Analysis
-
max time kernel
151s -
max time network
61s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
21-08-2020 05:58
Static task
static1
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
payload.exe
Resource
win10
General
-
Target
payload.exe
-
Size
92KB
-
MD5
23225afa88a61b262ee6bfe8a0b0b9bb
-
SHA1
a360d8a90f35299dd37232ed9a1b7ac284e06e32
-
SHA256
a49742e72ca26d37e26962ba7f2d929b87ddb6ce07f3304f78e9af499b226281
-
SHA512
470898ca49f36928625d34878b9362193fa4a1051ef4a0e001dc325f71700d22366d66f781290930a9dcbc75d33b939e676342e7be5d95ee5c5bbefe9c92bf6d
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
payload.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\MoveAssert.tiff payload.exe -
Drops startup file 5 IoCs
Processes:
payload.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta payload.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
payload.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload.exe = "C:\\Windows\\System32\\payload.exe" payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" payload.exe -
Drops desktop.ini file(s) 77 IoCs
Processes:
payload.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\desktop.ini payload.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\G9Q5MRQ4\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini payload.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-403932158-3302036622-1224131197-1000\desktop.ini payload.exe File opened for modification C:\Program Files (x86)\desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini payload.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini payload.exe File opened for modification C:\Users\Public\Music\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini payload.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini payload.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini payload.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C6XW8L4H\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini payload.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini payload.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QIP5FJKD\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\UBDEWKGM\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B3YTGAQ5\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini payload.exe File opened for modification C:\Users\Public\Documents\desktop.ini payload.exe File opened for modification C:\Users\Public\Videos\desktop.ini payload.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini payload.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini payload.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4AO3J8KQ\desktop.ini payload.exe File opened for modification C:\Users\Public\Pictures\desktop.ini payload.exe File opened for modification C:\Program Files\desktop.ini payload.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini payload.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini payload.exe File opened for modification C:\Users\Admin\Links\desktop.ini payload.exe File opened for modification C:\Users\Public\Desktop\desktop.ini payload.exe File opened for modification C:\Users\Public\Libraries\desktop.ini payload.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25G6S1M0\desktop.ini payload.exe File opened for modification C:\Users\Admin\Documents\desktop.ini payload.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini payload.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini payload.exe File opened for modification C:\Users\Public\Downloads\desktop.ini payload.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini payload.exe File opened for modification C:\Users\Admin\Videos\desktop.ini payload.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI payload.exe -
Drops file in System32 directory 2 IoCs
Processes:
payload.exedescription ioc process File created C:\Windows\System32\payload.exe payload.exe File created C:\Windows\System32\Info.hta payload.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe -
Drops file in Program Files directory 27849 IoCs
Processes:
payload.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-sa.xml.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Belize payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\CST6 payload.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libwasapi_plugin.dll payload.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\THEMES14\SUMIPNTG\PREVIEW.GIF payload.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Noronha payload.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_a52_plugin.dll.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0199307.WMF.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue.css payload.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libadaptive_plugin.dll.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0217302.WMF.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\HEADER.GIF.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Microsoft Office\Office14\PUBWIZ\BANNER.XML.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\FORM.DLL.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\VERSION.txt.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kabul.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jre7\bin\hprof.dll.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\SO02790_.WMF.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\CAGCAT10\J0149407.WMF payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\DGCHKBRD.DPV payload.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\VSTAProject.dll.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-awt_zh_CN.jar.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\decora-sse.dll.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14654_.GIF.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files (x86)\Google\Chrome\Application\84.0.4147.89\Locales\bn.pak.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\TWORIENT.DLL payload.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0153091.WMF payload.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\librawdv_plugin.dll.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_ja_4.4.0.v20140623020002.jar.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\LICENSE payload.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0382954.JPG payload.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PH02740U.BMP.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_settings.png payload.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.STC.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe payload.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\BD08868_.WMF payload.exe File opened for modification C:\Program Files\Microsoft Office\Templates\1033\Access\DataType\Payment Type.accft.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\NEWS98.POC.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Java\jdk1.7.0_80\include\jdwpTransport.h.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Helsinki.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\CMNTY_01.MID.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14583_.GIF.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Groove.en-us\GrooveMUI.XML payload.exe File created C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0146142.JPG.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\libdirect3d9_filters_plugin.dll.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Java\jre7\bin\unpack.dll.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\XLINTL32.REST.IDX_DLL payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\TAB_ON.GIF.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\vlc.mo.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\FLYER.XML.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSSOAP30.DLL.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-actions.xml.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Java\jre7\lib\deploy\messages_zh_HK.properties.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT+2.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\POWERPNT.DEV_F_COL.HXK.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\verify.dll payload.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\MANIFEST.MF payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\FORMS\1033\SCDRESTS.ICO.id-11FD4B2A.[[email protected]].credo payload.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Acrofx32.dll.id-11FD4B2A.[[email protected]].credo payload.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\computericonMask.bmp payload.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21294_.GIF.id-11FD4B2A.[[email protected]].credo payload.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2028 vssadmin.exe 1776 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 287 IoCs
Processes:
payload.exepid process 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe 1456 payload.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1792 vssvc.exe Token: SeRestorePrivilege 1792 vssvc.exe Token: SeAuditPrivilege 1792 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
payload.execmd.execmd.exedescription pid process target process PID 1456 wrote to memory of 1520 1456 payload.exe cmd.exe PID 1456 wrote to memory of 1520 1456 payload.exe cmd.exe PID 1456 wrote to memory of 1520 1456 payload.exe cmd.exe PID 1456 wrote to memory of 1520 1456 payload.exe cmd.exe PID 1520 wrote to memory of 1700 1520 cmd.exe mode.com PID 1520 wrote to memory of 1700 1520 cmd.exe mode.com PID 1520 wrote to memory of 1700 1520 cmd.exe mode.com PID 1520 wrote to memory of 1776 1520 cmd.exe vssadmin.exe PID 1520 wrote to memory of 1776 1520 cmd.exe vssadmin.exe PID 1520 wrote to memory of 1776 1520 cmd.exe vssadmin.exe PID 1456 wrote to memory of 1968 1456 payload.exe cmd.exe PID 1456 wrote to memory of 1968 1456 payload.exe cmd.exe PID 1456 wrote to memory of 1968 1456 payload.exe cmd.exe PID 1456 wrote to memory of 1968 1456 payload.exe cmd.exe PID 1968 wrote to memory of 1996 1968 cmd.exe mode.com PID 1968 wrote to memory of 1996 1968 cmd.exe mode.com PID 1968 wrote to memory of 1996 1968 cmd.exe mode.com PID 1968 wrote to memory of 2028 1968 cmd.exe vssadmin.exe PID 1968 wrote to memory of 2028 1968 cmd.exe vssadmin.exe PID 1968 wrote to memory of 2028 1968 cmd.exe vssadmin.exe PID 1456 wrote to memory of 1984 1456 payload.exe mshta.exe PID 1456 wrote to memory of 1984 1456 payload.exe mshta.exe PID 1456 wrote to memory of 1984 1456 payload.exe mshta.exe PID 1456 wrote to memory of 1984 1456 payload.exe mshta.exe PID 1456 wrote to memory of 1212 1456 payload.exe mshta.exe PID 1456 wrote to memory of 1212 1456 payload.exe mshta.exe PID 1456 wrote to memory of 1212 1456 payload.exe mshta.exe PID 1456 wrote to memory of 1212 1456 payload.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\payload.exe"C:\Users\Admin\AppData\Local\Temp\payload.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1700
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1776
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1996
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2028
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:1984
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:1212
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1792