce257f780252fe4805836f4f27914a816ef89d81119e2553008083754bdb16f25f895f85e35ccb5daa5c5f79fcff2d203b40c5444c88f9fc76b276e
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317