Analysis
-
max time kernel
57s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pastelists.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
pastelists.dll
Resource
win10v2004-20241007-en
General
-
Target
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
-
Size
276KB
-
MD5
685d1b61e34fdff8ebd5e1ad7d7a62ae
-
SHA1
e8dc6e16901372dd70f9472a5965e6ec3c39e7e5
-
SHA256
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770
-
SHA512
754e3a3e74f83733e08aa0830e154b790a5f9c71b7e952013078142c73702c680beb561190b4778ce33ae9192a82b7bff916c31bb83b80cc46d00ee83f09be99
-
SSDEEP
6144:T28A9pceLeNFNYe3ipeVcq1ycyIvNLF/pDQOted5fJMiwT5g:y8GZLeN/d3tcZmP/pkAw5m5g
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_EET64NM_.txt
http://hjhqmbxyinislkkt.onion/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_YJ1HSXEO_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (1097) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Loads dropped DLL 3 IoCs
pid Process 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpDF44.bmp" 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2976 set thread context of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 -
resource yara_rule behavioral2/memory/1656-13-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-15-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-16-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-17-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-18-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-19-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-22-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-24-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-26-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-399-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-416-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1656-427-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\the bat! 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\thunderbird 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\ 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\bitcoin 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\microsoft\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\steam 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files (x86)\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\program files\ 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\ 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4320 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe Token: SeCreatePagefilePrivilege 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe Token: 33 3852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3852 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 2976 wrote to memory of 1656 2976 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 83 PID 1656 wrote to memory of 3984 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 94 PID 1656 wrote to memory of 3984 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 94 PID 1656 wrote to memory of 3984 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 94 PID 1656 wrote to memory of 4320 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 95 PID 1656 wrote to memory of 4320 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 95 PID 1656 wrote to memory of 4320 1656 09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"C:\Users\Admin\AppData\Local\Temp\09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe"2⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_7V8V1J0_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_TJRTHZR_.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4320
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51d5f487f5a63dd5c3b30d77fee0f95c1
SHA1a0d17de014f07450fa01565011416b9ff8ab9383
SHA2560b52bb99dd313e09a5b108b71f83f8f9fffa79bab1886f754fc0d7d7e2b0f62c
SHA512e69360529cae6914fb8b918a5e5d7389897392117db166d5ffebd2647a26565ef2a20f6901d9555f1c29e630463353b4934ef8bac9a97913459bc8ef09b01f33
-
Filesize
11KB
MD54d3b19a81bd51f8ce44b93643a4e3a99
SHA135f8b00e85577b014080df98bd2c378351d9b3e9
SHA256fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
SHA512b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622
-
Filesize
180KB
MD5f2048d943f0965532b8473c445991a5c
SHA109504be04e8e8980698350e5b0713ebb52963e44
SHA256bc9d70d641f5bd5ff5d5686417ee9569d252bcd1f2ff6c5e4972babb9610ac43
SHA51297d0fca60c89cd3c2381dc285b525d3221a32a871e58c3cbf971bed9eb65927ef9c98872a39c9d6f5a15b4e209e177ba3ac45b91797f900b5539c32087a360c5
-
Filesize
73KB
MD51925ac3c2c238f1724eca1cc95b06b48
SHA11a38c4da71a2327ea195addca44038400dc784f2
SHA2564a060e4756fdc3a504fa6fdbc99d40fdd325758a6683ef285cafc21e6975d908
SHA5127655918f80c35160c499d07a2839ded24e69ca0c057cd4bd00096213bf8bad83ab50de4bdcb4977f4d3d1ca73f388ab361e3a2075df55259adf7453e3483e92e
-
Filesize
150KB
MD5d9a8355806fdbb48767768144949d737
SHA1e06a13e7fba89aff634ad20f1b99822611d38ee7
SHA256a415c606c79f484e1e37a88bac3f09f130db33a0cb08d1bef3122cb74f13bdb5
SHA512040ddafc8eb0c0e7e3858fae579baf831ba35afd91463733dcc211e0f62b3cd1ce9ed1b0c1046573e2936943a8db896ad8cb404a56306f07ff2efe0bbcf304ba