Overview
overview
10Static
static
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
7Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
9Ransomware...KB.exe
windows10-ltsc_2021-x64
9Ransomware...KB.ps1
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.msi
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Resubmissions
31/03/2025, 00:22
250331-apdw1ssjs8 1028/03/2025, 22:52
250328-2tfd7avl15 1025/03/2025, 14:57
250325-sb3mbsxxht 10Analysis
-
max time kernel
450s -
max time network
563s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
RansomwareSamples/Avaddon_09_06_2020_1054KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
RansomwareSamples/Avos_18_07_2021_403KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
RansomwareSamples/Babik_04_01_2021_31KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
RansomwareSamples/Babuk_20_04_2021_79KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
RansomwareSamples/BlackKingdom_23_03_2021_12460KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
RansomwareSamples/BlackMatter_02_08_2021_67KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral12
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral13
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral16
Sample
RansomwareSamples/MAKOP_27_10_2020_115KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral17
Sample
RansomwareSamples/MedusaLocker_24_04_2020_661KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral18
Sample
RansomwareSamples/MountLocker_20_11_2020_200KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral19
Sample
RansomwareSamples/Nefilim_31_08_2020_3061KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
RansomwareSamples/Nemty_03_02_2021_124KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral21
Sample
RansomwareSamples/NetWalker_19_10_2020_903KB.ps1
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral22
Sample
RansomwareSamples/Phoenix_29_03_2021_1930KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral23
Sample
RansomwareSamples/PwndLocker_04_03_2020_17KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral24
Sample
RansomwareSamples/Pysa_08_04_2021_500KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
RansomwareSamples/REvil_07_04_2021_121KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral26
Sample
RansomwareSamples/REvil_08_04_2021_121KB.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral27
Sample
RansomwareSamples/Ragnar_11_02_2020_40KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral28
Sample
RansomwareSamples/RansomEXX_14_12_2020_156KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral29
Sample
RansomwareSamples/Ranzy_20_11_2020_138KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
RansomwareSamples/Ryuk_21_03_2021_274KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral31
Sample
RansomwareSamples/Sekhmet_30_03_2020_364KB.msi
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral32
Sample
RansomwareSamples/Sodinokibi_04_07_2019_253KB.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
RansomwareSamples/Sekhmet_30_03_2020_364KB.msi
-
Size
364KB
-
MD5
15fc8a15e86c367586e3661b03bcab44
-
SHA1
a6a6f2dc244d75cac1509e46c7de88ff479b9ee6
-
SHA256
b2945f293ee3f68a97cc493774ff1e8818f104fb92ef9dbeead05a32fc7006ff
-
SHA512
cad4c868065a4715126a6e644c1fc1c5d9832e027f62f2f9370172e523fe7db63119871ba64977fc2f25959197a20f0e0e98bd66b2539eae7d46ded9d571436b
-
SSDEEP
6144:nj+vyxz9WYWqpkGbOAqMK/oVZUlz/F8GO53OuzZOJM7CQ5g//s4Y:j+wpWYkGA/WGUGO53OIZkh/Y
Malware Config
Extracted
C:\03dfe1345efb8ef72765da72\RECOVER-FILES.txt
sekhmet
http://o3n4bhhtybbtwqqs.onion/C3A1FCC184FA5B8C
https://sekhmet.top/C3A1FCC184FA5B8C
Signatures
-
Detected Egregor ransomware 1 IoCs
resource yara_rule behavioral31/files/0x00070000000281b6-30.dat family_egregor -
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Egregor family
-
Sekhmet Ransomware
Ransomware family active in the wild since early 2020.
-
Sekhmet family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e6189640.lnk MsiExec.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RECOVER-FILES.txt MsiExec.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\e6189640.lnk MsiExec.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RECOVER-FILES.txt MsiExec.exe -
Blocklisted process makes network request 21 IoCs
flow pid Process 3 2260 msiexec.exe 7 2260 msiexec.exe 9 2260 msiexec.exe 14 2260 msiexec.exe 33 5056 MsiExec.exe 43 5056 MsiExec.exe 54 5056 MsiExec.exe 55 5056 MsiExec.exe 56 5056 MsiExec.exe 57 5056 MsiExec.exe 61 5056 MsiExec.exe 62 5056 MsiExec.exe 63 5056 MsiExec.exe 64 5056 MsiExec.exe 69 5056 MsiExec.exe 70 5056 MsiExec.exe 71 5056 MsiExec.exe 72 5056 MsiExec.exe 73 5056 MsiExec.exe 74 5056 MsiExec.exe 75 5056 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\RECOVER-FILES.txt MsiExec.exe File created C:\Program Files (x86)\e6189640.lnk MsiExec.exe File created C:\Program Files (x86)\RECOVER-FILES.txt MsiExec.exe File created C:\Program Files\e6189640.lnk MsiExec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI8A1F.tmp msiexec.exe File created C:\Windows\e6189640.lnk MsiExec.exe File created C:\Windows\RECOVER-FILES.txt MsiExec.exe File created C:\Windows\Installer\e57886c.msi msiexec.exe File created C:\Windows\Installer\e57886a.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\e57886a.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{C83985AA-5954-4371-93EC-D6401824BA04} msiexec.exe -
Loads dropped DLL 1 IoCs
pid Process 5056 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2260 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 11 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MsiExec.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\SourceList\PackageName = "Sekhmet_30_03_2020_364KB.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RansomwareSamples\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\AA58938C4595173439CE6D048142AB40 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\SourceList\Media msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\RansomwareSamples\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\PackageCode = "59C25093E1ACBB04583341EE5612ED2D" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1E76332A20E11DA245E74BDFA261C70C msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\AA58938C4595173439CE6D048142AB40\ProductFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\ProductName = "KB Win May update" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1E76332A20E11DA245E74BDFA261C70C\AA58938C4595173439CE6D048142AB40 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\AA58938C4595173439CE6D048142AB40\DeploymentFlags = "3" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 6068 msiexec.exe 6068 msiexec.exe 5056 MsiExec.exe 5056 MsiExec.exe 5056 MsiExec.exe 5056 MsiExec.exe 5056 MsiExec.exe 5056 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2260 msiexec.exe Token: SeIncreaseQuotaPrivilege 2260 msiexec.exe Token: SeSecurityPrivilege 6068 msiexec.exe Token: SeCreateTokenPrivilege 2260 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2260 msiexec.exe Token: SeLockMemoryPrivilege 2260 msiexec.exe Token: SeIncreaseQuotaPrivilege 2260 msiexec.exe Token: SeMachineAccountPrivilege 2260 msiexec.exe Token: SeTcbPrivilege 2260 msiexec.exe Token: SeSecurityPrivilege 2260 msiexec.exe Token: SeTakeOwnershipPrivilege 2260 msiexec.exe Token: SeLoadDriverPrivilege 2260 msiexec.exe Token: SeSystemProfilePrivilege 2260 msiexec.exe Token: SeSystemtimePrivilege 2260 msiexec.exe Token: SeProfSingleProcessPrivilege 2260 msiexec.exe Token: SeIncBasePriorityPrivilege 2260 msiexec.exe Token: SeCreatePagefilePrivilege 2260 msiexec.exe Token: SeCreatePermanentPrivilege 2260 msiexec.exe Token: SeBackupPrivilege 2260 msiexec.exe Token: SeRestorePrivilege 2260 msiexec.exe Token: SeShutdownPrivilege 2260 msiexec.exe Token: SeDebugPrivilege 2260 msiexec.exe Token: SeAuditPrivilege 2260 msiexec.exe Token: SeSystemEnvironmentPrivilege 2260 msiexec.exe Token: SeChangeNotifyPrivilege 2260 msiexec.exe Token: SeRemoteShutdownPrivilege 2260 msiexec.exe Token: SeUndockPrivilege 2260 msiexec.exe Token: SeSyncAgentPrivilege 2260 msiexec.exe Token: SeEnableDelegationPrivilege 2260 msiexec.exe Token: SeManageVolumePrivilege 2260 msiexec.exe Token: SeImpersonatePrivilege 2260 msiexec.exe Token: SeCreateGlobalPrivilege 2260 msiexec.exe Token: SeBackupPrivilege 3404 vssvc.exe Token: SeRestorePrivilege 3404 vssvc.exe Token: SeAuditPrivilege 3404 vssvc.exe Token: SeBackupPrivilege 6068 msiexec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeTakeOwnershipPrivilege 6068 msiexec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeTakeOwnershipPrivilege 6068 msiexec.exe Token: SeBackupPrivilege 5060 srtasks.exe Token: SeRestorePrivilege 5060 srtasks.exe Token: SeSecurityPrivilege 5060 srtasks.exe Token: SeTakeOwnershipPrivilege 5060 srtasks.exe Token: SeBackupPrivilege 5060 srtasks.exe Token: SeRestorePrivilege 5060 srtasks.exe Token: SeSecurityPrivilege 5060 srtasks.exe Token: SeTakeOwnershipPrivilege 5060 srtasks.exe Token: SeDebugPrivilege 5056 MsiExec.exe Token: SeDebugPrivilege 5056 MsiExec.exe Token: SeDebugPrivilege 5056 MsiExec.exe Token: SeDebugPrivilege 5056 MsiExec.exe Token: SeDebugPrivilege 5056 MsiExec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeTakeOwnershipPrivilege 6068 msiexec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeTakeOwnershipPrivilege 6068 msiexec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeTakeOwnershipPrivilege 6068 msiexec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeTakeOwnershipPrivilege 6068 msiexec.exe Token: SeRestorePrivilege 6068 msiexec.exe Token: SeTakeOwnershipPrivilege 6068 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2260 msiexec.exe 2260 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 6068 wrote to memory of 5060 6068 msiexec.exe 87 PID 6068 wrote to memory of 5060 6068 msiexec.exe 87 PID 6068 wrote to memory of 5056 6068 msiexec.exe 89 PID 6068 wrote to memory of 5056 6068 msiexec.exe 89 PID 6068 wrote to memory of 5056 6068 msiexec.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Sekhmet_30_03_2020_364KB.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2260
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6068 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Users\Admin\AppData\Local\Temp\System Update\patch_may13869.dll"2⤵
- Drops startup file
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5495a111eb74024999b3c5e803c46620f
SHA10da4244712d6450caaa3606352d7afd976065a33
SHA256ce453fe0beaa3f164baa48390783bb64bb29957a90379222fab9dab7a2633089
SHA512000954d9636e1a88e59c6c0f6a29e3aee4b34ffce226be00621ce5941968cad53bb871be6776dd0ed6a20166b4e93aaf04a590afa20cbfb39de90a3dd2821787
-
Filesize
7KB
MD558fc3bbb1e82ce0690539bbd8ab72ddd
SHA15896939f23170d84e0aa4493cdf80b3ffe26d807
SHA25665fabba55b2c879a5b605325136934ff88a041e2bb020525db21c5dec3175c27
SHA51233a41111223ccd95c7bb1da846491de4f91d771d7b401f3175f9535574d3039bd0f021adaed1d46a8466bc9456f99ce6e827318f361a68704feda2dcf10254dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
Filesize2KB
MD540a50d86d67f59c010b2fb2260758b6f
SHA1cad7afcb7aa30182b9db0cb730596c586ffb279d
SHA2567e0b6aa0f0cb1c587d2ebafdd446eae5406ebeb10f3af85400ceb9096f9b12f9
SHA512f6fce4c62a4cf013711926589337e9dce99d5f65f4f0c895a63ea4896a8caea16f1cc21805e0245906b656a298a35f688553ce95186890a74270a73915bb01ee
-
Filesize
4KB
MD5c876fcebfd8d975bc96a0e0518ec100b
SHA14a23963d46dcf8bfa55af8f7d35c85e8f94bba37
SHA25612fe66a8443049edae11662c1fd7a7f361b5924e187e55641e37bbb2cdac7362
SHA5128b56324a84474744eacb83f6637a26e6e5e33cf15dce1d0b30401eb463bdd5b070173297face82aaad0978885987bdd63381e1d3d1b8091db4578d87abe6d5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD54a3a79c265b364a0926fe772bfc87230
SHA1be4357818887855ecfe262986b7783c5c487237d
SHA256bd2b055b9960d995dd6dfeb4ede435e5195b32d339c87873d85a3922408f1238
SHA51279e5ed31627bd72df03a107071af2aeecfd810c140cd0709d6b592488181711c44a52454b6a93d38c20484dcfc1d0111e893dc1ed50b24e3fbc55bb25a724745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D7833C286363AD25C70511661A83D581_0D5B85F46E0186BABAB24EA67895D7CA
Filesize526B
MD58420d236284dd7b66d3bbb523d7edd8c
SHA1134f1f017484f0ca5c528992b5b8885151d923d1
SHA2561c094758746a4e8822516d2ad664feef6e326f9d7264be1b623c617ce9746f3d
SHA512144749fe324b73e2e47eda5f65d68440e02cd4bd3a08868bf0c962b7f31cc7950943f8e71466b6e870e26a0570669932691d0a53a032258545d293c20c7fa57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
Filesize488B
MD53a5554abce026c05609889e383bdf911
SHA1bad3ea579adab7ee1e84c3e6a69d539c5e8ceec6
SHA2565ba2acdc02dc4e3d37df26dfd0fa10caec170bebf8d1ef69b9bdab829969a4bf
SHA512e244c840b4a4f9ff458f2fbf9732dde94472b09259e90b401dde4fc312cf4fbcb5a22ab4fd692563e044b240046c7fc4d1ae4e1f6bee9acb523dc75d6f998e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize608B
MD553a33c12931e62bce72de3b8a78a1e1c
SHA15f9d38e3e1d4c33e5911456ad8101dcb19f73ddd
SHA2566c1cf946b5e127ce6a84117a9ce749dcc58e952b24770cdcdc39afb5465d3361
SHA512851ef8dfd2c5b5efe96397bc4192b1845a4e74bef666545122dd70bf4bf95ceaaaef5009abcd22d784da3a08579c6dbab2cd55b3bdcaf5e26692c26839aadd71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize598B
MD51420a26a0406ddba3845231849847946
SHA13eb61b890bbe30f0e22cf4725fca08cb50e8c53c
SHA256aa8f2f68fa02f70f0814ee46840249c3ed18f80c6544017aae8dc86b1a88c23f
SHA5123327b701194179c51f2aa72fd482c2e41939a1bf0c65dc2981356502cf4c8cfb14e0a9e76f43fc8b4e7ef48eebc9ab649da162c29f2ae90ebea79bc3623ec3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5fa7dcc2beff5a812aa08a0495a0264f7
SHA166aec43cb8555854a2c5273944ce7eb25039b592
SHA256723caa9caf219d69637ca6caa6b9b9a7fe597c0e1226ff6109039a0174fb0bc3
SHA5129d0ac3972df8b9dc1e760fe452e460ee4e499c5fe275e598cd39074e3004910f5df56856cc1fa6ac5046d8131db6694a9960976c26b6d074c258470a7a852d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D7833C286363AD25C70511661A83D581_0D5B85F46E0186BABAB24EA67895D7CA
Filesize484B
MD53838cfe8daf52ef093ca11a0b4e10d3e
SHA12122f76fae9e5a4c07316ca1217b0d6a81fc7bf9
SHA256a8e4ce03dc452bba0563388559e3c549a674c6b6e966fea10f66bca4107682ce
SHA51272a3f44356ab48e300095c87ec2c951c61fdf3485ddf9f0628ca3a9cdf50a8c558e7423c541112e03d03eac0750ad907c2fc83fdb1e0aeda9cff533ab0f24807
-
Filesize
707KB
MD51343bd0e55191ff224f2a5d4b30cdf3b
SHA16412cbf10ac523452e051267afce4095d7f3d5ac
SHA256fceb299326ef4298a3c30e10b31d8c64f1369b182ac256d1eeaf148c1adcea8d
SHA512f3fcb8d1c89f463f2e73dadbf32afda7716c8c065990f3422fc2b5f10cb396a68ea6f711a0184989b83f474e660bc12fb47db60966011b1a18f84755571e9b9e
-
Filesize
364KB
MD515fc8a15e86c367586e3661b03bcab44
SHA1a6a6f2dc244d75cac1509e46c7de88ff479b9ee6
SHA256b2945f293ee3f68a97cc493774ff1e8818f104fb92ef9dbeead05a32fc7006ff
SHA512cad4c868065a4715126a6e644c1fc1c5d9832e027f62f2f9370172e523fe7db63119871ba64977fc2f25959197a20f0e0e98bd66b2539eae7d46ded9d571436b
-
Filesize
24.0MB
MD574d7d790ba8d9676104aa22e64dd8384
SHA1ca84a53c630371c76aba19fe8fbb2afcf3247d43
SHA2567a828615b0d8c79468d8ae72414982d09a2da5769ba407a81b77d10d611a0bf3
SHA512cd55028927d892832198b42d521755c26c7ae090982486c861a1997f19932cc19b71047b7dca8c6637db75998d53285e7b0232c78c180b70a604ed009feb6eda
-
\??\Volume{e6588854-0000-0000-0000-d08302000000}\System Volume Information\SPP\OnlineMetadataCache\{ccbdaf9d-8bce-4ddc-8fd7-40a105247bdc}_OnDiskSnapshotProp
Filesize6KB
MD558b3403a6e793f5b88508122d09b451b
SHA1f77a12cbb6b6543e5d821e690d4db23d7e1572ff
SHA25674878f20509b6ae8804eab34a7ed5fa51fe18d6d835ec9c767e7478870a36e98
SHA512fb7b5fe269b419de60bdd3e4097c73b74d2dabe67ed280c2f4c279aa8cb513e924cdf9a7aa2b503a904939ad4907e6c83771c618814bbb9e3a65d844a4c45374