Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win10v2004-20241007-en
General
-
Target
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
-
Size
465KB
-
MD5
e4a4fc96188310b7b07e7c0525b5c0aa
-
SHA1
81185dd73f2e042a947a1bf77f429de08778b6e9
-
SHA256
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3
-
SHA512
72d27e3019954c3c98b8912842c42ee1fe5af5ca7b9717f7ee8bb61f16528c374f883f4b9697c1805ea59a5e854e4aa53aa6cfe06d87d87b181dd12def7d61d6
-
SSDEEP
12288:HZph8TCfS9dQ1GH4wKcmY8FYkEv+NTjUU1GaJyixE:HZpCTCfS9dQ104wdV8FImTjUYGViS
Malware Config
Extracted
C:\ProgramData\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Signatures
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 22 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Users\Admin\3D Objects\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Music\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-pl.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-si\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nb-no\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-oob.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Frosted Glass.eftx d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelGlyph.16.GrayF.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hr-hr\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest-ppd.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-pl.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluEmptyFolder_160.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\dark\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filterselected-dark-focus_32.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jre-1.8\COPYRIGHT d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\LightTheme.acrotheme d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SLATE\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\VBAOWS10.CHM d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\remove.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\main.css d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_Grace-ul-oob.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ppd.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN105.XML d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\msedge_7z.data d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ppd.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\winamp2.xml d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART5.BDR d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hr-hr\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fullscreen-hover.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner_Dark.pdf d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-ppd.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\manifest.json d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\example_icons2x.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nb-no\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\sat_logo.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL083.XML d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.GRAPH.16.1033.hxn d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATERMAR\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\edit_pdf_poster2x.jpg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ar-ae\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipschs.xml d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription1-ppd.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTest-ul-oob.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner_2x.gif d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview_selected-hover.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-tw\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Internet Explorer\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ul-phn.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\PowerPivotExcelClientAddIn.tlb d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\FrameworkList.xml d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_opencarat_18.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\scan_poster.jpg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBCN6.CHM d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exed4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Modifies Control Panel 1 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\WallpaperStyle = "10" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Modifies data under HKEY_USERS 53 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 3ccc0a99d53c7928b6ce9737acd1b4c9f097d89f7bffe6320f2284520527bb48 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 44881ce3e3ce6d2af3d7db613cbc5f951ffb53c1f37047d783dade1db1642c7c d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = d2fd717ccacd35d49b871590b9ded2ddb5c82b7974dfd8f9a6d940be241df0da d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "1" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = a1486fe594cad400ccb28bbeeab84d2ef28cc702388e24fe5b6e2db608a160c6 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 2180bb58418210184ece233069905b6444b6018a3ba9d7606baa9ab3cf707359 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00440075006d00700053007400610063006b002e006c006f0067002e0074006d00700000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700320000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 93007b01765d1c13ef66a7ed5ab85fef76363e80a0fe920aaf86d83c5ca95054 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 3f86f55cbf51c733ccde98501d0f8ef1cae53f4cb5af16871ec8138cf4208e55 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c0043006f006e006e0065006300740065006400440065007600690063006500730050006c006100740066006f0072006d005c004c002e00410064006d0069006e005c004100630074006900760069007400690065007300430061006300680065002e006400620000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (str) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (str) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 98035521c421a7abd8e23c20fbc347fed7d29f3fda053fd55136c1cadea2b46d d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f0050007200690076006100740065005c00550070006400610074006500530074006f00720065005c00730074006f00720065002e006400620000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00350033006200330039006500380038002d0031003800630034002d0031003100650061002d0061003800310031002d003000300030006400330061006100340036003900320062007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300032002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 75088b9b468e0fb6f43c7f00dccad0211906988cd9758d0dd2177e58a8e54acc d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004d006900630072006f0073006f00660074005c00470061006d0065004400560052005c004b006e006f0077006e00470061006d0065004c006900730074002e00620069006e0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "2" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 78d4784e20aecb2934e8ef0a889716c8b6bf27aa100cfb42b27d9681afc35c25 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\WallpaperStyle = "10" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = ae2aa088ed41c8fa4a765220d1ec18eca6743f3d1865b7b66101239fc35f58ff d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 3066fc9e8fa9ad8ddbf74641454ceb9dd1a2298cdc9da8adfa4ea449be273c53 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = cd8051e7b3a4592717f9882b76531035fdaced9f4956486bc573a067e93c9858 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "10" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Owner = 080c0000b34a24b4883adb01 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 6d7a2412d242c9f480fad6919ad3be64be6a127ac9d0af0468c1afede1a9c047 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f005300680061007200650064005c004c006f00670073005c00530079007300740065006d005c0057007500500072006f00760069006400650072002e00650036006600320035003000390066002d0064006200300037002d0034006400300039002d0062003900390030002d006300630037003700320036003300380038003200650061002e0031002e00650074006c0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 6efe3940597d1158780a109f69c93ac8046777f44e468e97dc8964d8d25a3a11 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 7e73cb9155ef7fa3852df9b4c90c3707575bf766b12b7f0304ac9a56c3eb3f74 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00350033006200330039006500380038002d0031003800630034002d0031003100650061002d0061003800310031002d003000300030006400330061006100340036003900320062007d002e0054004d002e0062006c00660000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = d867af6637a71f88ff226b2c9c03a8240fa707dcab3e974bfec5ce82a5261cb5 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f005300680061007200650064005c004c006f00670073005c00530079007300740065006d005c004d006f00550073006f0043006f007200650057006f0072006b00650072002e00330037003900640030003900300031002d0065003900370038002d0034003000330066002d0038003700650036002d003200350032006600310033003100360062006400620038002e0031002e00650074006c0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 0525b3328c5fed03969de94f367c0a190c4330346a84a2d11f061ecbe869772b d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 3c0b9238477e7580af6babe7fa06e065eca1acc8460bd1d9b471bc7ba4d93b19 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e0044004100540000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = eae03de5e9988e6faebb0b22c55fc5e9ede37dd45cdba1c51f7f5eef0c00714c d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 69ee4ed86909cec685ee386976e3b8c70394bc67a8b560c0f10365882f594ae4 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700310000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = de461aee5f143b41224de569cd837811473bf665f47f04c04a3a81d7cfc010a3 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = c397c6a9a5098a2218edfb2520b099483b9f11c6d34ca1e8cf5f70056c0b6d03 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\WallpaperStyle = "10" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = f989643fcd23cfd7713fb20c712626ef3d2d59df5aca8927eb0a8a3b3c7aeb5d d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = f0861fcb30204c1f0106dc8dd7d7e0534c8d0bad859ee618e5d4bdc09de69690 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f005300680061007200650064005c004c006f00670073005c00530079007300740065006d005c00550070006400610074006500530065007300730069006f006e004f0072006300680065007300740072006100740069006f006e002e00630032003700610038003300630034002d0037003700300066002d0034006300310037002d0038006500640035002d006400340064003000650034006600630035006500350039002e0031002e00650074006c0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00350033006200330039006500380038002d0031003800630034002d0031003100650061002d0061003800310031002d003000300030006400330061006100340036003900320062007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300031002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = b4c1b2f19f7b9c0bf91f8607b1348494655690dc9f4e0c1d683ef610b09ddd24 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Modifies registry class 3 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted\DefaultIcon d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted\DefaultIcon\ = "C:\\Users\\Public\\icon.ico" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exed4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exepid process 1540 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 1540 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
vssvc.exeWMIC.exedescription pid process Token: SeBackupPrivilege 2184 vssvc.exe Token: SeRestorePrivilege 2184 vssvc.exe Token: SeAuditPrivilege 2184 vssvc.exe Token: SeCreateTokenPrivilege 60 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 60 WMIC.exe Token: SeIncreaseQuotaPrivilege 60 WMIC.exe Token: SeSecurityPrivilege 60 WMIC.exe Token: SeTakeOwnershipPrivilege 60 WMIC.exe Token: SeLoadDriverPrivilege 60 WMIC.exe Token: SeSystemtimePrivilege 60 WMIC.exe Token: SeBackupPrivilege 60 WMIC.exe Token: SeRestorePrivilege 60 WMIC.exe Token: SeShutdownPrivilege 60 WMIC.exe Token: SeSystemEnvironmentPrivilege 60 WMIC.exe Token: SeUndockPrivilege 60 WMIC.exe Token: SeManageVolumePrivilege 60 WMIC.exe Token: 31 60 WMIC.exe Token: 32 60 WMIC.exe Token: SeCreateTokenPrivilege 60 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 60 WMIC.exe Token: SeIncreaseQuotaPrivilege 60 WMIC.exe Token: SeSecurityPrivilege 60 WMIC.exe Token: SeTakeOwnershipPrivilege 60 WMIC.exe Token: SeLoadDriverPrivilege 60 WMIC.exe Token: SeSystemtimePrivilege 60 WMIC.exe Token: SeBackupPrivilege 60 WMIC.exe Token: SeRestorePrivilege 60 WMIC.exe Token: SeShutdownPrivilege 60 WMIC.exe Token: SeSystemEnvironmentPrivilege 60 WMIC.exe Token: SeUndockPrivilege 60 WMIC.exe Token: SeManageVolumePrivilege 60 WMIC.exe Token: 31 60 WMIC.exe Token: 32 60 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.execmd.exedescription pid process target process PID 3080 wrote to memory of 2016 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 3080 wrote to memory of 2016 3080 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2016 wrote to memory of 60 2016 cmd.exe WMIC.exe PID 2016 wrote to memory of 60 2016 cmd.exe WMIC.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"2⤵
- Drops startup file
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{59C6D001-2A1D-495D-B41C-13CF70E22926}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{59C6D001-2A1D-495D-B41C-13CF70E22926}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2184
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5beb8ae5c244086e0151841e6f21fbca0
SHA1e8ed58453145b28df1d29b4a9a0a17c2f6f6a6b3
SHA25627d3f0145f5337820e0a420b3c97fd3af009af66e00dc3a9acee0f9ccd21613e
SHA5125d41a9bf5b95cfea3b317561c977272be7f186406cd1fac1bb5f1dc565450076238c7424005ec2a67268048484dbf11e4102ab2e36c077c2d75879bf61b11f58
-
Filesize
3KB
MD5aa051215b7f6c35012f69732e49e285b
SHA1b94eef77d971cfbcb91ef34afa6c085e3fc578d4
SHA256909178aceaefe4288a772c48ac49991b2f85bb4a98a72dec2a7267c23591f612
SHA51240824a906cbbd429e8835ff01f9f07f16eb7b8dd2c96f3b5de96f6ae24415bd7325b568c67d745b8d9009da9c67c2a5e1892d37b6878d70a3d9a7c00d1558eaa