Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24/12/2021, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe
Resource
win10-en-20211208
General
-
Target
740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe
-
Size
170KB
-
MD5
33fc8b47fd2ad20f0a16e34341a8a675
-
SHA1
6e72a08f86b9a04cf37b568e421ba8518c50ebf2
-
SHA256
740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476
-
SHA512
ed9daa3632e392a8202ea6583d92a4d49b7b91d24eb61fff50d07edc6df3d60b4f0e0d064fba20e06d062c22ab3130529d32b28c660d13377722d2dc18391db3
Malware Config
Extracted
C:\readme.txt
conti
http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/01QQWQhq09Z1FH2CsVy45PwBLI1JKWRKEYmnWtNtPtVQlUs6K2MPtQgYuYKcurNC
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnlockExit.crw => C:\Users\Admin\Pictures\UnlockExit.crw.RHOQR 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File renamed C:\Users\Admin\Pictures\ShowUninstall.png => C:\Users\Admin\Pictures\ShowUninstall.png.RHOQR 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File renamed C:\Users\Admin\Pictures\StartUnblock.tif => C:\Users\Admin\Pictures\StartUnblock.tif.RHOQR 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File renamed C:\Users\Admin\Pictures\StepExport.raw => C:\Users\Admin\Pictures\StepExport.raw.RHOQR 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 32 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Links\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\Documents\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\Music\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\Videos\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\Music\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\adobe_sign_tag.png 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\nl-nl\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\System\VEN2232.OLB 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\te.pak 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\LINEAR_RGB.pf 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.eclipse.nl_ja_4.4.0.v20140623020002.jar 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\AppStore_icon.svg 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_zh_4.4.0.v20140623020002.jar 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-print.xml 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\de-de\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_KMS_Client_AE-ul-oob.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_Grace-ppd.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL026.XML 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\createpdf.svg 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\es-es\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Office15\pkeyconfig-office.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\Close.png 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\.eclipseproduct 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets_1.0.0.v20140514-1823.jar 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp4-ul-oob.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntryR_PrepidBypass-ul-oob.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse_2.1.200.v20140512-1650.jar 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\nl-nl\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\mix.gif 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-il\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\fr_get.svg 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-pl.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files\Common Files\System\msadc\es-ES\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ar-ae\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PowerPointNaiveBayesCommandRanker.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\tr-tr\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pl-pl\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected] 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-gb\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\VSTOFiles.cat 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.xml 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CANYON\PREVIEW.GIF 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sv-se\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ro-ro\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0409-1000-0000000FF1CE.xml 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Trial-ul-oob.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-100.png 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\AddIns.store 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\readme.txt 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons_retina.png 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\ui-strings.js 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Trial-pl.xrm-ms 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface_3.10.1.v20140813-1009.jar 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-core.xml 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_zh_CN.jar 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2468 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe 2468 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 2688 vssvc.exe Token: SeRestorePrivilege 2688 vssvc.exe Token: SeAuditPrivilege 2688 vssvc.exe Token: SeIncreaseQuotaPrivilege 804 WMIC.exe Token: SeSecurityPrivilege 804 WMIC.exe Token: SeTakeOwnershipPrivilege 804 WMIC.exe Token: SeLoadDriverPrivilege 804 WMIC.exe Token: SeSystemProfilePrivilege 804 WMIC.exe Token: SeSystemtimePrivilege 804 WMIC.exe Token: SeProfSingleProcessPrivilege 804 WMIC.exe Token: SeIncBasePriorityPrivilege 804 WMIC.exe Token: SeCreatePagefilePrivilege 804 WMIC.exe Token: SeBackupPrivilege 804 WMIC.exe Token: SeRestorePrivilege 804 WMIC.exe Token: SeShutdownPrivilege 804 WMIC.exe Token: SeDebugPrivilege 804 WMIC.exe Token: SeSystemEnvironmentPrivilege 804 WMIC.exe Token: SeRemoteShutdownPrivilege 804 WMIC.exe Token: SeUndockPrivilege 804 WMIC.exe Token: SeManageVolumePrivilege 804 WMIC.exe Token: 33 804 WMIC.exe Token: 34 804 WMIC.exe Token: 35 804 WMIC.exe Token: 36 804 WMIC.exe Token: SeIncreaseQuotaPrivilege 804 WMIC.exe Token: SeSecurityPrivilege 804 WMIC.exe Token: SeTakeOwnershipPrivilege 804 WMIC.exe Token: SeLoadDriverPrivilege 804 WMIC.exe Token: SeSystemProfilePrivilege 804 WMIC.exe Token: SeSystemtimePrivilege 804 WMIC.exe Token: SeProfSingleProcessPrivilege 804 WMIC.exe Token: SeIncBasePriorityPrivilege 804 WMIC.exe Token: SeCreatePagefilePrivilege 804 WMIC.exe Token: SeBackupPrivilege 804 WMIC.exe Token: SeRestorePrivilege 804 WMIC.exe Token: SeShutdownPrivilege 804 WMIC.exe Token: SeDebugPrivilege 804 WMIC.exe Token: SeSystemEnvironmentPrivilege 804 WMIC.exe Token: SeRemoteShutdownPrivilege 804 WMIC.exe Token: SeUndockPrivilege 804 WMIC.exe Token: SeManageVolumePrivilege 804 WMIC.exe Token: 33 804 WMIC.exe Token: 34 804 WMIC.exe Token: 35 804 WMIC.exe Token: 36 804 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 3968 2468 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe 72 PID 2468 wrote to memory of 3968 2468 740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe 72 PID 3968 wrote to memory of 804 3968 cmd.exe 74 PID 3968 wrote to memory of 804 3968 cmd.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe"C:\Users\Admin\AppData\Local\Temp\740ba8dc67571ffa4773ff6eb52ed745b5bf6e7fe93c941070da4c3915787476.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{83F9F456-EB31-477C-9802-9A0BF76D63FC}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{83F9F456-EB31-477C-9802-9A0BF76D63FC}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688