Analysis
-
max time kernel
153s -
max time network
23s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30/08/2021, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe
Resource
win10v20210408
General
-
Target
5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe
-
Size
764KB
-
MD5
e3798c3bea835b99e994956acf3b942c
-
SHA1
ca247833b60a6043c6361e5772e1e6acf848de5d
-
SHA256
5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5
-
SHA512
be4cf342680d5f7ca50ce9228ad75f6deb2e14958395b2f0f754e90f1be8af6bae79753b74263eacf85df77680900a2245135dc15a093142be612c3d255b09f5
Malware Config
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NU1L7O13\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Music\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Links\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\H18KNA1T\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Documents\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Music\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\E9RC2MV6\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VNYR844D\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HNHPAZTY\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VFDYFLB4\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2455352368-1077083310-2879168483-1000\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\MET.GH5NWX5ePlnuhnUh2UcNVXVpniuavZMGg5BYHCqzvxE.hive 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Median.xml 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.xml 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-process-l1-1-0.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Windows Photo Viewer\PhotoAcq.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\msadco.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInAcrobat.gif 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01251_.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NextMenuButtonIcon.png 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt_0.11.101.v20140818-1343.jar.GH5NWX5ePlnuhnUh2UcNVX9pmyxmYJ1AaD6NNJEnUm8.hive 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Petersburg 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\VIEW.JS 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Recife.GH5NWX5ePlnuhnUh2UcNVXw1vUevFBNZZ1VSzvQlmnk.hive 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLJRNL.FAE 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Windows Sidebar\wlsrvc.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\CoolType.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00121_.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB_K_COL.HXK 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONMAIN.DLL 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.attributeTransformation.exsd.GH5NWX5ePlnuhnUh2UcNVWV61kFqXhln84SZ_wmb6lw.hive 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Program Files\VideoLAN\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libvc1_plugin.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00273_.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\SWBELL.NET.XML 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Sakhalin 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\icudt36.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02389_.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00820_.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSLM.DLL 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Vostok 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\CST6CDT 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090089.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\OliveGreen.css 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\ECHO.ELM 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00389_.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_dot.png 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-print.xml.GH5NWX5ePlnuhnUh2UcNVRKzC0w0JCtHVwXbBw8BJQQ.hive 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-profiling.jar 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\SPLASH.WAV 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.properties.GH5NWX5ePlnuhnUh2UcNVV1iADeMQH18MK6kCLBnUyM.hive 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libmmdevice_plugin.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195788.WMF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT.DLL 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.nl_zh_4.4.0.v20140623020002.jar 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME34.CSS 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\DVA.api 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST.GH5NWX5ePlnuhnUh2UcNVU6L1tp2JcNvNDYeuJgL3mw.hive 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.DEV_COL.HXT 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\settings.html 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\STRBRST.POC 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Onix32.dll 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115836.GIF 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\icon.png 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Reflection.Extensions\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Resources.ResourceManager\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Globalization\MCT\MCT-GB\RSSFeed\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\AppConfig\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\MUI\0409\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Providers\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v3.5\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Security\App_LocalResources\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Graphics\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security.resources\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Device\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.DSC.CoreConfProviders\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Diagnostics.Tools\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Globalization\MCT\MCT-AU\RSSFeed\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\IME\imekr8\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.FileSystem\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.WebHeaderCollection\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Reflection.Primitives\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security.Cryptography.Encoding\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\SubsetList\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\PresentationCore\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Data.Entity.Build.Tasks\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Editor\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Linq.Expressions\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security.resources\v4.0_3.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework.Aero\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Boot\PCAT\zh-HK\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\Users\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework64\v3.5\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1043\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\PresentationCore\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Tasks.v4.0\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationBuildTasks\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\AppCompat\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\CSC\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Media\Quirky\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Engine\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework.Royale\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.IsolatedStorage\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Linq.Queryable\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics.Vectors\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Globalization\ELS\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\Users\App_LocalResources\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\App_LocalResources\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility.Data\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Utilities.v4.0\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.GraphicalHost.resources\v4.0_3.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemCore\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Globalization\MCT\MCT-AU\Theme\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\Fonts\HOW_TO_DECRYPT.txt 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 832 timeout.exe 1888 timeout.exe 1584 timeout.exe 972 timeout.exe 580 timeout.exe 1240 timeout.exe 960 timeout.exe 1748 timeout.exe 840 timeout.exe 1800 timeout.exe 1052 timeout.exe 1968 timeout.exe 1412 timeout.exe 2004 timeout.exe 1252 timeout.exe 1324 timeout.exe 1496 timeout.exe 1692 timeout.exe 440 timeout.exe 268 timeout.exe 884 timeout.exe 1480 timeout.exe 972 timeout.exe 984 timeout.exe 1372 timeout.exe 1316 timeout.exe 1632 timeout.exe 1324 timeout.exe 1648 timeout.exe 2008 timeout.exe 316 timeout.exe 376 timeout.exe 1600 timeout.exe 1808 timeout.exe 376 timeout.exe 1800 timeout.exe 336 timeout.exe 1896 timeout.exe 580 timeout.exe 1568 timeout.exe 1688 timeout.exe 884 timeout.exe 904 timeout.exe 276 timeout.exe 532 timeout.exe 784 timeout.exe 1920 timeout.exe 1896 timeout.exe 1500 timeout.exe 1148 timeout.exe 1048 timeout.exe 1536 timeout.exe 680 timeout.exe 1564 timeout.exe 1696 timeout.exe 1972 timeout.exe 2000 timeout.exe 2000 timeout.exe 852 timeout.exe 372 timeout.exe 1012 timeout.exe 852 timeout.exe 1924 timeout.exe 948 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 752 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 600 vssvc.exe Token: SeRestorePrivilege 600 vssvc.exe Token: SeAuditPrivilege 600 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1624 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 29 PID 1848 wrote to memory of 1624 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 29 PID 1848 wrote to memory of 1624 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 29 PID 1848 wrote to memory of 1624 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 29 PID 1848 wrote to memory of 1508 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 30 PID 1848 wrote to memory of 1508 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 30 PID 1848 wrote to memory of 1508 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 30 PID 1848 wrote to memory of 1508 1848 5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe 30 PID 1508 wrote to memory of 752 1508 cmd.exe 33 PID 1508 wrote to memory of 752 1508 cmd.exe 33 PID 1508 wrote to memory of 752 1508 cmd.exe 33 PID 1508 wrote to memory of 752 1508 cmd.exe 33 PID 1624 wrote to memory of 1696 1624 cmd.exe 34 PID 1624 wrote to memory of 1696 1624 cmd.exe 34 PID 1624 wrote to memory of 1696 1624 cmd.exe 34 PID 1624 wrote to memory of 1696 1624 cmd.exe 34 PID 1624 wrote to memory of 852 1624 cmd.exe 36 PID 1624 wrote to memory of 852 1624 cmd.exe 36 PID 1624 wrote to memory of 852 1624 cmd.exe 36 PID 1624 wrote to memory of 852 1624 cmd.exe 36 PID 1624 wrote to memory of 376 1624 cmd.exe 37 PID 1624 wrote to memory of 376 1624 cmd.exe 37 PID 1624 wrote to memory of 376 1624 cmd.exe 37 PID 1624 wrote to memory of 376 1624 cmd.exe 37 PID 1624 wrote to memory of 1896 1624 cmd.exe 38 PID 1624 wrote to memory of 1896 1624 cmd.exe 38 PID 1624 wrote to memory of 1896 1624 cmd.exe 38 PID 1624 wrote to memory of 1896 1624 cmd.exe 38 PID 1624 wrote to memory of 1924 1624 cmd.exe 39 PID 1624 wrote to memory of 1924 1624 cmd.exe 39 PID 1624 wrote to memory of 1924 1624 cmd.exe 39 PID 1624 wrote to memory of 1924 1624 cmd.exe 39 PID 1624 wrote to memory of 984 1624 cmd.exe 40 PID 1624 wrote to memory of 984 1624 cmd.exe 40 PID 1624 wrote to memory of 984 1624 cmd.exe 40 PID 1624 wrote to memory of 984 1624 cmd.exe 40 PID 1624 wrote to memory of 960 1624 cmd.exe 41 PID 1624 wrote to memory of 960 1624 cmd.exe 41 PID 1624 wrote to memory of 960 1624 cmd.exe 41 PID 1624 wrote to memory of 960 1624 cmd.exe 41 PID 1624 wrote to memory of 948 1624 cmd.exe 42 PID 1624 wrote to memory of 948 1624 cmd.exe 42 PID 1624 wrote to memory of 948 1624 cmd.exe 42 PID 1624 wrote to memory of 948 1624 cmd.exe 42 PID 1624 wrote to memory of 1048 1624 cmd.exe 43 PID 1624 wrote to memory of 1048 1624 cmd.exe 43 PID 1624 wrote to memory of 1048 1624 cmd.exe 43 PID 1624 wrote to memory of 1048 1624 cmd.exe 43 PID 1624 wrote to memory of 1748 1624 cmd.exe 44 PID 1624 wrote to memory of 1748 1624 cmd.exe 44 PID 1624 wrote to memory of 1748 1624 cmd.exe 44 PID 1624 wrote to memory of 1748 1624 cmd.exe 44 PID 1624 wrote to memory of 832 1624 cmd.exe 45 PID 1624 wrote to memory of 832 1624 cmd.exe 45 PID 1624 wrote to memory of 832 1624 cmd.exe 45 PID 1624 wrote to memory of 832 1624 cmd.exe 45 PID 1624 wrote to memory of 1536 1624 cmd.exe 46 PID 1624 wrote to memory of 1536 1624 cmd.exe 46 PID 1624 wrote to memory of 1536 1624 cmd.exe 46 PID 1624 wrote to memory of 1536 1624 cmd.exe 46 PID 1624 wrote to memory of 1888 1624 cmd.exe 47 PID 1624 wrote to memory of 1888 1624 cmd.exe 47 PID 1624 wrote to memory of 1888 1624 cmd.exe 47 PID 1624 wrote to memory of 1888 1624 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe"C:\Users\Admin\AppData\Local\Temp\5954558d43884da2c7902ddf89c0cf7cd5bf162d6feefe5ce7d15b16767a27e5.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c hive.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1696
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:852
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:376
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1896
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1924
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:984
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:948
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1048
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1536
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1888
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1252
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:904
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:784
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:680
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1324
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2008
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1372
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:580
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1496
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1648
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1692
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:316
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1584
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:440
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1800
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1920
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1316
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:376
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1896
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1808
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1972
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1600
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1296
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1052
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1528
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1652
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1500
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:268
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1968
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1412
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1148
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2004
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2000
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1632
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:884
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:372
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:276
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:972
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1696
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1012
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1568
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:852
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1688
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:376
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1968
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:924
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1148
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1324
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1480
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:580
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2000
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:556
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1648
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:884
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:372
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:316
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1240
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:972
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1564
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1012
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1800
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:336
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c shadow.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:752
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:600