Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
18-12-2021 23:06
Static task
static1
Behavioral task
behavioral1
Sample
5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe
Resource
win10-en-20211208
General
-
Target
5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe
-
Size
6.0MB
-
MD5
5559e9f5e1645f8554ea020a29a5a3ee
-
SHA1
d74bd70862707cd2c7ab946903f6fa0aab066151
-
SHA256
5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4
-
SHA512
56835d08f64887c4bd7b0fecd111f4b89411c45398618d815ed9652a0addbf25939fee9f40c4a0315e5e1539c0e87fcd5a9bd73cd7ad43d97d1484763abc5540
Malware Config
Extracted
C:\Users\Public\index.html
Extracted
C:\Users\Public\ATOMSILO-README.hta
atomsilo
Email:[email protected]
http://l5cjga2ksw6rxumu5l4xxn3cmahhi2irkbwg3amx6ajroyfmfgpfllid.onion
Signatures
-
AtomSilo
Ransomware family first seen in September 2021.
-
AtomSilo Ransomware 1 IoCs
resource yara_rule behavioral1/memory/904-55-0x000000013F850000-0x000000014028A000-memory.dmp family_atomsilo -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SendUndo.raw => \??\c:\Users\Admin\Pictures\SendUndo.raw.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\SendUndo.raw.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File renamed C:\Users\Admin\Pictures\ShowConvertFrom.crw => \??\c:\Users\Admin\Pictures\ShowConvertFrom.crw.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\ShowConvertFrom.crw.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File renamed C:\Users\Admin\Pictures\UninstallExit.tiff => \??\c:\Users\Admin\Pictures\UninstallExit.tiff.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\UninstallExit.tiff.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File renamed C:\Users\Admin\Pictures\ExpandExport.tiff => \??\c:\Users\Admin\Pictures\ExpandExport.tiff.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\ExpandExport.tiff.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File renamed C:\Users\Admin\Pictures\TestConfirm.raw => \??\c:\Users\Admin\Pictures\TestConfirm.raw.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Users\Admin\Pictures\TestConfirm.raw.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe -
Deletes itself 1 IoCs
pid Process 1028 cmd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\WHITEBOX.JPG.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.xml.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\cursors.properties.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00438_.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00737_.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00668_.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14983_.GIF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\ActiveTabImage.jpg.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaBrightItalic.ttf.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\GMT.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\README.HTM.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\THMBNAIL.PNG.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21421_.GIF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-sampler_zh_CN.jar.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\PREVIEW.GIF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPOlive.png.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files\Microsoft Games\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153091.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files (x86)\Common Files\System\fr-FR\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files (x86)\Common Files\System\msadc\es-ES\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107308.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0233512.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Module.xml.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Perspective.xml.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR_K_COL.HXK.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4.ssl_1.0.0.v20140827-1444.jar.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-modules-appui.xml.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files\Windows NT\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099156.JPG.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15172_.GIF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\StarterApplicationDescriptors.xml.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCOUPON.DPV.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\7-Zip\Lang\bg.txt.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\boot.jar.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-lib-profiler-common.jar.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\Proof.XML.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\3082\MSO.ACL.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Gaza.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101864.BMP.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382968.JPG.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00350_.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Antarctica\Vostok.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Asia\Omsk.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\vlc.mo.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\THMBNAIL.PNG.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPreviewTemplate.html.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dhaka.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00166_.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00834_.WMF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL_K_COL.HXK.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GreenTea.css.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dushanbe.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File created \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\README-FILE-QSKGHMYQ-1639872372.hta 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR47F.GIF.ATOMSILO 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 904 wrote to memory of 1716 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 32 PID 904 wrote to memory of 1716 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 32 PID 904 wrote to memory of 1716 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 32 PID 904 wrote to memory of 1096 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 33 PID 904 wrote to memory of 1096 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 33 PID 904 wrote to memory of 1096 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 33 PID 904 wrote to memory of 2012 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 34 PID 904 wrote to memory of 2012 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 34 PID 904 wrote to memory of 2012 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 34 PID 904 wrote to memory of 1760 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 35 PID 904 wrote to memory of 1760 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 35 PID 904 wrote to memory of 1760 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 35 PID 904 wrote to memory of 1928 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 36 PID 904 wrote to memory of 1928 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 36 PID 904 wrote to memory of 1928 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 36 PID 904 wrote to memory of 1256 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 37 PID 904 wrote to memory of 1256 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 37 PID 904 wrote to memory of 1256 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 37 PID 904 wrote to memory of 1712 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 38 PID 904 wrote to memory of 1712 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 38 PID 904 wrote to memory of 1712 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 38 PID 904 wrote to memory of 900 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 39 PID 904 wrote to memory of 900 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 39 PID 904 wrote to memory of 900 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 39 PID 904 wrote to memory of 1492 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 40 PID 904 wrote to memory of 1492 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 40 PID 904 wrote to memory of 1492 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 40 PID 904 wrote to memory of 1516 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 41 PID 904 wrote to memory of 1516 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 41 PID 904 wrote to memory of 1516 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 41 PID 904 wrote to memory of 1028 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 42 PID 904 wrote to memory of 1028 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 42 PID 904 wrote to memory of 1028 904 5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe 42 PID 1028 wrote to memory of 988 1028 cmd.exe 44 PID 1028 wrote to memory of 988 1028 cmd.exe 44 PID 1028 wrote to memory of 988 1028 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe"C:\Users\Admin\AppData\Local\Temp\5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1716
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1096
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:2012
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1760
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1928
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1256
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1712
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:900
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1492
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1516
-
-
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 -n 6 && del "C:\Users\Admin\AppData\Local\Temp\5f614a8e35bd80a603cf98846c6a44030ad18bed45ac83bd2110d83e8a090de4.bin.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 63⤵
- Runs ping.exe
PID:988
-
-