Resubmissions
07-04-2024 06:24
240407-g6g4bsfa4s 1007-04-2024 06:24
240407-g6de5sfa3y 1007-04-2024 06:24
240407-g59f7afe37 1007-04-2024 06:24
240407-g547gafa3t 1005-03-2022 21:34
220305-1e7pfsbacj 10Analysis
-
max time kernel
4294200s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
05-03-2022 21:34
Static task
static1
Behavioral task
behavioral1
Sample
701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe
Resource
win10v2004-en-20220112
General
-
Target
701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe
-
Size
1.2MB
-
MD5
6bb55449f9ad55bb73f25877a1041e1f
-
SHA1
b303f1c9c4564551853cd08a770836aae5725cf2
-
SHA256
701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e
-
SHA512
b6e5393b39ca5f0fc2f5f4a0ed0e5aeb8207e228abb676f4f25a069289dd322cb17b38b0e83f9767a32f9e202fff2adb26d6c4f00660721d3b4b161c07f8e49c
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
resource yara_rule behavioral1/memory/964-56-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/964-57-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 whatismyipaddress.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\3C92C04E3C92C04E.bmp" 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_ButtonGraphic.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\whitemenu.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\26.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_up.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dialdot.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-windows.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_over.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs-nio2.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-javahelp.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\settings.html 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-last-quarter.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\31.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty_dot.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodbig.gif 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\gadget.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-first-quarter_partly-cloudy.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\library.js 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\logo.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\picturePuzzle.js 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_h.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jre7\lib\jvm.hprof.txt 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainBackground.wmv 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-new_partly-cloudy.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_left.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passportcover.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\gadget.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist_jstree.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_pressed.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\picturePuzzle.css 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\gadget.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_ButtonGraphic.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_over.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-uihandler.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\feature.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\README-JDK.html 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\10.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-output2.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_ButtonGraphic.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_windy.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-crescent_partly-cloudy.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-sa.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_videoinset.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-progress-ui.xml 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoCanary.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\menu_style_default_Thumbnail.png 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 612 1368 WerFault.exe 9 -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 584 vssadmin.exe 812 vssadmin.exe 1840 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2036 vssvc.exe Token: SeRestorePrivilege 2036 vssvc.exe Token: SeAuditPrivilege 2036 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 29 PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 29 PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 29 PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 29 PID 964 wrote to memory of 812 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 33 PID 964 wrote to memory of 812 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 33 PID 964 wrote to memory of 812 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 33 PID 964 wrote to memory of 812 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 33 PID 964 wrote to memory of 1840 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 35 PID 964 wrote to memory of 1840 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 35 PID 964 wrote to memory of 1840 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 35 PID 964 wrote to memory of 1840 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 35 PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 37 PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 37 PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 37 PID 964 wrote to memory of 584 964 701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe 37 PID 584 wrote to memory of 1052 584 cmd.exe 39 PID 584 wrote to memory of 1052 584 cmd.exe 39 PID 584 wrote to memory of 1052 584 cmd.exe 39 PID 584 wrote to memory of 1052 584 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe"C:\Users\Admin\AppData\Local\Temp\701d3db21920f78b8ed2eb6b4286f858277928f50d567c9c6594bd1971e9c07e.exe"1⤵
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:584
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:812
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\chcp.comchcp3⤵PID:1052
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1368 -s 6361⤵
- Program crash
PID:612