Overview
overview
10Static
static
10155eaec829...23.exe
windows7_x64
10155eaec829...23.exe
windows10_x64
108a68388787...97.exe
windows7_x64
108a68388787...97.exe
windows10_x64
109a9bf626d4...d6.exe
windows7_x64
109a9bf626d4...d6.exe
windows10_x64
10a9fb354944...06.exe
windows7_x64
10a9fb354944...06.exe
windows10_x64
10Analysis
-
max time kernel
135s -
max time network
37s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
01-07-2021 04:38
Behavioral task
behavioral1
Sample
155eaec829906d3b03ce5f8064200bcdb4023886816550dfd91bb5d20571df23.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
155eaec829906d3b03ce5f8064200bcdb4023886816550dfd91bb5d20571df23.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
9a9bf626d4a3e9afe613f7eaa347acac600de2aecc45a5706aa2ba386625eed6.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
9a9bf626d4a3e9afe613f7eaa347acac600de2aecc45a5706aa2ba386625eed6.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
a9fb354944ee5879b6e13381952889c604d850fe18ef552185a1c228b3bb3d06.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
a9fb354944ee5879b6e13381952889c604d850fe18ef552185a1c228b3bb3d06.exe
Resource
win10v20210410
General
-
Target
8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe
-
Size
208KB
-
MD5
7ee92bcaa1305c7964a993e7f1c3761c
-
SHA1
6351e156b5fe1d3ae91fec6eb367782b1373111c
-
SHA256
8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97
-
SHA512
3b5114e9b3e53ac7711df9fa5ad3dc66ce309ade04768cd334f1e1f1b311a9c36f43e6cf167d338e94116ee08dc686c0a000064a40bb2913e1e8b6b8b143c387
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\HOW TO DECRYPT FILES.txt
1DENGvxJZofU9BVfiScrgZHhhntJ3sAPSd
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Alcmeter = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yd0N5k3r1TF75n3.exe" 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe -
Drops desktop.ini file(s) 40 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BQE06QBJ\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AJ1NIV9I\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2MTLR0RV\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\93PHUZFG\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\XVLP3GFJ\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SLC8MVWU\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VLFEZDK1\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\MLS6OOW4\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15058_.GIF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR4B.GIF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_TexturedBlue.gif 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\msjet.xsl 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00103_.GIF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107528.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Trek.thmx 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AppConfig.zip 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext-disable.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\alertIcon.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jre7\README.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\CAN.WAV 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.renderers.swt.nl_ja_4.4.0.v20140623020002.jar 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk_1.0.300.v20140407-1803.jar 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151047.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\THMBNAIL.PNG 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR10F.GIF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\StarterNotificationDescriptors.xml 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_mid.gif 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-crescent.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\about.html 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02269_.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\settings.js 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\GostTitle.XSL 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\LISTBOX.JPG 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\HOW TO DECRYPT FILES.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\33.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18226_.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_Earthy.gif 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow.css 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\LightSpirit.css 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187819.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0240719.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\SPACER.GIF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsBrowserUpgrade.html 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\HOW TO DECRYPT FILES.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_zh_CN.jar 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Main.gif 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsHomePageStyle.css 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginReport.Dotx 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03143I.JPG 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115868.GIF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\HOW TO DECRYPT FILES.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\HOW TO DECRYPT FILES.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\HOW TO DECRYPT FILES.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\HOW TO DECRYPT FILES.txt 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02041_.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\background.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-compat.jar 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_right.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01297_.GIF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18242_.WMF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\de.pak 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\18.png 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1172 1220 WerFault.exe 17 -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF\DefaultIcon 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF\shell\open 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF\ = "CRYPTED!" 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yd0N5k3r1TF75n3.exe,0" 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF\shell\open\command 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF\shell 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ESDKZKDTQDWHAGF\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yd0N5k3r1TF75n3.exe" 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ZuCaNo 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ZuCaNo\ = "ESDKZKDTQDWHAGF" 8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1172 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1172 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe"C:\Users\Admin\AppData\Local\Temp\8a68388787a97c83448898eedb045f620f225538992467bae0ee5c1a1ca4dc97.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
PID:1996
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1220 -s 28281⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1172