Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe
Resource
win10v2004-20241007-en
General
-
Target
43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe
-
Size
174KB
-
MD5
7f0312a1f928c3aeab672ca8d5afc6a9
-
SHA1
efb367a61cb29e63a7269765c6071005a643a55d
-
SHA256
43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4
-
SHA512
854592111580d11597824a16b2d62ad313cf4ecdd2329cd9b333f2e3185f4cd21b16164f2e2330e3c5ecf5184471266528fa38d059920b900a32528f40bebcf6
-
SSDEEP
3072:+yvWCxfzdNRvpEAdS3rDkALwlYu8+IFMyXJVlRGa5JJ5SU:NvWCxfz0gS7oczu8+IdXJVvbSU
Malware Config
Extracted
C:\Program Files\DVD Maker\de-DE\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?85C01E35FD24495CDA0E673D14ED22C0
http://lockbitks2tvnmwk.onion/?85C01E35FD24495CDA0E673D14ED22C0
Extracted
C:\Users\Admin\Desktop\LockBit-note.hta
http://lockbit-decryptor.top/?85C01E35FD24495CDA0E673D14ED22C0
http://lockbitks2tvnmwk.onion/?85C01E35FD24495CDA0E673D14ED22C0
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2908 bcdedit.exe 2708 bcdedit.exe -
Renames multiple (9364) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2956 wbadmin.exe -
Deletes itself 1 IoCs
pid Process 408 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe\"" 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\Users\\Admin\\Desktop\\LockBit-note.hta" 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\79D1.tmp.bmp" 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00260_.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLMACRO.CHM 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactLow.jpg 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryNewsletter.dotx 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.SF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\controllers.js 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\Informix.xsl 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\library.js 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309904.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GRINTL32.REST.IDX_DLL 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\ResourceInternal.zip 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Darwin 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_zh_CN.jar 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-charts.jar 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Campo_Grande 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\Restore-My-Files.txt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187881.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299611.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18194_.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jre7\lib\currency.data 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Glace_Bay 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\Restore-My-Files.txt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXT 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DiscussionToolIconImages.jpg 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpEvMsg.dll.mui 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-crescent_partly-cloudy.png 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00723_.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS.HXS 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setEmbeddedCP 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata_5.5.0.165303.jar 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02115_.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304371.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\ChessIconImagesMask.bmp 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_Groove.gif 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\Restore-My-Files.txt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\back_lrg.png 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme_0.9.300.v20140424-2042.jar 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\MoreGames.dll.mui 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_COL.HXT 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR29F.GIF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0212701.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_divider_left.png 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01657_.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341634.JPG 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMIMEE.CFG 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Contacts.accdt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Minsk 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\Restore-My-Files.txt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.metadataprovider.exsd 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08758_.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\settings.css 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\Restore-My-Files.txt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CROATIAN.TXT 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387591.JPG 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_SelectionSubpicture.png 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Apia 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File created C:\Program Files\Microsoft Games\More Games\es-ES\Restore-My-Files.txt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\Restore-My-Files.txt 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE05710_.WMF 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\localizedSettings.css 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe File opened for modification C:\Program Files\Java\jre7\lib\jsse.jar 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 408 cmd.exe 1360 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3024 vssadmin.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\WallpaperStyle = "2" 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\TileWallpaper = "0" 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEA84A01-D316-11EF-9B6B-D681211CE335} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEAD0CC1-D316-11EF-9B6B-D681211CE335} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443089879" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b090cb9a2367db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000022fa0354091c464b8cda8a3b96b3686b00000000020000000000106600000001000020000000403693912162863979df64d7371cc1f5078fceb3bbd903271a44b62e7c44c8c7000000000e8000000002000020000000a9b05c56147ba51293144fab2d0c42119974feb6ab6b1f14ec22657c34c94372200000007c395b181d0ef201d852702a7c939b0df68f91ae9f9edc1ee7aed385da43e03540000000e555341867b206e303083b752e95b1b97f79b2955779cf0c4a5ef8c43f2d723580f269fd08d88a66ebdfd3ef4d464b593cbeb2e3c18f69befc980ff2404b5f78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1360 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe Token: SeDebugPrivilege 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe Token: SeBackupPrivilege 2824 vssvc.exe Token: SeRestorePrivilege 2824 vssvc.exe Token: SeAuditPrivilege 2824 vssvc.exe Token: SeIncreaseQuotaPrivilege 916 WMIC.exe Token: SeSecurityPrivilege 916 WMIC.exe Token: SeTakeOwnershipPrivilege 916 WMIC.exe Token: SeLoadDriverPrivilege 916 WMIC.exe Token: SeSystemProfilePrivilege 916 WMIC.exe Token: SeSystemtimePrivilege 916 WMIC.exe Token: SeProfSingleProcessPrivilege 916 WMIC.exe Token: SeIncBasePriorityPrivilege 916 WMIC.exe Token: SeCreatePagefilePrivilege 916 WMIC.exe Token: SeBackupPrivilege 916 WMIC.exe Token: SeRestorePrivilege 916 WMIC.exe Token: SeShutdownPrivilege 916 WMIC.exe Token: SeDebugPrivilege 916 WMIC.exe Token: SeSystemEnvironmentPrivilege 916 WMIC.exe Token: SeRemoteShutdownPrivilege 916 WMIC.exe Token: SeUndockPrivilege 916 WMIC.exe Token: SeManageVolumePrivilege 916 WMIC.exe Token: 33 916 WMIC.exe Token: 34 916 WMIC.exe Token: 35 916 WMIC.exe Token: SeIncreaseQuotaPrivilege 916 WMIC.exe Token: SeSecurityPrivilege 916 WMIC.exe Token: SeTakeOwnershipPrivilege 916 WMIC.exe Token: SeLoadDriverPrivilege 916 WMIC.exe Token: SeSystemProfilePrivilege 916 WMIC.exe Token: SeSystemtimePrivilege 916 WMIC.exe Token: SeProfSingleProcessPrivilege 916 WMIC.exe Token: SeIncBasePriorityPrivilege 916 WMIC.exe Token: SeCreatePagefilePrivilege 916 WMIC.exe Token: SeBackupPrivilege 916 WMIC.exe Token: SeRestorePrivilege 916 WMIC.exe Token: SeShutdownPrivilege 916 WMIC.exe Token: SeDebugPrivilege 916 WMIC.exe Token: SeSystemEnvironmentPrivilege 916 WMIC.exe Token: SeRemoteShutdownPrivilege 916 WMIC.exe Token: SeUndockPrivilege 916 WMIC.exe Token: SeManageVolumePrivilege 916 WMIC.exe Token: 33 916 WMIC.exe Token: 34 916 WMIC.exe Token: 35 916 WMIC.exe Token: SeBackupPrivilege 1536 wbengine.exe Token: SeRestorePrivilege 1536 wbengine.exe Token: SeSecurityPrivilege 1536 wbengine.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1468 iexplore.exe 2652 iexplore.exe 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 1468 iexplore.exe 1468 iexplore.exe 2652 iexplore.exe 2652 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 572 IEXPLORE.EXE 572 IEXPLORE.EXE 876 IEXPLORE.EXE 876 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 200 IEXPLORE.EXE 200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2320 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 30 PID 1712 wrote to memory of 2320 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 30 PID 1712 wrote to memory of 2320 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 30 PID 1712 wrote to memory of 2320 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 30 PID 2320 wrote to memory of 3024 2320 cmd.exe 32 PID 2320 wrote to memory of 3024 2320 cmd.exe 32 PID 2320 wrote to memory of 3024 2320 cmd.exe 32 PID 2320 wrote to memory of 916 2320 cmd.exe 35 PID 2320 wrote to memory of 916 2320 cmd.exe 35 PID 2320 wrote to memory of 916 2320 cmd.exe 35 PID 2320 wrote to memory of 2908 2320 cmd.exe 37 PID 2320 wrote to memory of 2908 2320 cmd.exe 37 PID 2320 wrote to memory of 2908 2320 cmd.exe 37 PID 2320 wrote to memory of 2708 2320 cmd.exe 38 PID 2320 wrote to memory of 2708 2320 cmd.exe 38 PID 2320 wrote to memory of 2708 2320 cmd.exe 38 PID 2320 wrote to memory of 2956 2320 cmd.exe 39 PID 2320 wrote to memory of 2956 2320 cmd.exe 39 PID 2320 wrote to memory of 2956 2320 cmd.exe 39 PID 1712 wrote to memory of 1056 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 43 PID 1712 wrote to memory of 1056 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 43 PID 1712 wrote to memory of 1056 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 43 PID 1712 wrote to memory of 1056 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 43 PID 1712 wrote to memory of 408 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 44 PID 1712 wrote to memory of 408 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 44 PID 1712 wrote to memory of 408 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 44 PID 1712 wrote to memory of 408 1712 43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe 44 PID 408 wrote to memory of 1360 408 cmd.exe 46 PID 408 wrote to memory of 1360 408 cmd.exe 46 PID 408 wrote to memory of 1360 408 cmd.exe 46 PID 408 wrote to memory of 1360 408 cmd.exe 46 PID 408 wrote to memory of 2436 408 cmd.exe 47 PID 408 wrote to memory of 2436 408 cmd.exe 47 PID 408 wrote to memory of 2436 408 cmd.exe 47 PID 408 wrote to memory of 2436 408 cmd.exe 47 PID 1056 wrote to memory of 2652 1056 mshta.exe 48 PID 1056 wrote to memory of 2652 1056 mshta.exe 48 PID 1056 wrote to memory of 2652 1056 mshta.exe 48 PID 1056 wrote to memory of 2652 1056 mshta.exe 48 PID 2652 wrote to memory of 2300 2652 iexplore.exe 50 PID 2652 wrote to memory of 2300 2652 iexplore.exe 50 PID 2652 wrote to memory of 2300 2652 iexplore.exe 50 PID 2652 wrote to memory of 2300 2652 iexplore.exe 50 PID 1468 wrote to memory of 572 1468 iexplore.exe 51 PID 1468 wrote to memory of 572 1468 iexplore.exe 51 PID 1468 wrote to memory of 572 1468 iexplore.exe 51 PID 1468 wrote to memory of 572 1468 iexplore.exe 51 PID 2652 wrote to memory of 876 2652 iexplore.exe 52 PID 2652 wrote to memory of 876 2652 iexplore.exe 52 PID 2652 wrote to memory of 876 2652 iexplore.exe 52 PID 2652 wrote to memory of 876 2652 iexplore.exe 52 PID 2652 wrote to memory of 1684 2652 iexplore.exe 53 PID 2652 wrote to memory of 1684 2652 iexplore.exe 53 PID 2652 wrote to memory of 1684 2652 iexplore.exe 53 PID 2652 wrote to memory of 1684 2652 iexplore.exe 53 PID 2652 wrote to memory of 200 2652 iexplore.exe 55 PID 2652 wrote to memory of 200 2652 iexplore.exe 55 PID 2652 wrote to memory of 200 2652 iexplore.exe 55 PID 2652 wrote to memory of 200 2652 iexplore.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe"C:\Users\Admin\AppData\Local\Temp\43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3024
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2908
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2708
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:2956
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\LockBit-note.hta"2⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://lockbit-decryptor.top/?85C01E35FD24495CDA0E673D14ED22C03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:406530 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:603141 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:1782829 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:200
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe" & Del /f /q "C:\Users\Admin\AppData\Local\Temp\43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.7 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1360
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\43ced481e0f68fe57be3246cc5aede353c9d34f4e15d0afe443b5de9514d3ce4.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1636
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2080
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:572
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ac54d4842e810d857a60301e261dee4
SHA1984174bbfcc29ac5a3bacb2f1ac5d39c1f99244d
SHA256620294c441850da44eefbeefecf3ff5557046efc06de616c8231999289f6e71f
SHA512a532a77f14c0dfbf9678f1470e5c386221a4b45acf4ad210e3347e8f87bf930b8535f22089dbd0b099a5bb72ea2ba184834fad5f6982ce56d0bd093f1c7bed23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56344afc08639cd338152b88f3954c0
SHA1983ddab89378f729ebec19c7d611d270180f0523
SHA256b6e2801f1dbe4de299e9ac07a2c0a845e381d8750c876f40b99c60032cdbb957
SHA5122943a6d98e5587251d7265e577c50c7d6593772f2bf28349649309107db229c30d4c69865eab0800c5c1c41258f283f098f7ab7c945c15a6b545efa65f3e5292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6c01819f5a77c9ba60e84a839f682d
SHA1419397e074d5dac59ba81af56e0a97c81eb48ce5
SHA256e5dee6fd810e8a07c8a5910c6a9fab616ac1b2b9cf45c7b7eee1624cfd693dcf
SHA5128b0a37350ee986ce30d8fd37fc5da8723df357ccfc9ac03c9b793b74e7a5fa20fb1d1795f19c4e50af1063b274cd9011ad957cb4bc86e7b19bc9512e3ba206ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb6a5518d7502f85ddb4403127cf74b
SHA157236d9bb818dba74cda28763c6cca1e997beda7
SHA256d391040c29643176e0b5341743916268e2d94c3714b7f7c74dd232a92e4bf421
SHA512127245e4c83c5ad359101d66b1444b12a84053aa0a92e54c4c78c61ba1b041b930e1e3ea03123dfca32ee61841c34c42abc091d1b6e7023243327ece16a9b61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529850fb695294a32369a1bb8c1507099
SHA1a657ca03e59eb4259ff10cdc2e884d04e10c2cbd
SHA256b5302a6b6fb9d80862a9173c41d70508d8ff11d82e7460b14439c6a17e419408
SHA5127a5474a972d095aca0b736d33e5d7108fcdaa81fd362027c08e575e035ae9a78ed68e14ce63e8fca23f9fc9513f228919828974ba96519eda3a717e00d26aad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569014a2071372da9b3c1335357814466
SHA1c7da5dba71b60a63e239701f52dd80244deeb741
SHA256da39b43623efb38f5ef252c460a9259e00fda4009a7fef67abeabe8d04f22fde
SHA512e141fd3a0340da1a4ae2a610191673c4002526318e95c8f59f99b292684763dc8ac8848bbbef19c2574c5824631057f555291b24a327c4418923684c5404a1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120848b7a0b7992f71f8a99a371ce58f
SHA10b0ddaec1dd051bbe9939f08c1ba3f2a11cba646
SHA256b187a754b92618e904b165fa49ff4cbdc42a1a7637b877148c19499dc00aa93f
SHA512e29c1cd53a24b2c000b7f727da3c5896913195e8973d49d6741d34f53947de43da1b29f1ea325b04ec9203a2c2def43630d15d85bea6759d389f5ccea2c71030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f56dc4f4f2c64fa235aed9650d3deb7
SHA1d30b0dac0e3974dd8447725b2107e9a8a9f44889
SHA256034cf7de1b47ec34301e1b3ccc1e3ada758fde2cc6ca9b4bf5112ba595d5eec2
SHA512b5f13114ed8acfb911b5e1575a553d95681f67f33684fe8177e26799bd8c7fadef19d33f3984c8339d675e588685a77b7c556a858561d4920a9d641393f4c90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518fcd18dee879d7b20c02ecc65c0c54b
SHA1877718d04e99c60b9f3ef9978a2137291e572864
SHA256d9e5ab271e24528d5105b2298e8cc8d6bcf4ffda54ea2364980b24b482900a76
SHA512950a91a74bcae2cf6ddd68603a1512a5c8d4d337ad1edf2a4b238429d0eca05a1b11d38f4c208611057a62d64900670fbb60a658b35d4edb6640e9416348fab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5328d7722501fffa529d9a8348f7b32bb
SHA13a18b27b440dd62a1504b43c2ba298c95692e019
SHA256a249d34db5d91b3cab2f9be9f78de6e415e6d9808d500108c2a64a744009b0d8
SHA51272d28da41d6f64b1a1fa9f86a3291e4f6e8ed7d25af4a8eeda77fb30a830199bcbbb61c2093936c577204cfa0840e2e442d65ea6e13910bfcff0bacab11b8575
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BEA84A01-D316-11EF-9B6B-D681211CE335}.dat
Filesize5KB
MD560dee7dcc787d16d4e438076666c52e4
SHA1481d142d8d100d20f1c1682b02c1bb45a4e85686
SHA256ae1cf728d328fb625182f3233b4857f6cb8475954ed132dc7ad2be7c3bb31e43
SHA5121d78e23132af06327ed9700c2608768e1762424fc4321ab5f6f28e755ec2fabad3bb6b692a1de3c64192ac44c3edd2714283da130badc3772517f70a0eed19ce
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BEAD0CC1-D316-11EF-9B6B-D681211CE335}.dat
Filesize5KB
MD5451418266297f7012aea6dde6bc5a701
SHA1848248d30b13d69d841e2d85e5cfd51ccd7946ee
SHA25699e5a241cf530c3cd5a94c92d439cbbeab2b09947dbb6e933ea2df41966585d0
SHA512a3ea1149df83ac2e4a194318aefd4b212aaae268ab39140f27348f09bcb782ae1284b510c09c8ef7bbfb397b995795dc041a9e03e1bb4587e23c0859e5edead8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
17KB
MD5193094b4e82d108d93fd25f2ba295484
SHA199b656cab6aa5e12df192023caaac52196f77368
SHA256cfd0f3aa908b97cf03ffc52abbdf8a4f9f38c5c18cc5a869c6f9e40743087371
SHA512d61a7806923d31a94f290b2075acedc91f588cfdbee5e5f26140cf69798bd09787954364ef33c221640c1983006542d9fe3bae4d59238b23264a66695e1ec7b0