Analysis
-
max time kernel
156s -
max time network
26s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
08-05-2020 12:36
Static task
static1
Behavioral task
behavioral1
Sample
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe
Resource
win10v200430
General
-
Target
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe
-
Size
92KB
-
MD5
8ebbfe0396d3442d9a5c61c9e81e95d3
-
SHA1
7c649065f043dd8e4cc15823f77342561da18258
-
SHA256
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30
-
SHA512
bbaf715a313d72f832e4a87268306c9a42a5e82065d1bab0282d94ceee93764c9fb419bc74f335baa014591db07b708813f3b19b738137b49c6a6550d89449ce
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
Signatures
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 556 vssadmin.exe 1296 vssadmin.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Drops file in System32 directory 1 IoCs
Processes:
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exedescription ioc process File created C:\Windows\System32\a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe -
Drops startup file 5 IoCs
Processes:
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Drops file in Program Files directory 27780 IoCs
Processes:
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exedescription ioc process File created C:\Program Files\7-Zip\Lang\zh-cn.txt.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcroppadd_plugin.dll.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\THEMES14\CANYON\CANYON.ELM.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-actions.xml.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\WITHCOMP.XML.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-dock.png a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Common Files\Microsoft Shared\THEMES14\CAPSULES\CAPSULES.ELM.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\THEMES14\REFINED\REFINED.INF a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\MEDIA\CAGCAT10\J0158007.WMF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0101980.WMF a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\NA01164_.WMF a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\ONBttnIE.dll a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PAGESIZE\PGLBL054.XML a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\NA01627_.WMF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Document Themes 14\Theme Effects\Slipstream.eftx.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonUp_On.png a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Rarotonga.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\BCSLaunch.dll a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\core_ja.jar a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-queries_ja.jar.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PE00489_.WMF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\CAGCAT10\J0298897.WMF a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-awt.xml.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\AG00164_.GIF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21296_.GIF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0107262.WMF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\OFFICE14\LINES\BD15184_.GIF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\PST8.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\FORMS\1033\TASKUPD.CFG a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files (x86)\Google\Update\1.3.35.452\goopdateres_de.dll.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TRANSLAT\MSB1XTOR.DLL a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\FD00459_.WMF a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\MEDIA\OFFICE14\LINES\BD21413_.GIF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImageMask.bmp.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\startNetworkServer.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\TN00241_.WMF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_left_disable.gif.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\LucidaSansRegular.ttf.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Regina a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\WB01219_.GIF a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\WHIRL1.WMF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\PUBSPAPR\PDIR45F.GIF a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libvnc_plugin.dll.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0382965.JPG a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\SO00017_.WMF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\DGAD.DPV a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files (x86)\Google\Chrome\Application\81.0.4044.129\VisualElements\LogoDev.png.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files (x86)\Google\Chrome\Application\81.0.4044.129\Locales\id.pak.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jetty.continuation_8.1.14.v20131031.jar.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\Templates\1033\BillingStatement.xltx.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\QRCode.pmp.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIE.dll.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Qatar.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text_3.5.300.v20130515-1451.jar a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-impl_ja.jar.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\sunmscapi.jar.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115835.GIF.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libsid_plugin.dll a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Windows Journal\en-US\PDIALOG.exe.mui a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler.xml a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0321179.JPG.id-15E80173.[[email protected]].NET a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 572 vssvc.exe Token: SeRestorePrivilege 572 vssvc.exe Token: SeAuditPrivilege 572 vssvc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 1 IoCs
Processes:
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe = "C:\\Windows\\System32\\a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe" a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe -
Drops desktop.ini file(s) 77 IoCs
Processes:
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exedescription ioc process File opened for modification C:\Users\Public\Downloads\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Videos\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Desktop\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OT4YD26O\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Links\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XGJ27KX4\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\LUBVL9MG\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1IGGBW8Z\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Libraries\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Videos\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\5Q8AAMSB\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Program Files (x86)\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\557LH6Z9\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Music\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-910373003-3952921535-3480519689-1000\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Music\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\IQD6DIKV\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ZDAW0I3Y\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Documents\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Suspicious behavior: EnumeratesProcesses 284 IoCs
Processes:
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exepid process 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exedescription pid process target process PID 1820 wrote to memory of 1832 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe PID 1820 wrote to memory of 1832 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe PID 1820 wrote to memory of 1832 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe PID 1820 wrote to memory of 1832 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe PID 1820 wrote to memory of 744 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe PID 1820 wrote to memory of 744 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe PID 1820 wrote to memory of 744 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe PID 1820 wrote to memory of 744 1820 a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe"C:\Users\Admin\AppData\Local\Temp\a91157219713de5c5e716be9a4e8196e24a822cbb3367fb28887d9460bf90d30.exe"1⤵
- Drops file in System32 directory
- Drops startup file
- Drops file in Program Files directory
- Adds Run entry to start application
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:1832
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:304
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:556
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:744
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1428
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1296
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:572