Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
20-11-2020 18:41
Static task
static1
Behavioral task
behavioral1
Sample
21be39a453a79ef484ce58b901ba8386.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
21be39a453a79ef484ce58b901ba8386.exe
Resource
win10v20201028
General
-
Target
21be39a453a79ef484ce58b901ba8386.exe
-
Size
206KB
-
MD5
21be39a453a79ef484ce58b901ba8386
-
SHA1
2c38dc7aa29fa9e06902d964022495e1af9ab175
-
SHA256
42732ad450696b816913753fa9f53b52ac10922a1df1b5795693db77d532ffbc
-
SHA512
bd58cb596f6df702a955c3f8df5cff59417ae30560c3faed53edd010ec3ea6b464b795eca8e035a7b5ea94a2bd0158e5f8e555c666e515ed1315ac71022858f0
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
pexdatax@gmail.com
https://tox.chat/download.html
http://pexdatax.com/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
21be39a453a79ef484ce58b901ba8386.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RemoveStart.tiff 21be39a453a79ef484ce58b901ba8386.exe -
Drops startup file 5 IoCs
Processes:
21be39a453a79ef484ce58b901ba8386.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\21be39a453a79ef484ce58b901ba8386.exe 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 21be39a453a79ef484ce58b901ba8386.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
21be39a453a79ef484ce58b901ba8386.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\21be39a453a79ef484ce58b901ba8386.exe = "C:\\Windows\\System32\\21be39a453a79ef484ce58b901ba8386.exe" 21be39a453a79ef484ce58b901ba8386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 21be39a453a79ef484ce58b901ba8386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 21be39a453a79ef484ce58b901ba8386.exe -
Drops desktop.ini file(s) 77 IoCs
Processes:
21be39a453a79ef484ce58b901ba8386.exedescription ioc process File opened for modification C:\Users\Admin\Music\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RKGIF8TT\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F6QQJELO\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NXBH52U7\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Music\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AT22T7OH\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\F6O5NPVK\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\8DDKLDOL\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3825035466-2522850611-591511364-1000\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Documents\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M1AZJ0WQ\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Public\Videos\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D08RECS3\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 21be39a453a79ef484ce58b901ba8386.exe -
Drops file in System32 directory 2 IoCs
Processes:
21be39a453a79ef484ce58b901ba8386.exedescription ioc process File created C:\Windows\System32\Info.hta 21be39a453a79ef484ce58b901ba8386.exe File created C:\Windows\System32\21be39a453a79ef484ce58b901ba8386.exe 21be39a453a79ef484ce58b901ba8386.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe -
Drops file in Program Files directory 27847 IoCs
Processes:
21be39a453a79ef484ce58b901ba8386.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\sa-jdi.jar.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\gadget.xml 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUDGESCH.GIF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00160_.GIF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0292982.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Issues.accdt 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00833_.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUDIOSEARCHLTS.DLL.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator_2.0.0.v20131217-1203.jar 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151073.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll.sig.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\PREVIEW.GIF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0212701.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME11.CSS.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_LightSpirit.gif 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00426_.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\chrome.dll.sig 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEEXCH.DLL.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21302_.GIF 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\org-openide-filesystems_zh_CN.jar.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XPAGE3C.DLL.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\Management.cer.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEBPAGE.DPV 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-core.xml.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Windows Journal\jnwppr.dll 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-It.otf 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Johannesburg 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Anchorage.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Rothera.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DATE.JPG 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\simplexml.luac.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\libfloat_mixer_plugin.dll 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\HxRuntime.HxS.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\vlc.mo 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libau_plugin.dll.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Marketing Projects.accdt.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Tallinn 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files\Java\jre7\bin\fontmanager.dll.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Prague.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\17.png 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02897J.JPG.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\libvod_rtsp_plugin.dll.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libnsv_plugin.dll 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Windows Portable Devices\sqmapi.dll 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\handsafe.reg 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\validation.js.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsoundds.dll 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libdxva2_plugin.dll.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RSSITEMS.ICO 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02268_.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00097_.WMF 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msadox.dll 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341738.JPG.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\La_Rioja.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101856.BMP.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107258.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_Casual.gif.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR46B.GIF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_SlateBlue.gif 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-ui_zh_CN.jar 21be39a453a79ef484ce58b901ba8386.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00563_.WMF.id-1C138C2B.[pexdatax@gmail.com].ROGER 21be39a453a79ef484ce58b901ba8386.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1120 vssadmin.exe 584 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 247 IoCs
Processes:
21be39a453a79ef484ce58b901ba8386.exepid process 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe 1408 21be39a453a79ef484ce58b901ba8386.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 528 vssvc.exe Token: SeRestorePrivilege 528 vssvc.exe Token: SeAuditPrivilege 528 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
21be39a453a79ef484ce58b901ba8386.execmd.execmd.exedescription pid process target process PID 1408 wrote to memory of 1692 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1408 wrote to memory of 1692 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1408 wrote to memory of 1692 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1408 wrote to memory of 1692 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1692 wrote to memory of 544 1692 cmd.exe mode.com PID 1692 wrote to memory of 544 1692 cmd.exe mode.com PID 1692 wrote to memory of 544 1692 cmd.exe mode.com PID 1692 wrote to memory of 1120 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 1120 1692 cmd.exe vssadmin.exe PID 1692 wrote to memory of 1120 1692 cmd.exe vssadmin.exe PID 1408 wrote to memory of 1072 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1408 wrote to memory of 1072 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1408 wrote to memory of 1072 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1408 wrote to memory of 1072 1408 21be39a453a79ef484ce58b901ba8386.exe cmd.exe PID 1072 wrote to memory of 1300 1072 cmd.exe mode.com PID 1072 wrote to memory of 1300 1072 cmd.exe mode.com PID 1072 wrote to memory of 1300 1072 cmd.exe mode.com PID 1072 wrote to memory of 584 1072 cmd.exe vssadmin.exe PID 1072 wrote to memory of 584 1072 cmd.exe vssadmin.exe PID 1072 wrote to memory of 584 1072 cmd.exe vssadmin.exe PID 1408 wrote to memory of 820 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe PID 1408 wrote to memory of 820 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe PID 1408 wrote to memory of 820 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe PID 1408 wrote to memory of 820 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe PID 1408 wrote to memory of 1840 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe PID 1408 wrote to memory of 1840 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe PID 1408 wrote to memory of 1840 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe PID 1408 wrote to memory of 1840 1408 21be39a453a79ef484ce58b901ba8386.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21be39a453a79ef484ce58b901ba8386.exe"C:\Users\Admin\AppData\Local\Temp\21be39a453a79ef484ce58b901ba8386.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaMD5
a8c179ea1f83f3661f871a4459bbbd25
SHA1816d51f53b9d7a0ae9abe5673a2fad0f5fb04286
SHA256aa95fd2ee7c297dac532680801a864fa3e650991c032c56f2e73d37bff5b9ef5
SHA5127b286a346e468652bc2768a92b02da31837215c26541c1b88daba6bb49ef1c2962cafcd5a87a6767b728d7eee25bcc90532052a89ffb5d9c81043fcd6ac74cd6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaMD5
a8c179ea1f83f3661f871a4459bbbd25
SHA1816d51f53b9d7a0ae9abe5673a2fad0f5fb04286
SHA256aa95fd2ee7c297dac532680801a864fa3e650991c032c56f2e73d37bff5b9ef5
SHA5127b286a346e468652bc2768a92b02da31837215c26541c1b88daba6bb49ef1c2962cafcd5a87a6767b728d7eee25bcc90532052a89ffb5d9c81043fcd6ac74cd6
-
memory/544-3-0x0000000000000000-mapping.dmp
-
memory/584-7-0x0000000000000000-mapping.dmp
-
memory/820-8-0x0000000000000000-mapping.dmp
-
memory/1072-5-0x0000000000000000-mapping.dmp
-
memory/1120-4-0x0000000000000000-mapping.dmp
-
memory/1300-6-0x0000000000000000-mapping.dmp
-
memory/1400-12-0x000007FEF6680000-0x000007FEF68FA000-memory.dmpFilesize
2.5MB
-
memory/1408-0-0x00000000030FB000-0x00000000030FC000-memory.dmpFilesize
4KB
-
memory/1408-1-0x0000000004900000-0x0000000004911000-memory.dmpFilesize
68KB
-
memory/1692-2-0x0000000000000000-mapping.dmp
-
memory/1840-9-0x0000000000000000-mapping.dmp