Overview
overview
10Static
static
81814a6a674...67.exe
windows7_x64
31814a6a674...67.exe
windows10_x64
102ca4f97e15...51.exe
windows7_x64
102ca4f97e15...51.exe
windows10_x64
103db6e8df73...3b.dll
windows7_x64
103db6e8df73...3b.dll
windows10_x64
103e2ce6fd7b...a5.exe
windows7_x64
103e2ce6fd7b...a5.exe
windows10_x64
10463b34821a...40.exe
windows7_x64
10463b34821a...40.exe
windows10_x64
34f4a33f700...72.exe
windows7_x64
104f4a33f700...72.exe
windows10_x64
853b1c1b2f4...22.exe
windows7_x64
1053b1c1b2f4...22.exe
windows10_x64
1062b2822215...d3.exe
windows7_x64
962b2822215...d3.exe
windows10_x64
96bc6f60b87...bc.dll
windows7_x64
106bc6f60b87...bc.dll
windows10_x64
106f7043b24d...1d.dll
windows7_x64
16f7043b24d...1d.dll
windows10_x64
3706a8a4fc4...1c.exe
windows7_x64
10706a8a4fc4...1c.exe
windows10_x64
107236c8098c...8e.exe
windows7_x64
107236c8098c...8e.exe
windows10_x64
1074ebfcd116...dd.dll
windows7_x64
1074ebfcd116...dd.dll
windows10_x64
107fbeac1dca...de.exe
windows7_x64
107fbeac1dca...de.exe
windows10_x64
1087e6f7b20e...89.exe
windows7_x64
387e6f7b20e...89.exe
windows10_x64
3918127c59e...3d.exe
windows7_x64
10918127c59e...3d.exe
windows10_x64
10Analysis
-
max time kernel
156s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
24-09-2021 10:27
Behavioral task
behavioral1
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
2ca4f97e15c6ddaa3276fbc56e716249dde1d2607f3b745933fedd9df3879751.exe
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
2ca4f97e15c6ddaa3276fbc56e716249dde1d2607f3b745933fedd9df3879751.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
3db6e8df73f12b6a9fa9adb6ad87b017d530a9d736909338042735ed00a9463b.dll
Resource
win7-en-20210920
Behavioral task
behavioral6
Sample
3db6e8df73f12b6a9fa9adb6ad87b017d530a9d736909338042735ed00a9463b.dll
Resource
win10v20210408
Behavioral task
behavioral7
Sample
3e2ce6fd7b53224df92581b800ce9a6605eae878d4165df9ae8f73a488be3fa5.exe
Resource
win7-en-20210920
Behavioral task
behavioral8
Sample
3e2ce6fd7b53224df92581b800ce9a6605eae878d4165df9ae8f73a488be3fa5.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe
Resource
win7-en-20210920
Behavioral task
behavioral10
Sample
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe
Resource
win10-en-20210920
Behavioral task
behavioral11
Sample
4f4a33f70099855f5f503716515f388da3a5daa1e2fac59ec6c881e89ef7d072.exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
4f4a33f70099855f5f503716515f388da3a5daa1e2fac59ec6c881e89ef7d072.exe
Resource
win10-en-20210920
Behavioral task
behavioral13
Sample
53b1c1b2f41a7fc300e97d036e57539453ff82001dd3f6abf07f4896b1f9ca22.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
53b1c1b2f41a7fc300e97d036e57539453ff82001dd3f6abf07f4896b1f9ca22.exe
Resource
win10-en-20210920
Behavioral task
behavioral15
Sample
62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe
Resource
win7-en-20210920
Behavioral task
behavioral16
Sample
62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
6bc6f60b873ea406022459edcd2df278cb2ec7bb4d994ebd4fc02af3a57ec6bc.dll
Resource
win7-en-20210920
Behavioral task
behavioral18
Sample
6bc6f60b873ea406022459edcd2df278cb2ec7bb4d994ebd4fc02af3a57ec6bc.dll
Resource
win10v20210408
Behavioral task
behavioral19
Sample
6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
Resource
win7-en-20210920
Behavioral task
behavioral20
Sample
6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
Resource
win10v20210408
Behavioral task
behavioral21
Sample
706a8a4fc4b9f8b15c6bf1ee0fe732eaa5e069615ea126b931166672a8a5b51c.exe
Resource
win7-en-20210920
Behavioral task
behavioral22
Sample
706a8a4fc4b9f8b15c6bf1ee0fe732eaa5e069615ea126b931166672a8a5b51c.exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
7236c8098c55ea1d144f4d6646e8cab8c7fdbde1d127d409b0d6a4ff1029628e.exe
Resource
win7-en-20210920
Behavioral task
behavioral24
Sample
7236c8098c55ea1d144f4d6646e8cab8c7fdbde1d127d409b0d6a4ff1029628e.exe
Resource
win10-en-20210920
Behavioral task
behavioral25
Sample
74ebfcd116fdd39217935d11ae62e48a0c44dfab822edea62ac7f611aca969dd.dll
Resource
win7v20210408
Behavioral task
behavioral26
Sample
74ebfcd116fdd39217935d11ae62e48a0c44dfab822edea62ac7f611aca969dd.dll
Resource
win10-en-20210920
Behavioral task
behavioral27
Sample
7fbeac1dca907f4c04fec45a1228c9277f03930355eeac30d101bbce7e2733de.exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
7fbeac1dca907f4c04fec45a1228c9277f03930355eeac30d101bbce7e2733de.exe
Resource
win10-en-20210920
Behavioral task
behavioral29
Sample
87e6f7b20ea2bd35d947d9100fe6291dfe186cfedea5d451be14bab5d2518e89.exe
Resource
win7-en-20210920
Behavioral task
behavioral30
Sample
87e6f7b20ea2bd35d947d9100fe6291dfe186cfedea5d451be14bab5d2518e89.exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe
Resource
win7-en-20210920
Behavioral task
behavioral32
Sample
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe
Resource
win10v20210408
General
-
Target
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe
-
Size
66KB
-
MD5
589fcc4c9cfe26b7e6d54756112ab260
-
SHA1
3aed07b9cf58a45a7379d92559b3a1a2241248a1
-
SHA256
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d
-
SHA512
9c274e688996ffe6635d5303694e52979c07783bb184bf99940490296157b521d3433c7f29ea863d5e9769b52671ffdb3da4e1e64757b432ae3dda4bef46ecd2
Malware Config
Extracted
C:\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.best
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exedescription ioc process File renamed C:\Users\Admin\Pictures\OpenProtect.tiff => C:\Users\Admin\Pictures\OpenProtect.tiff.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\UseDebug.crw => C:\Users\Admin\Pictures\UseDebug.crw.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\WatchUninstall.tiff => C:\Users\Admin\Pictures\WatchUninstall.tiff.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\EnterComplete.tiff 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\OpenProtect.tiff 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\EnterComplete.tiff => C:\Users\Admin\Pictures\EnterComplete.tiff.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\GetSubmit.crw => C:\Users\Admin\Pictures\GetSubmit.crw.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\EditSet.tiff => C:\Users\Admin\Pictures\EditSet.tiff.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\InstallCompress.png => C:\Users\Admin\Pictures\InstallCompress.png.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\OpenResume.png => C:\Users\Admin\Pictures\OpenResume.png.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\WatchUninstall.tiff 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\DisableEnable.tiff => C:\Users\Admin\Pictures\DisableEnable.tiff.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\EditSet.tiff 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\RegisterSplit.png => C:\Users\Admin\Pictures\RegisterSplit.png.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File renamed C:\Users\Admin\Pictures\AssertStop.raw => C:\Users\Admin\Pictures\AssertStop.raw.MRBNY 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\DisableEnable.tiff 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe -
Drops startup file 1 IoCs
Processes:
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 32 IoCs
Processes:
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exedescription ioc process File opened for modification C:\Users\Admin\Favorites\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Links\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Music\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\Videos\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\Documents\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\Music\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe -
Drops file in Program Files directory 64 IoCs
Processes:
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-PT.pak 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\vlc.mo 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-actions.xml 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-windows_zh_CN.jar 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\Microsoft Office\root\Licenses16\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription2-pl.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelCtxUICellLayoutModel.bin 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr.jar 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons_hiContrast_bow.png 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\logging.properties 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-ppd.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_MAK-ul-oob.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\en-US\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-140.png 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN108.XML 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_zh_CN.jar 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado28.tlb 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC.HXS 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Gill Sans MT.xml 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\en-US.pak 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_profile.png 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ppd.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-pl.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_200_percent.pak 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_it.jar 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-oob.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-ui.xml 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ppd.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.workbench.nl_ja_4.4.0.v20140623020002.jar 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_invite_24.svg 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Trial-ul-oob.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\GRAPH_F_COL.HXK 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-80.png 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\meta-index 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\comments.win32.tpn 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-charts_zh_CN.jar 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\Heartbeat\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\1033\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-ul-oob.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-pl.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_KMS_Client-ul-oob.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RTC.der 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp5-pl.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\HandPrints.jpg 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\vstoee90.tlb 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_ok.gif 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ppd.xrm-ms 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7cm_es.dub 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\VideoLAN\VLC\locale\am\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\bwcapitalized.dotx 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\hi.pak 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\readme.txt 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-applemenu.xml 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exepid process 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
vssvc.exeWMIC.exedescription pid process Token: SeBackupPrivilege 356 vssvc.exe Token: SeRestorePrivilege 356 vssvc.exe Token: SeAuditPrivilege 356 vssvc.exe Token: SeIncreaseQuotaPrivilege 1468 WMIC.exe Token: SeSecurityPrivilege 1468 WMIC.exe Token: SeTakeOwnershipPrivilege 1468 WMIC.exe Token: SeLoadDriverPrivilege 1468 WMIC.exe Token: SeSystemProfilePrivilege 1468 WMIC.exe Token: SeSystemtimePrivilege 1468 WMIC.exe Token: SeProfSingleProcessPrivilege 1468 WMIC.exe Token: SeIncBasePriorityPrivilege 1468 WMIC.exe Token: SeCreatePagefilePrivilege 1468 WMIC.exe Token: SeBackupPrivilege 1468 WMIC.exe Token: SeRestorePrivilege 1468 WMIC.exe Token: SeShutdownPrivilege 1468 WMIC.exe Token: SeDebugPrivilege 1468 WMIC.exe Token: SeSystemEnvironmentPrivilege 1468 WMIC.exe Token: SeRemoteShutdownPrivilege 1468 WMIC.exe Token: SeUndockPrivilege 1468 WMIC.exe Token: SeManageVolumePrivilege 1468 WMIC.exe Token: 33 1468 WMIC.exe Token: 34 1468 WMIC.exe Token: 35 1468 WMIC.exe Token: 36 1468 WMIC.exe Token: SeIncreaseQuotaPrivilege 1468 WMIC.exe Token: SeSecurityPrivilege 1468 WMIC.exe Token: SeTakeOwnershipPrivilege 1468 WMIC.exe Token: SeLoadDriverPrivilege 1468 WMIC.exe Token: SeSystemProfilePrivilege 1468 WMIC.exe Token: SeSystemtimePrivilege 1468 WMIC.exe Token: SeProfSingleProcessPrivilege 1468 WMIC.exe Token: SeIncBasePriorityPrivilege 1468 WMIC.exe Token: SeCreatePagefilePrivilege 1468 WMIC.exe Token: SeBackupPrivilege 1468 WMIC.exe Token: SeRestorePrivilege 1468 WMIC.exe Token: SeShutdownPrivilege 1468 WMIC.exe Token: SeDebugPrivilege 1468 WMIC.exe Token: SeSystemEnvironmentPrivilege 1468 WMIC.exe Token: SeRemoteShutdownPrivilege 1468 WMIC.exe Token: SeUndockPrivilege 1468 WMIC.exe Token: SeManageVolumePrivilege 1468 WMIC.exe Token: 33 1468 WMIC.exe Token: 34 1468 WMIC.exe Token: 35 1468 WMIC.exe Token: 36 1468 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ShellExperienceHost.exepid process 3164 ShellExperienceHost.exe 3164 ShellExperienceHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.execmd.exedescription pid process target process PID 528 wrote to memory of 1344 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe cmd.exe PID 528 wrote to memory of 1344 528 918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe cmd.exe PID 1344 wrote to memory of 1468 1344 cmd.exe WMIC.exe PID 1344 wrote to memory of 1468 1344 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe"C:\Users\Admin\AppData\Local\Temp\918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{493E2A7D-D35C-4823-8312-DB6A87B45E66}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{493E2A7D-D35C-4823-8312-DB6A87B45E66}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:356
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵PID:1896