Analysis
-
max time kernel
153s -
max time network
117s -
platform
windows10_x64 -
resource
win10 -
submitted
11-09-2020 08:09
Static task
static1
Behavioral task
behavioral1
Sample
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe
Resource
win10
General
-
Target
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe
-
Size
92KB
-
MD5
0f7b881710d62f6896870815380779e6
-
SHA1
608dcca2d67648f1bfb3e8711a1336a681f92b85
-
SHA256
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485
-
SHA512
250f5fdc196babccdae4e010802ce8f0e57b624e42057e0f58a7de75d925ab0d2055353225d914422325856cb9f23e1d7f540ee3760f156eccccab5acdf802d9
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\LimitResolve.tiff ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe -
Drops startup file 5 IoCs
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe = "C:\\Windows\\System32\\ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe" ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe -
Drops desktop.ini file(s) 70 IoCs
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exedescription ioc process File opened for modification C:\Program Files\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Searches\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu Places\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\Videos\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\Libraries\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Music\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\Music\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Links\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\Desktop\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Documents\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\Documents\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\Pictures\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Public\Downloads\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe -
Drops file in System32 directory 2 IoCs
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exedescription ioc process File created C:\Windows\System32\ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Windows\System32\Info.hta ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Drops file in Program Files directory 35189 IoCs
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgradient_plugin.dll.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\splashscreen.dll ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-bridge-office.xrm-ms ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Grace-ul-oob.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\example_icons2x.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ca-es\ui-strings.js.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Google\Chrome\Application\83.0.4103.106\VisualElements\SmallLogoDev.png.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\small\bow.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\nl-nl\ui-strings.js ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Subscription-ul-oob.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-ul-oob.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\css\main-selector.css ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\faf_icons.png.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\edit-pdf.png.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Google\Chrome\Application\83.0.4103.106\Locales\uk.pak.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ul-oob.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\da-dk\ui-strings.js ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\LargeTile.scale-125.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Jumbo\jumbo_background.jpg ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8fr.dub.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\System\MSCOMCTL.OCX.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\IpsPlugin.dll ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\CoreEngine\Data\BrushProfile\TrailMask.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\ui-strings.js.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.SapBwProvider.dll ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\hyph_en_CA.dic.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository.nl_zh_4.4.0.v20140623020002.jar.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Grace-ppd.xrm-ms ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\add-comment.png.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_x64__8wekyb3d8bbwe\Assets\OneConnectAppList.targetsize-32.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-oob.xrm-ms ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ro-ro\ui-strings.js.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-ul-oob.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-ul-oob.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluEmptyFolder_160.svg.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-40_altform-unplated.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTest-ppd.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PREVIEWTEMPLATE2.POTX ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\zip.dll ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\content-types.properties.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected].[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Assets\SkypeMedTile.scale-200_contrast-white.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-pl.xrm-ms.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\System.Web.Mvc.dll.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\AppStore_icon.svg.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\be_get.svg ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-180.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_CN_5.5.0.165303.jar.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\OutlookMailWideTile.scale-200.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\FDATE.DLL.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailLargeTile.scale-200.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.scale-200.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Office.PowerPivot.ExcelAddIn.tlb ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\main-selector.css ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pt-br\ui-strings.js.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\cstm_brand_preview2x.png.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Info.plist.id-15086144.[[email protected]].gold ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\1250_32x32x32.png ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1828 vssadmin.exe 1440 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 560 IoCs
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exepid process 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 192 vssvc.exe Token: SeRestorePrivilege 192 vssvc.exe Token: SeAuditPrivilege 192 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.execmd.execmd.exedescription pid process target process PID 3864 wrote to memory of 1644 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe cmd.exe PID 3864 wrote to memory of 1644 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe cmd.exe PID 1644 wrote to memory of 1608 1644 cmd.exe mode.com PID 1644 wrote to memory of 1608 1644 cmd.exe mode.com PID 1644 wrote to memory of 1828 1644 cmd.exe vssadmin.exe PID 1644 wrote to memory of 1828 1644 cmd.exe vssadmin.exe PID 3864 wrote to memory of 1760 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe cmd.exe PID 3864 wrote to memory of 1760 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe cmd.exe PID 1760 wrote to memory of 280 1760 cmd.exe mode.com PID 1760 wrote to memory of 280 1760 cmd.exe mode.com PID 1760 wrote to memory of 1440 1760 cmd.exe vssadmin.exe PID 1760 wrote to memory of 1440 1760 cmd.exe vssadmin.exe PID 3864 wrote to memory of 760 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe mshta.exe PID 3864 wrote to memory of 760 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe mshta.exe PID 3864 wrote to memory of 3092 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe mshta.exe PID 3864 wrote to memory of 3092 3864 ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe"C:\Users\Admin\AppData\Local\Temp\ad14312e134f8b9483b2d701b1470758e8944764ec803252efede6b1c49e9485.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1608
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1828
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:280
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1440
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:760
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:3092
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:192