Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10ca6ec46ee9...52.apk
windows7-x64
3calc.exe
windows7-x64
7ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...68.exe
windows7-x64
7cd2d085998...-0.dll
windows7-x64
8cdffb7e75b...ss.exe
windows7-x64
3cf7382c25a...c9.exe
windows7-x64
6cgi19-alpt...e_.exe
windows7-x64
7chrst.exe
windows7-x64
3ci05l2a.exe
windows7-x64
cl.exe
windows7-x64
7clean.exe
windows7-x64
3coinvault.exe
windows7-x64
9com_loader.exe
windows7-x64
3csrss.ex_.exe
windows7-x64
6d.exe
windows7-x64
3d0a5cfec8e...B3.exe
windows7-x64
7d0a5cfec8e...A6.exe
windows7-x64
7d2164cdbc9...FB.exe
windows7-x64
3d2164cdbc9...08.exe
windows7-x64
7d4439055d2..._1.dll
windows7-x64
3d54d2a216e...96.exe
windows7-x64
7d5f29750a8...c5.apk
windows7-x64
3d6c32b0146...4d.zip
windows7-x64
1d889734783...48.exe
windows7-x64
daaa72f48b...2d.exe
windows7-x64
9ddbf1840bf...e2.exe
windows7-x64
10de882c049b..._3.dll
windows7-x64
3decrypt.exe
windows7-x64
3decrypted.ex_.exe
windows7-x64
6Analysis
-
max time kernel
551s -
max time network
358s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:20
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20241023-en
Behavioral task
behavioral3
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
calc.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
chrst.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ci05l2a.exe
Resource
win7-20240708-en
Behavioral task
behavioral13
Sample
cl.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
com_loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
csrss.ex_.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
d.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_Dumped_TDS=4F9911B3.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_TDS=4FA478A6.exe
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_Dumped_TDS=4FB252FB.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_TDS=4FB30D08.exe
Resource
win7-20240729-en
Behavioral task
behavioral23
Sample
d4439055d2d63e52ffc23c6d24d89194_86e510605f1ee068bdc1ae306312652a__1.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
d54d2a216e637bcd36e5217cfba98896.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
d5f29750a8cb158d9b89a1e02e8addc5e410d1ddc48e660589144ade47f794c5.apk
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
d6c32b0146f219bdcb5cf524ea9e0047d9b9bd0fd7c395d5b11cbc4c3298824d.zip
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
d889734783273b7158deeae6cf804a6be99c3a5353d94225a4dbe92caf3a3d48.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
daaa72f48bea498c5ac7ce9bc315e585ff11dad04d1eeb0d1b0ce33a28bedf2d.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
ddbf1840bf626da19d8f3467fe9e20e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
de882c049be133a950b6917562bb2313_583a76e23c1998307d702709dadbe103__3.dll
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
decrypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
decrypted.ex_.exe
Resource
win7-20240708-en
General
-
Target
DBm0yQwt.exe.ViR.exe
-
Size
216KB
-
MD5
3cb2c3ce48ac870ab0be9afb7233295f
-
SHA1
b87ac51e95b85e64bb3fecbbb8f9d2acb5b53895
-
SHA256
ac3f6f87217e1d4fbcd56289b4c77b1adea3dbbaf4131a84b7b2508d6fadcfaf
-
SHA512
e41c6ad1f5522dda96e19fdf4b79ebd8b7bc13507c5ed5afc1155e37b1dabf16f11f66b1101124035d3d92a942bcd60122e3751069ebd7da1a36e498845b6900
-
SSDEEP
3072:UPPdPl/PuW/Yqoeog665R6OKEjzG6hgckhmnl/5aUWTo+Kuv+nAo:UHTnVHv82ZJFgJ+/Hxn
Malware Config
Extracted
C:\!HELP_SOS.hta
Signatures
-
Contacts a large (7699) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
pid Process 2876 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2780 RugvU2Ae.exe 2748 RugvU2Ae.exe 2264 RugvU2Ae.exe 3000 RugvU2Ae.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 DBm0yQwt.exe.ViR.exe 2264 RugvU2Ae.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper RugvU2Ae.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QN4.bmp" RugvU2Ae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RugvU2Ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RugvU2Ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RugvU2Ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RugvU2Ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2676 PING.EXE 2508 PING.EXE 968 PING.EXE 2716 PING.EXE 2880 PING.EXE 2844 PING.EXE -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1644 vssadmin.exe 1480 vssadmin.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop RugvU2Ae.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-19 RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-20 RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-18 RugvU2Ae.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\htafile\DefaultIcon RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\DefaultIcon RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\FriendlyTypeName RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\shell\open\command RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\.sage RugvU2Ae.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\htafile RugvU2Ae.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" RugvU2Ae.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\.sage\ = "sage.notice" RugvU2Ae.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\shell RugvU2Ae.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\sage.notice\shell\open RugvU2Ae.exe -
Runs ping.exe 1 TTPs 6 IoCs
pid Process 2844 PING.EXE 2676 PING.EXE 2508 PING.EXE 968 PING.EXE 2716 PING.EXE 2880 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2248 schtasks.exe 2376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe 2264 RugvU2Ae.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 2372 DBm0yQwt.exe.ViR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2380 2372 DBm0yQwt.exe.ViR.exe 30 PID 2372 wrote to memory of 2380 2372 DBm0yQwt.exe.ViR.exe 30 PID 2372 wrote to memory of 2380 2372 DBm0yQwt.exe.ViR.exe 30 PID 2372 wrote to memory of 2380 2372 DBm0yQwt.exe.ViR.exe 30 PID 2372 wrote to memory of 2376 2372 DBm0yQwt.exe.ViR.exe 31 PID 2372 wrote to memory of 2376 2372 DBm0yQwt.exe.ViR.exe 31 PID 2372 wrote to memory of 2376 2372 DBm0yQwt.exe.ViR.exe 31 PID 2372 wrote to memory of 2376 2372 DBm0yQwt.exe.ViR.exe 31 PID 2372 wrote to memory of 2780 2372 DBm0yQwt.exe.ViR.exe 33 PID 2372 wrote to memory of 2780 2372 DBm0yQwt.exe.ViR.exe 33 PID 2372 wrote to memory of 2780 2372 DBm0yQwt.exe.ViR.exe 33 PID 2372 wrote to memory of 2780 2372 DBm0yQwt.exe.ViR.exe 33 PID 2372 wrote to memory of 2876 2372 DBm0yQwt.exe.ViR.exe 34 PID 2372 wrote to memory of 2876 2372 DBm0yQwt.exe.ViR.exe 34 PID 2372 wrote to memory of 2876 2372 DBm0yQwt.exe.ViR.exe 34 PID 2372 wrote to memory of 2876 2372 DBm0yQwt.exe.ViR.exe 34 PID 2876 wrote to memory of 2880 2876 cmd.exe 36 PID 2876 wrote to memory of 2880 2876 cmd.exe 36 PID 2876 wrote to memory of 2880 2876 cmd.exe 36 PID 2876 wrote to memory of 2880 2876 cmd.exe 36 PID 2380 wrote to memory of 2804 2380 DBm0yQwt.exe.ViR.exe 37 PID 2380 wrote to memory of 2804 2380 DBm0yQwt.exe.ViR.exe 37 PID 2380 wrote to memory of 2804 2380 DBm0yQwt.exe.ViR.exe 37 PID 2380 wrote to memory of 2804 2380 DBm0yQwt.exe.ViR.exe 37 PID 2380 wrote to memory of 2248 2380 DBm0yQwt.exe.ViR.exe 38 PID 2380 wrote to memory of 2248 2380 DBm0yQwt.exe.ViR.exe 38 PID 2380 wrote to memory of 2248 2380 DBm0yQwt.exe.ViR.exe 38 PID 2380 wrote to memory of 2248 2380 DBm0yQwt.exe.ViR.exe 38 PID 2876 wrote to memory of 2844 2876 cmd.exe 41 PID 2876 wrote to memory of 2844 2876 cmd.exe 41 PID 2876 wrote to memory of 2844 2876 cmd.exe 41 PID 2876 wrote to memory of 2844 2876 cmd.exe 41 PID 2876 wrote to memory of 2676 2876 cmd.exe 42 PID 2876 wrote to memory of 2676 2876 cmd.exe 42 PID 2876 wrote to memory of 2676 2876 cmd.exe 42 PID 2876 wrote to memory of 2676 2876 cmd.exe 42 PID 2780 wrote to memory of 2748 2780 RugvU2Ae.exe 43 PID 2780 wrote to memory of 2748 2780 RugvU2Ae.exe 43 PID 2780 wrote to memory of 2748 2780 RugvU2Ae.exe 43 PID 2780 wrote to memory of 2748 2780 RugvU2Ae.exe 43 PID 2876 wrote to memory of 2508 2876 cmd.exe 44 PID 2876 wrote to memory of 2508 2876 cmd.exe 44 PID 2876 wrote to memory of 2508 2876 cmd.exe 44 PID 2876 wrote to memory of 2508 2876 cmd.exe 44 PID 2380 wrote to memory of 2264 2380 DBm0yQwt.exe.ViR.exe 45 PID 2380 wrote to memory of 2264 2380 DBm0yQwt.exe.ViR.exe 45 PID 2380 wrote to memory of 2264 2380 DBm0yQwt.exe.ViR.exe 45 PID 2380 wrote to memory of 2264 2380 DBm0yQwt.exe.ViR.exe 45 PID 2380 wrote to memory of 2316 2380 DBm0yQwt.exe.ViR.exe 46 PID 2380 wrote to memory of 2316 2380 DBm0yQwt.exe.ViR.exe 46 PID 2380 wrote to memory of 2316 2380 DBm0yQwt.exe.ViR.exe 46 PID 2380 wrote to memory of 2316 2380 DBm0yQwt.exe.ViR.exe 46 PID 2316 wrote to memory of 968 2316 cmd.exe 48 PID 2316 wrote to memory of 968 2316 cmd.exe 48 PID 2316 wrote to memory of 968 2316 cmd.exe 48 PID 2316 wrote to memory of 968 2316 cmd.exe 48 PID 2264 wrote to memory of 3000 2264 RugvU2Ae.exe 49 PID 2264 wrote to memory of 3000 2264 RugvU2Ae.exe 49 PID 2264 wrote to memory of 3000 2264 RugvU2Ae.exe 49 PID 2264 wrote to memory of 3000 2264 RugvU2Ae.exe 49 PID 2264 wrote to memory of 1644 2264 RugvU2Ae.exe 50 PID 2264 wrote to memory of 1644 2264 RugvU2Ae.exe 50 PID 2264 wrote to memory of 1644 2264 RugvU2Ae.exe 50 PID 2264 wrote to memory of 1644 2264 RugvU2Ae.exe 50 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe" g2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe" g3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "qri1sPo5" /TR "C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe" /SC ONLOGON /RL HIGHEST /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2248
-
-
C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe"C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe"C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe" g4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1644
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1480
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1488
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"4⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN /F "qri1sPo5"4⤵
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config16184093.bat"4⤵
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2716
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config252888.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:968
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "qri1sPo5" /TR "C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe" /SC ONLOGON /RL HIGHEST /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2376
-
-
C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe"C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe"C:\Users\Admin\AppData\Roaming\RugvU2Ae.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config252888.bat"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2880
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2844
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2676
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2508
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2588
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2036
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD51c1e69a109bb51c0f2903ce782942536
SHA16716467da2241e9730d2d5eff09e1fd7480a24e3
SHA25653f4c6a43c51534308beaadb68f0e5525d52905a345aba21e76075482c1461ad
SHA51270def0f45ba061616c224271e2bbc75a936b4e9d8ef57827ade08e665603e34b1d8e88d8f9bf67a30f26269bfa72a9c1794933b442f66df0e7a2383a2f500e7e
-
Filesize
218B
MD584b53034262c0000126e441e8b011bf3
SHA139b79ee90757307985eff9d1edde41645a4301e3
SHA2569064efb3e678f849af5d617938e088e4fa25c3d9464be7786f6adeff5d0c1574
SHA51213e74e91cbd37e937d040ec02e7f622b3325cdcfbe47f7eb64d60912a253324ed50626fa06b327a2f93bf7cb17d06b49421ffa7e715732a315b8beae334455a7
-
Filesize
227B
MD570e42df697ad661221ae5920a25e32cb
SHA1f481fff28b5abf6632ba1ab08bc9fb6488b7c52b
SHA25652e034a4f657349a1c5e0512e4b19157b56ef93469205a9974f501da319d894a
SHA512e9c5fd70023aec82fc61d8dc5c05800154163b244f995644f27ac5d7c89edd53206abbcc8ffa698fb4b6d2f53c1a28ee5c5a3046864c0b1e1e75c2c199253380
-
Filesize
3KB
MD54c999bbfddd5513d08d2d414c92ac2f4
SHA123e40ea4b75dc037a5cdfce521826737090dce09
SHA2569a55ac3ff3c115b686c19da0a88a9e7525aa62d49c69b107addf8efd33a16215
SHA5127b48cbff08a98f273afb78262167030395fab421718df559625867b91f98fbb0eb0152e8002568428086d1bd3f03f9c9ab26fdabdf9e33ffcea8f5c56529b944
-
Filesize
65B
MD513f8fb33b754f25870b9441027453f0c
SHA1d6d30bdc12b5d8a00c738ed97310629e1d38b002
SHA256a8bddead6d8d81499d356fa0320e8af9d36f8016666d5d8b3830b2dff457748d
SHA512785d2b95c0cd735f07bda19eac9dcf1c6d96150a153475561d2e4014efc85026c6860db7663c8a9d98d68133965cf3809bff431fcae6590af6a7a0d50aefddb7
-
Filesize
216KB
MD53cb2c3ce48ac870ab0be9afb7233295f
SHA1b87ac51e95b85e64bb3fecbbb8f9d2acb5b53895
SHA256ac3f6f87217e1d4fbcd56289b4c77b1adea3dbbaf4131a84b7b2508d6fadcfaf
SHA512e41c6ad1f5522dda96e19fdf4b79ebd8b7bc13507c5ed5afc1155e37b1dabf16f11f66b1101124035d3d92a942bcd60122e3751069ebd7da1a36e498845b6900