Analysis
-
max time kernel
150s -
max time network
67s -
platform
windows7_x64 -
resource
win7 -
submitted
17-06-2020 12:52
Static task
static1
Behavioral task
behavioral1
Sample
archive.exe
Resource
win7
Behavioral task
behavioral2
Sample
archive.exe
Resource
win10v200430
General
-
Target
archive.exe
-
Size
92KB
-
MD5
6b873b618cc8ee379862d1709e862780
-
SHA1
2b514deefde860afab8c0418bb40ccc54f03cd5e
-
SHA256
880207fb1e6f801d59d06208b8e37271c877bea94821fbf2883c6d70558fe587
-
SHA512
e6164b415cf2ae8e5d4f0ae14473bf66f61c22ff0992b7eed757362adef6707ca2c7f05a3a91e51971cff71223941c4101d8aae672d0daaa4f19d3117036d025
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
Signatures
-
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Drops startup file 5 IoCs
Processes:
archive.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\archive.exe archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini archive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-C8443264.[[email protected]].base archive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta archive.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1964 vssvc.exe Token: SeRestorePrivilege 1964 vssvc.exe Token: SeAuditPrivilege 1964 vssvc.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
archive.exedescription pid process target process PID 1684 wrote to memory of 1796 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1796 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1796 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1796 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1588 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1588 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1588 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1588 1684 archive.exe cmd.exe PID 1684 wrote to memory of 1508 1684 archive.exe mshta.exe PID 1684 wrote to memory of 1508 1684 archive.exe mshta.exe PID 1684 wrote to memory of 1508 1684 archive.exe mshta.exe PID 1684 wrote to memory of 1508 1684 archive.exe mshta.exe PID 1684 wrote to memory of 1460 1684 archive.exe mshta.exe PID 1684 wrote to memory of 1460 1684 archive.exe mshta.exe PID 1684 wrote to memory of 1460 1684 archive.exe mshta.exe PID 1684 wrote to memory of 1460 1684 archive.exe mshta.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
mshta.exemshta.exeNOTEPAD.EXEpid process 1508 mshta.exe 1460 mshta.exe 1360 NOTEPAD.EXE -
Drops file in System32 directory 2 IoCs
Processes:
archive.exedescription ioc process File created C:\Windows\System32\archive.exe archive.exe File created C:\Windows\System32\Info.hta archive.exe -
Drops desktop.ini file(s) 77 IoCs
Processes:
archive.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini archive.exe File opened for modification C:\Users\Admin\Music\desktop.ini archive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini archive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini archive.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini archive.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini archive.exe File opened for modification C:\Program Files (x86)\desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini archive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini archive.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini archive.exe File opened for modification C:\Users\Public\Videos\desktop.ini archive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GVV7BJHB\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OLSU73OI\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini archive.exe File opened for modification C:\Users\Public\Documents\desktop.ini archive.exe File opened for modification C:\Program Files\desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini archive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini archive.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1MJ70CPH\desktop.ini archive.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini archive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini archive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1131729243-447456001-3632642222-1000\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AJM03J3Y\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ZMLBLRQ7\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini archive.exe File opened for modification C:\Users\Admin\Searches\desktop.ini archive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini archive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini archive.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini archive.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\TGVUK4BG\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini archive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini archive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini archive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini archive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini archive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini archive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini archive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini archive.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini archive.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini archive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini archive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI archive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini archive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RBDIK06K\desktop.ini archive.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Adds Run entry to start application 2 TTPs 3 IoCs
Processes:
archive.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\archive.exe = "C:\\Windows\\System32\\archive.exe" archive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" archive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" archive.exe -
Suspicious behavior: EnumeratesProcesses 288 IoCs
Processes:
archive.exepid process 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe 1684 archive.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1940 vssadmin.exe 1320 vssadmin.exe -
Drops file in Program Files directory 27839 IoCs
Processes:
archive.exedescription ioc process File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0107146.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\ACTIP10.HLP archive.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\vlc.mo.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Windows Media Player\en-US\setup_wm.exe.mui archive.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\plugin.properties.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\SO00191_.WMF archive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.Office.Tools.v9.0.dll archive.exe File opened for modification C:\Program Files\Java\jre7\Welcome.html.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\com.jrockit.mc.rcp.product_root_5.5.0.165303.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerActions.exsd.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help_3.6.0.v20130326-1254.jar.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-overlay.png archive.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml archive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\ACCDDSLM.DLL.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\CalendarViewButtonImages.jpg.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\Document Themes 14\Theme Fonts\Origin.xml archive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME43.CSS.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormToolImages.jpg archive.exe File created C:\Program Files\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02073_.GIF.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\Microsoft Office\MEDIA\CAGCAT10\J0299587.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\UndoMerge.wma archive.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Client.dll archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\AG00057_.GIF archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\DD01151_.WMF archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins_1.1.200.v20131119-0908.jar archive.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libchorus_flanger_plugin.dll.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861261279.profile.gz.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guyana archive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_flac_plugin.dll.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\MST7MDT.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench_1.1.0.v20140512-1820.jar archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\HH02313_.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0105360.WMF.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libcc_plugin.dll.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0301418.WMF archive.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18190_.WMF archive.exe File created C:\Program Files\Microsoft Office\Templates\1033\EssentialLetter.dotx.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0099150.JPG.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\TN00246_.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\HEADER.GIF.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Chuuk.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Midway.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0106208.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0390072.JPG archive.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\CAGCAT10\J0195812.WMF archive.exe File created C:\Program Files\VideoLAN\VLC\skins\default.vlt.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif archive.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\AN00932_.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\NA00525_.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\sqlceoledb35.dll archive.exe File created C:\Program Files\Java\jre7\lib\images\cursors\invalid32x32.gif.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_ja_4.4.0.v20140623020002.jar archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0151047.WMF.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0214948.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_ja_4.4.0.v20140623020002.jar.id-C8443264.[[email protected]].base archive.exe File created C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115868.GIF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\DGREPFRM.DPV archive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\toc.gif archive.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+8.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0185780.WMF.id-C8443264.[[email protected]].base archive.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Monrovia archive.exe File opened for modification C:\Program Files\Microsoft Office\Document Themes 14\Theme Fonts\Essential.xml archive.exe File created C:\Program Files\Microsoft Office\Office14\FORMS\1033\SCDCNCLL.ICO.id-C8443264.[[email protected]].base archive.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\archive.exe"C:\Users\Admin\AppData\Local\Temp\archive.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Drops desktop.ini file(s)
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
- Drops file in Program Files directory
PID:1684 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:1796
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1924
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1940
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:1588
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:852
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1320
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1508
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:1460
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:1964
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\FILES ENCRYPTED.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:1360