Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05-03-2022 16:11
Static task
static1
Behavioral task
behavioral1
Sample
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe
Resource
win10v2004-en-20220112
General
-
Target
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe
-
Size
92KB
-
MD5
e0e27881a9e2e4486c923178ebaf18ba
-
SHA1
c3f1bdb3ac9085cc497a83d4d8466db5c18f64b5
-
SHA256
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06
-
SHA512
b339e8050cefe6ed658cb03256772815a14bcf339510c15d91dbbcbf929b74c0ae5c3265a866fff48e6b231310099be5fa589ab6515888be56068165ab85b5cb
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\EditRepair.tiff 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Drops startup file 5 IoCs
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe = "C:\\Windows\\System32\\84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe" 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\Documents\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Music\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-790714498-1549421491-1643397139-1000\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\Music\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\Videos\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Links\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Drops file in System32 directory 2 IoCs
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exedescription ioc process File created C:\Windows\System32\84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Windows\System32\Info.hta 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Drops file in Program Files directory 64 IoCs
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_2019.904.1644.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.xml.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ppd.xrm-ms.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-16_contrast-white.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\tzmappings 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-ul-oob.xrm-ms.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\new_icons.png.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\PhotoViewer.dll.mui 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-pl.xrm-ms.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-pl.xrm-ms 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\ui-strings.js 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail2-ul-phn.xrm-ms.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\ui-strings.js 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\S-1-5-21-790714498-1549421491-1643397139-1000-MergedResources-0.pri 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.153.55\msedgeupdateres_az.dll 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_OEM_Perp-ul-oob.xrm-ms 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\createpdfupsell-app-selector.js.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\ui-strings.js.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt_1.1.1.v20140903-0821.jar 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sk-SK\View3d\3DViewerProductDescription-universal.xml 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\anevia_streams.luac.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUECALM\BLUECALM.ELM.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SyncFusion.Compression.Base.dll.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\de-de\ui-strings.js 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderWideTile.contrast-white_scale-100.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-256_altform-unplated.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\WINGDNG3.TTF.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.scale-100.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_fillandsign_18.svg.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\ui-strings.js 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pt-br\ui-strings.js 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_cs.jar.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessRuntime2019R_PrepidBypass-ul-oob.xrm-ms 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest2-ppd.xrm-ms.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-150_contrast-white.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OutlookAccount.scale-100.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\ui-strings.js 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MyriadPro-Bold.otf 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\ur.pak.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\InputPersonalization.exe.mui 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\feature.properties 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox.nl_ja_4.4.0.v20140623020002.jar 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fullscreen-exit-hover.svg.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\vlc.mo.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libjpeg_plugin.dll.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-print.jar.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_OEM_Perp-ul-phn.xrm-ms.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Dark.scale-125.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sl-sl\ui-strings.js.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hu-hu\ui-strings.js 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ppd.xrm-ms.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-down.svg.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\rhp_world_icon_2x.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\MemMDL2.1.85.ttf 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\psmachine_64.dll 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\VisualElements\LogoDev.png.DATA 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Delete.png.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\turnOnNotificationInAcrobat.gif.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\main.css.id-E183AAD4.[[email protected]].harma 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WebView2Loader.dll 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jfxmedia.dll 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-72_altform-unplated_contrast-black.png 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 3128 vssadmin.exe 1280 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exepid process 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 3988 vssvc.exe Token: SeRestorePrivilege 3988 vssvc.exe Token: SeAuditPrivilege 3988 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.execmd.execmd.exedescription pid process target process PID 1676 wrote to memory of 1176 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe cmd.exe PID 1676 wrote to memory of 1176 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe cmd.exe PID 1176 wrote to memory of 2612 1176 cmd.exe mode.com PID 1176 wrote to memory of 2612 1176 cmd.exe mode.com PID 1176 wrote to memory of 3128 1176 cmd.exe vssadmin.exe PID 1176 wrote to memory of 3128 1176 cmd.exe vssadmin.exe PID 1676 wrote to memory of 1948 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe cmd.exe PID 1676 wrote to memory of 1948 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe cmd.exe PID 1948 wrote to memory of 3436 1948 cmd.exe mode.com PID 1948 wrote to memory of 3436 1948 cmd.exe mode.com PID 1948 wrote to memory of 1280 1948 cmd.exe vssadmin.exe PID 1948 wrote to memory of 1280 1948 cmd.exe vssadmin.exe PID 1676 wrote to memory of 1544 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe mshta.exe PID 1676 wrote to memory of 1544 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe mshta.exe PID 1676 wrote to memory of 3916 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe mshta.exe PID 1676 wrote to memory of 3916 1676 84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe"C:\Users\Admin\AppData\Local\Temp\84bcd5d73dd7c59ee9d7fd5b92c067e335c2c3f53e72db866747d97da4563b06.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2612
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3128
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:3436
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1280
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:1544
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:3916
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3fe70617f5aa73df8af6e20e5eef4ffc
SHA112dae3a8d6f87d3c192d0168f90711aec3986d1a
SHA256f348d63cad8a8e53a8d225933524ce466e0ae17b41e287b0d7780cc7946c35d4
SHA5124a1f8645381479d1e64651e8895b7d9d550edd4057a489f3701098e699e4c0c20ea2e4ae560aceac34d7f91bd1f5c52341e6108cd409612a3b16d12ceb06fe75
-
MD5
3fe70617f5aa73df8af6e20e5eef4ffc
SHA112dae3a8d6f87d3c192d0168f90711aec3986d1a
SHA256f348d63cad8a8e53a8d225933524ce466e0ae17b41e287b0d7780cc7946c35d4
SHA5124a1f8645381479d1e64651e8895b7d9d550edd4057a489f3701098e699e4c0c20ea2e4ae560aceac34d7f91bd1f5c52341e6108cd409612a3b16d12ceb06fe75