Resubmissions
06-04-2024 15:14
240406-smhrasdf93 1006-04-2024 15:14
240406-smb9hsda31 1006-04-2024 15:13
240406-sl7n2ada3y 1006-04-2024 15:13
240406-sl1wgsdf85 1028-09-2021 10:15
210928-magetabef7 10Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-09-2021 10:15
Static task
static1
Behavioral task
behavioral1
Sample
32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe
Resource
win10-en-20210920
General
-
Target
32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe
-
Size
1.1MB
-
MD5
168557f53a1ffa882cabb043578b2216
-
SHA1
3ad007c50fb13801f252233862dc6d8e1ecfcc5c
-
SHA256
32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc
-
SHA512
50f3c9b987ba5e8502b263018d88bd00b9f46a07b624b8bcd5cb626945a2000d316fe67f66876e835ed912f07309aec03c24383c5ba605c349b008d402cfb0bc
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\InitializeRepair.tiff 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Users\Admin\Pictures\DismountSubmit.tiff 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
resource yara_rule behavioral1/memory/1256-56-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 whatismyipaddress.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\4478421844784218.bmp" 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\13.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_divider.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\index.gif 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\settings.js 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\calendar.html 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG_PAL.wmv 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\9.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-execution.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-io-ui.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-backglow.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-ImageMask.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-shadow.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_ButtonGraphic.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked-loading.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\gadget.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\26.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\rings-dock.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoDev.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\gadget.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\calendar.js 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-enumerations.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\console_view.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_widescreen_Thumbnail.bmp 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\History.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\1.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\glow.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_ButtonGraphic.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_foggy.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\uarrow.gif 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\README.html 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-highlight.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_sun.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\feature.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_ButtonGraphic.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-crescent_partly-cloudy.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\settings.css 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\userContent_16x9_imagemask.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\decorative_rule.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_hover.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-left.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_settings.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\timeZones.js 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\travel.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\MoveCheckpoint.xla 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\RSSFeeds.js 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\eclipse_update_120.jpg 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMainMask.wmv 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1584 1400 WerFault.exe 12 -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 792 vssadmin.exe 1248 vssadmin.exe 1100 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe 1584 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1584 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 520 vssvc.exe Token: SeRestorePrivilege 520 vssvc.exe Token: SeAuditPrivilege 520 vssvc.exe Token: SeDebugPrivilege 1584 WerFault.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1256 wrote to memory of 792 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 28 PID 1256 wrote to memory of 792 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 28 PID 1256 wrote to memory of 792 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 28 PID 1256 wrote to memory of 792 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 28 PID 1256 wrote to memory of 1248 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 31 PID 1256 wrote to memory of 1248 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 31 PID 1256 wrote to memory of 1248 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 31 PID 1256 wrote to memory of 1248 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 31 PID 1256 wrote to memory of 1100 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 PID 1256 wrote to memory of 1100 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 PID 1256 wrote to memory of 1100 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 PID 1256 wrote to memory of 1100 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 PID 1256 wrote to memory of 896 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 38 PID 1256 wrote to memory of 896 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 38 PID 1256 wrote to memory of 896 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 38 PID 1256 wrote to memory of 896 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 38 PID 896 wrote to memory of 1648 896 cmd.exe 40 PID 896 wrote to memory of 1648 896 cmd.exe 40 PID 896 wrote to memory of 1648 896 cmd.exe 40 PID 896 wrote to memory of 1648 896 cmd.exe 40 PID 1256 wrote to memory of 1460 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 41 PID 1256 wrote to memory of 1460 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 41 PID 1256 wrote to memory of 1460 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 41 PID 1256 wrote to memory of 1460 1256 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 41 PID 1460 wrote to memory of 1900 1460 cmd.exe 43 PID 1460 wrote to memory of 1900 1460 cmd.exe 43 PID 1460 wrote to memory of 1900 1460 cmd.exe 43 PID 1460 wrote to memory of 1900 1460 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe"C:\Users\Admin\AppData\Local\Temp\32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:792
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1248
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\chcp.comchcp3⤵PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\chcp.comchcp3⤵PID:1900
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:520
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1400 -s 5921⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1584