Analysis
-
max time kernel
152s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 02:24
Static task
static1
Behavioral task
behavioral1
Sample
fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe
Resource
win10v2004-en-20220112
General
-
Target
fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe
-
Size
287KB
-
MD5
3a7cf1131fb5d7b200d76884a27d17e2
-
SHA1
dcb545a6f61c545a47079c4be5b75d7f2e7ff8b6
-
SHA256
fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504
-
SHA512
f4af3e0c00fee64aa9a388f6b1d9b304fad2fd97402c1f579c746885f3751d94dac3f1573374392ec904c82d88a0fec8b3acd290a3d299204dbcc7f9438cca9a
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\GrantReceive.tiff => C:\Users\Admin\Pictures\GrantReceive.tiff..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\MountLimit.png => C:\Users\Admin\Pictures\MountLimit.png..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\SetExit.crw => C:\Users\Admin\Pictures\SetExit.crw..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\TestConfirm.tif => C:\Users\Admin\Pictures\TestConfirm.tif..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\UnprotectSubmit.crw => C:\Users\Admin\Pictures\UnprotectSubmit.crw..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Pictures\GrantReceive.tiff fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\BlockSync.png => C:\Users\Admin\Pictures\BlockSync.png..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\ExpandUnlock.crw => C:\Users\Admin\Pictures\ExpandUnlock.crw..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\UpdateUninstall.tif => C:\Users\Admin\Pictures\UpdateUninstall.tif..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File renamed C:\Users\Admin\Pictures\BlockSkip.crw => C:\Users\Admin\Pictures\BlockSkip.crw..726 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CertificatesCheck = "C:\\Users\\Public\\fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe" fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Public\Downloads\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Links\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Videos\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Music\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Libraries\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Searches\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Documents\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Desktop\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Videos\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Pictures\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Music\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Documents\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1572 set thread context of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\RECOVER-FILES-726.html fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadataresource.xsd fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft.Office.InfoPath.targets fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Microsoft.Synchronization.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyLetter.dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.Xml.xml fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOCFU.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NPAUTHZ.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\PAWPRINT.HTM fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.PPD fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSO0127.ACL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\updater.ini fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanResume.Dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\RECOVER-FILES-726.html fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSAutogen.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPDESIGN.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\RECOVER-FILES-726.html fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieNewsletter.dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Name.accft fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUDIOSEARCHLTS.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Priority.accft fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MORPH9.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACC.OLB fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AppConfigurationInternal.zip fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AssemblyInfo.zip fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\OrielFax.Dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceoledb35.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BloodPressureTracker.xltx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\EquityFax.Dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADVCMP.DIC fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUDIOSEARCHMAIN.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPIRM.XML fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.InfoPath.FormControl.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\RECOVER-FILES-726.html fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\SynchronizationEula.rtf fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\NOTEBOOK.HTM fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPOLK.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLMAPI32.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\FeedSync.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Category.accft fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NL7MODELS0009.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\RECOVER-FILES-726.html fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.xml fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Synchronization.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BillingStatement.xltx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityReport.Dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKPowerPoint.dll fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryNewsletter.dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\MedianResume.Dotx fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7jp.kic fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INTLDATE.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\RECOVER-FILES-726.html fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Comments.accdt fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FRENCH.LNG fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Graph.exe.manifest fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLKIRMV.XML fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OFFRHD.DLL fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 520 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1516 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1016 vssvc.exe Token: SeRestorePrivilege 1016 vssvc.exe Token: SeAuditPrivilege 1016 vssvc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1572 wrote to memory of 1516 1572 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 27 PID 1516 wrote to memory of 868 1516 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 28 PID 1516 wrote to memory of 868 1516 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 28 PID 1516 wrote to memory of 868 1516 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 28 PID 1516 wrote to memory of 868 1516 fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe 28 PID 868 wrote to memory of 520 868 cmd.exe 30 PID 868 wrote to memory of 520 868 cmd.exe 30 PID 868 wrote to memory of 520 868 cmd.exe 30 PID 868 wrote to memory of 520 868 cmd.exe 30 PID 868 wrote to memory of 364 868 cmd.exe 32 PID 868 wrote to memory of 364 868 cmd.exe 32 PID 868 wrote to memory of 364 868 cmd.exe 32 PID 868 wrote to memory of 364 868 cmd.exe 32 PID 868 wrote to memory of 288 868 cmd.exe 33 PID 868 wrote to memory of 288 868 cmd.exe 33 PID 868 wrote to memory of 288 868 cmd.exe 33 PID 868 wrote to memory of 288 868 cmd.exe 33 PID 868 wrote to memory of 1960 868 cmd.exe 34 PID 868 wrote to memory of 1960 868 cmd.exe 34 PID 868 wrote to memory of 1960 868 cmd.exe 34 PID 868 wrote to memory of 1960 868 cmd.exe 34 PID 868 wrote to memory of 584 868 cmd.exe 35 PID 868 wrote to memory of 584 868 cmd.exe 35 PID 868 wrote to memory of 584 868 cmd.exe 35 PID 868 wrote to memory of 584 868 cmd.exe 35 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 584 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe"C:\Users\Admin\AppData\Local\Temp\fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe"C:\Users\Admin\AppData\Local\Temp\fe5d565b1f7b0a5b25edf491dafb826ab4270d99e574ba716baa99fd224aa504.exe"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\__tF42E.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:520
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f4⤵PID:364
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f4⤵PID:288
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"4⤵PID:1960
-
-
C:\Windows\SysWOW64\attrib.exeattrib Default.rdp -s -h4⤵
- Views/modifies file attributes
PID:584
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1016