Analysis
-
max time kernel
301s -
max time network
48s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
23-05-2020 10:56
Static task
static1
Behavioral task
behavioral1
Sample
winhost.exe
Resource
win7v200430
General
-
Target
winhost.exe
-
Size
92KB
-
MD5
76b83b0d11d4a0fdcc27402d4a6962a4
-
SHA1
e8220fbddce054bfd537b622e66fe73e84a72609
-
SHA256
3ff9b0171c038ce75606e7f5916e52b752924a1d6f093b5ab50bfd2cd57c646f
-
SHA512
61147a4e923ba5cd79ba7feeb2df05cdd274d6ef72435c9a3e7e8fbd2748385caaf59747f85ad6cab608408edb034c2c009d3d63fc2748bf77d67712c8a2f09f
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1648 vssvc.exe Token: SeRestorePrivilege 1648 vssvc.exe Token: SeAuditPrivilege 1648 vssvc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
mshta.exemshta.exeNOTEPAD.EXEpid process 2012 mshta.exe 1112 mshta.exe 1744 NOTEPAD.EXE -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Program Files directory 27778 IoCs
Processes:
winhost.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\Office14\PAGESIZE\PGMN054.XML.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.commands.nl_ja_4.4.0.v20140623020002.jar.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-dialogs.jar.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee.dll.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePageScript.js.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\UninstallPop.vsdm winhost.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libextract_plugin.dll.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0341551.JPG.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR7F.GIF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files (x86)\Google\Chrome\Application\81.0.4044.129\Locales\fil.pak.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.WorkflowServices.dll winhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONLNTCOMLIB.DLL.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.ui_5.5.0.165303.jar.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GreenTea.css.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\Office14\PROOF\MSSP7EN.dub.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html winhost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\NAVBRPH1.POC winhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pmd.cer winhost.exe File created C:\Program Files\Common Files\Microsoft Shared\THEMES14\QUAD\PREVIEW.GIF.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\Office14\ADDINS\MSSPC.ECF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabimp.dll winhost.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\MEDIA\CAGCAT10\J0293828.WMF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10297_.GIF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_down.png winhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Tahiti.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\Office14\FORMS\1033\IPMS.ICO.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\1033\README.HTM.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\AN01173_.WMF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Windows Mail\wabfind.dll winhost.exe File created C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\tab_off.gif.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\clearkey.dll.sig.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\Document Themes 14\Theme Fonts\Clarity.xml.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PE00489_.WMF.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT+1.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME11.CSS winhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v10.0.dll winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\default.jfc.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0384888.JPG winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0386270.JPG.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolBMPs\StopIconMask.bmp.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev-down.png winhost.exe File opened for modification C:\Program Files\Java\jre7\bin\installer.dll.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Java\jre7\bin\deploy.dll.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\Office14\1033\MSOUC_F_COL.HXK.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkServerCP winhost.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_zh_TW.properties.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21339_.GIF winhost.exe File created C:\Program Files\Common Files\Microsoft Shared\THEMES14\AFTRNOON\THMBNAIL.PNG.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\release.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PSWAVY.WMF winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\SL00345_.WMF winhost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\ONBttnPPT.dll.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Program Files\Microsoft Office\Office14\PUBWIZ\DGBORDER.DPV.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0107328.WMF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prcr.x3d.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\THEMES14\RICEPAPR\PREVIEW.GIF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\SO00170_.WMF.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcanvas_plugin.dll winhost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonDown_Off.png winhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Accra.id-675BFBF3.[[email protected]].payB winhost.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1556 vssadmin.exe 2020 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 581 IoCs
Processes:
winhost.exepid process 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe 1304 winhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
winhost.exedescription pid process target process PID 1304 wrote to memory of 1308 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1308 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1308 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1308 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1984 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1984 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1984 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1984 1304 winhost.exe cmd.exe PID 1304 wrote to memory of 1112 1304 winhost.exe mshta.exe PID 1304 wrote to memory of 1112 1304 winhost.exe mshta.exe PID 1304 wrote to memory of 1112 1304 winhost.exe mshta.exe PID 1304 wrote to memory of 1112 1304 winhost.exe mshta.exe PID 1304 wrote to memory of 2012 1304 winhost.exe mshta.exe PID 1304 wrote to memory of 2012 1304 winhost.exe mshta.exe PID 1304 wrote to memory of 2012 1304 winhost.exe mshta.exe PID 1304 wrote to memory of 2012 1304 winhost.exe mshta.exe -
Drops file in System32 directory 2 IoCs
Processes:
winhost.exedescription ioc process File created C:\Windows\System32\winhost.exe winhost.exe File created C:\Windows\System32\Info.hta winhost.exe -
Adds Run entry to start application 2 TTPs 3 IoCs
Processes:
winhost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winhost.exe = "C:\\Windows\\System32\\winhost.exe" winhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" winhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" winhost.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe -
Drops desktop.ini file(s) 77 IoCs
Processes:
winhost.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini winhost.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini winhost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XGJ27KX4\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini winhost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini winhost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini winhost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\IQD6DIKV\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OT4YD26O\desktop.ini winhost.exe File opened for modification C:\Users\Public\Videos\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini winhost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini winhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ZDAW0I3Y\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini winhost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\LUBVL9MG\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini winhost.exe File opened for modification C:\Program Files\desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini winhost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini winhost.exe File opened for modification C:\Users\Public\Music\desktop.ini winhost.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-910373003-3952921535-3480519689-1000\desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Links\desktop.ini winhost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini winhost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini winhost.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini winhost.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini winhost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini winhost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\5Q8AAMSB\desktop.ini winhost.exe File opened for modification C:\Users\Public\Documents\desktop.ini winhost.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini winhost.exe File opened for modification C:\Program Files (x86)\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1IGGBW8Z\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini winhost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini winhost.exe File opened for modification C:\Users\Public\Downloads\desktop.ini winhost.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini winhost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\557LH6Z9\desktop.ini winhost.exe -
Drops startup file 5 IoCs
Processes:
winhost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winhost.exe winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini winhost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-675BFBF3.[[email protected]].payB winhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-675BFBF3.[[email protected]].payB winhost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta winhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\winhost.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Adds Run entry to start application
- Drops desktop.ini file(s)
- Drops startup file
PID:1304 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:1308
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1092
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1556
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:1984
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1936
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2020
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Suspicious use of FindShellTrayWindow
- Modifies Internet Explorer settings
PID:1112
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Suspicious use of FindShellTrayWindow
- Modifies Internet Explorer settings
PID:2012
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:1648
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FILES ENCRYPTED.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:1744