Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1D02D012970...94.exe
windows10-2004-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10DBm0yQwt.exe.ViR.exe
windows10-2004-x64
10ca6ec46ee9...52.apk
android-9-x86
8ca6ec46ee9...52.apk
android-10-x64
8ca6ec46ee9...52.apk
android-11-x64
8calc.exe
windows10-2004-x64
5ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...B3.exe
windows10-2004-x64
10ccc71c83c8...68.exe
windows7-x64
7ccc71c83c8...68.exe
windows10-2004-x64
3cd2d085998...-0.dll
windows7-x64
8cd2d085998...-0.dll
windows10-2004-x64
8cdffb7e75b...ss.exe
windows7-x64
3cdffb7e75b...ss.exe
windows10-2004-x64
3cf7382c25a...c9.exe
windows7-x64
6cf7382c25a...c9.exe
windows10-2004-x64
3cgi19-alpt...e_.exe
windows7-x64
7cgi19-alpt...e_.exe
windows10-2004-x64
7chrst.exe
windows7-x64
3chrst.exe
windows10-2004-x64
3ci05l2a.exe
windows7-x64
ci05l2a.exe
windows10-2004-x64
cl.exe
windows7-x64
7cl.exe
windows10-2004-x64
7clean.exe
windows7-x64
3clean.exe
windows10-2004-x64
3coinvault.exe
windows7-x64
9coinvault.exe
windows10-2004-x64
6com_loader.exe
windows7-x64
3com_loader.exe
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:41
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
DBm0yQwt.exe.ViR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral7
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
calc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
chrst.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
chrst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
ci05l2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ci05l2a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
cl.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
cl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
coinvault.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
com_loader.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
com_loader.exe
Resource
win10v2004-20241007-en
General
-
Target
DBm0yQwt.exe.ViR.exe
-
Size
216KB
-
MD5
3cb2c3ce48ac870ab0be9afb7233295f
-
SHA1
b87ac51e95b85e64bb3fecbbb8f9d2acb5b53895
-
SHA256
ac3f6f87217e1d4fbcd56289b4c77b1adea3dbbaf4131a84b7b2508d6fadcfaf
-
SHA512
e41c6ad1f5522dda96e19fdf4b79ebd8b7bc13507c5ed5afc1155e37b1dabf16f11f66b1101124035d3d92a942bcd60122e3751069ebd7da1a36e498845b6900
-
SSDEEP
3072:UPPdPl/PuW/Yqoeog665R6OKEjzG6hgckhmnl/5aUWTo+Kuv+nAo:UHTnVHv82ZJFgJ+/Hxn
Malware Config
Extracted
C:\!HELP_SOS.hta
Signatures
-
Contacts a large (7699) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2952 cmd.exe -
Executes dropped EXE 4 IoCs
Processes:
WOwurE7G.exeWOwurE7G.exeWOwurE7G.exeWOwurE7G.exepid process 2968 WOwurE7G.exe 2780 WOwurE7G.exe 3004 WOwurE7G.exe 2928 WOwurE7G.exe -
Loads dropped DLL 2 IoCs
Processes:
DBm0yQwt.exe.ViR.exeWOwurE7G.exepid process 1704 DBm0yQwt.exe.ViR.exe 3004 WOwurE7G.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
WOwurE7G.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper WOwurE7G.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BNC.bmp" WOwurE7G.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DBm0yQwt.exe.ViR.exeschtasks.exeWScript.exePING.EXEschtasks.exeDBm0yQwt.exe.ViR.exeWOwurE7G.exePING.EXEWOwurE7G.exePING.EXEWOwurE7G.exemshta.exeschtasks.exePING.EXEcmd.exevssadmin.execmd.exeDllHost.execmd.exeDBm0yQwt.exe.ViR.exePING.EXEWOwurE7G.exePING.EXEvssadmin.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WOwurE7G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WOwurE7G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WOwurE7G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WOwurE7G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 272 PING.EXE 2296 PING.EXE 2876 PING.EXE 608 PING.EXE 2412 PING.EXE 2324 PING.EXE -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2328 vssadmin.exe 2692 vssadmin.exe -
Modifies Control Panel 1 IoCs
Processes:
WOwurE7G.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop WOwurE7G.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 4 IoCs
Processes:
WOwurE7G.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-19 WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-20 WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-18 WOwurE7G.exe -
Modifies registry class 14 IoCs
Processes:
WOwurE7G.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\shell\open\command WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\htafile\DefaultIcon WOwurE7G.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" WOwurE7G.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\shell\open WOwurE7G.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" WOwurE7G.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.sage\ = "sage.notice" WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\htafile WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\DefaultIcon WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\FriendlyTypeName WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\shell WOwurE7G.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" WOwurE7G.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.sage WOwurE7G.exe -
Runs ping.exe 1 TTPs 6 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 272 PING.EXE 2296 PING.EXE 2876 PING.EXE 608 PING.EXE 2412 PING.EXE 2324 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2468 schtasks.exe 2840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
WOwurE7G.exepid process 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe 3004 WOwurE7G.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
DBm0yQwt.exe.ViR.exedescription pid process Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 1704 DBm0yQwt.exe.ViR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
DBm0yQwt.exe.ViR.execmd.exeDBm0yQwt.exe.ViR.exeWOwurE7G.execmd.exeWOwurE7G.exedescription pid process target process PID 1704 wrote to memory of 2496 1704 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 1704 wrote to memory of 2496 1704 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 1704 wrote to memory of 2496 1704 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 1704 wrote to memory of 2496 1704 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 1704 wrote to memory of 2468 1704 DBm0yQwt.exe.ViR.exe schtasks.exe PID 1704 wrote to memory of 2468 1704 DBm0yQwt.exe.ViR.exe schtasks.exe PID 1704 wrote to memory of 2468 1704 DBm0yQwt.exe.ViR.exe schtasks.exe PID 1704 wrote to memory of 2468 1704 DBm0yQwt.exe.ViR.exe schtasks.exe PID 1704 wrote to memory of 2968 1704 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 1704 wrote to memory of 2968 1704 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 1704 wrote to memory of 2968 1704 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 1704 wrote to memory of 2968 1704 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 1704 wrote to memory of 2952 1704 DBm0yQwt.exe.ViR.exe cmd.exe PID 1704 wrote to memory of 2952 1704 DBm0yQwt.exe.ViR.exe cmd.exe PID 1704 wrote to memory of 2952 1704 DBm0yQwt.exe.ViR.exe cmd.exe PID 1704 wrote to memory of 2952 1704 DBm0yQwt.exe.ViR.exe cmd.exe PID 2952 wrote to memory of 2296 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2296 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2296 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2296 2952 cmd.exe PING.EXE PID 2496 wrote to memory of 2880 2496 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 2496 wrote to memory of 2880 2496 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 2496 wrote to memory of 2880 2496 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 2496 wrote to memory of 2880 2496 DBm0yQwt.exe.ViR.exe DBm0yQwt.exe.ViR.exe PID 2496 wrote to memory of 2840 2496 DBm0yQwt.exe.ViR.exe schtasks.exe PID 2496 wrote to memory of 2840 2496 DBm0yQwt.exe.ViR.exe schtasks.exe PID 2496 wrote to memory of 2840 2496 DBm0yQwt.exe.ViR.exe schtasks.exe PID 2496 wrote to memory of 2840 2496 DBm0yQwt.exe.ViR.exe schtasks.exe PID 2952 wrote to memory of 2876 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2876 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2876 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2876 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 608 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 608 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 608 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 608 2952 cmd.exe PING.EXE PID 2968 wrote to memory of 2780 2968 WOwurE7G.exe WOwurE7G.exe PID 2968 wrote to memory of 2780 2968 WOwurE7G.exe WOwurE7G.exe PID 2968 wrote to memory of 2780 2968 WOwurE7G.exe WOwurE7G.exe PID 2968 wrote to memory of 2780 2968 WOwurE7G.exe WOwurE7G.exe PID 2952 wrote to memory of 2412 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2412 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2412 2952 cmd.exe PING.EXE PID 2952 wrote to memory of 2412 2952 cmd.exe PING.EXE PID 2496 wrote to memory of 3004 2496 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 2496 wrote to memory of 3004 2496 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 2496 wrote to memory of 3004 2496 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 2496 wrote to memory of 3004 2496 DBm0yQwt.exe.ViR.exe WOwurE7G.exe PID 2496 wrote to memory of 2032 2496 DBm0yQwt.exe.ViR.exe cmd.exe PID 2496 wrote to memory of 2032 2496 DBm0yQwt.exe.ViR.exe cmd.exe PID 2496 wrote to memory of 2032 2496 DBm0yQwt.exe.ViR.exe cmd.exe PID 2496 wrote to memory of 2032 2496 DBm0yQwt.exe.ViR.exe cmd.exe PID 2032 wrote to memory of 2324 2032 cmd.exe PING.EXE PID 2032 wrote to memory of 2324 2032 cmd.exe PING.EXE PID 2032 wrote to memory of 2324 2032 cmd.exe PING.EXE PID 2032 wrote to memory of 2324 2032 cmd.exe PING.EXE PID 3004 wrote to memory of 2928 3004 WOwurE7G.exe WOwurE7G.exe PID 3004 wrote to memory of 2928 3004 WOwurE7G.exe WOwurE7G.exe PID 3004 wrote to memory of 2928 3004 WOwurE7G.exe WOwurE7G.exe PID 3004 wrote to memory of 2928 3004 WOwurE7G.exe WOwurE7G.exe PID 3004 wrote to memory of 2328 3004 WOwurE7G.exe vssadmin.exe PID 3004 wrote to memory of 2328 3004 WOwurE7G.exe vssadmin.exe PID 3004 wrote to memory of 2328 3004 WOwurE7G.exe vssadmin.exe PID 3004 wrote to memory of 2328 3004 WOwurE7G.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe" g2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe" g3⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "kpH7GcjR" /TR "C:\Users\Admin\AppData\Roaming\WOwurE7G.exe" /SC ONLOGON /RL HIGHEST /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
C:\Users\Admin\AppData\Roaming\WOwurE7G.exe"C:\Users\Admin\AppData\Roaming\WOwurE7G.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\WOwurE7G.exe"C:\Users\Admin\AppData\Roaming\WOwurE7G.exe" g4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2328
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2692
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2272
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"4⤵
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN /F "kpH7GcjR"4⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config16184093.bat"4⤵
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:272
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config252888.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2324
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "kpH7GcjR" /TR "C:\Users\Admin\AppData\Roaming\WOwurE7G.exe" /SC ONLOGON /RL HIGHEST /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
C:\Users\Admin\AppData\Roaming\WOwurE7G.exe"C:\Users\Admin\AppData\Roaming\WOwurE7G.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\WOwurE7G.exe"C:\Users\Admin\AppData\Roaming\WOwurE7G.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config252888.bat"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2296
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2876
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:608
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2412
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2920
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1164
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5b3631bee7e04f92457383532592b4326
SHA158e35c402e00497c80449667086769e0ffd3811a
SHA25610b109597ed665454d4c483836fbda0cbbdf9ef70f538de46ee3c50e6816816a
SHA5121c72dbc17ad9221062002af3f29e517d088a753b2ac4d3c802b12672e28c934ae5e0ee9451a6d5bd4901ff383cc38bc1e56ea38f5d2095bafe1623f41a9dbba6
-
Filesize
218B
MD57e0d07a83715b72eba5b82c7151e6f4e
SHA18f220a723c1356e3d57da9e4bf255c40a59b72a6
SHA2560afa740aa99965e81cd1273dce98614718337b13e2a2937a402ad74c3384264b
SHA512c79fa8da7237179fdf702b9fdde803290a3c1989217ff22ea85a0c5862b52139cb5faf90e0a38b5cca3cf95424cdb1a0d6dad6619265514fa9a0d5d5f6b200e6
-
Filesize
227B
MD570e42df697ad661221ae5920a25e32cb
SHA1f481fff28b5abf6632ba1ab08bc9fb6488b7c52b
SHA25652e034a4f657349a1c5e0512e4b19157b56ef93469205a9974f501da319d894a
SHA512e9c5fd70023aec82fc61d8dc5c05800154163b244f995644f27ac5d7c89edd53206abbcc8ffa698fb4b6d2f53c1a28ee5c5a3046864c0b1e1e75c2c199253380
-
Filesize
3KB
MD54c999bbfddd5513d08d2d414c92ac2f4
SHA123e40ea4b75dc037a5cdfce521826737090dce09
SHA2569a55ac3ff3c115b686c19da0a88a9e7525aa62d49c69b107addf8efd33a16215
SHA5127b48cbff08a98f273afb78262167030395fab421718df559625867b91f98fbb0eb0152e8002568428086d1bd3f03f9c9ab26fdabdf9e33ffcea8f5c56529b944
-
Filesize
65B
MD545831eff59bd94f78a71c729405ffe1e
SHA14f8339550ac91ad3ca4594093dc64cbae670fa31
SHA2568aea6abdd9f818ac0f7e8971042e4d3612cf7d77dd9673856c2e629c71874d18
SHA512650c4f6e667e24d5e9495b3031a6eda06d8978c061f76373a7e32b119598e81e0334271a67ce33bd9a763b08464b2e4b90c4d87517f642c548249afc536f61f6
-
Filesize
216KB
MD53cb2c3ce48ac870ab0be9afb7233295f
SHA1b87ac51e95b85e64bb3fecbbb8f9d2acb5b53895
SHA256ac3f6f87217e1d4fbcd56289b4c77b1adea3dbbaf4131a84b7b2508d6fadcfaf
SHA512e41c6ad1f5522dda96e19fdf4b79ebd8b7bc13507c5ed5afc1155e37b1dabf16f11f66b1101124035d3d92a942bcd60122e3751069ebd7da1a36e498845b6900