Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05-03-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe
Resource
win10v2004-en-20220112
General
-
Target
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe
-
Size
92KB
-
MD5
ca0addfe1e2c58cb30c26f12238ddc20
-
SHA1
c3369c2894a748ac2c4b91dfabaf44734e91aaa9
-
SHA256
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57
-
SHA512
19edbc92ff4e1989bd40118bbc996c880587aff8106cf10374e078386fd86724abba49fbd0b63008e87e2457369bec2c055bf79566b189e0cc206f1b86ad95b9
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe = "C:\\Windows\\System32\\ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe" ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-790714498-1549421491-1643397139-1000\desktop.ini ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\desktop.ini ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe -
Drops file in System32 directory 1 IoCs
Processes:
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exedescription ioc process File created C:\Windows\System32\ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-125_contrast-white.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javafx_iio.dll.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial-ppd.xrm-ms ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_zh_CN.jar.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-36_contrast-white.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightDemiItalic.ttf.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.zh_CN_5.5.0.165303.jar.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\glib-lite.dll ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\org-openide-filesystems_ja.jar ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\org-openide-filesystems.jar ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-coredump.jar.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jmx_ja.jar.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailWideTile.scale-150.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.core.commands_0.10.2.v20140424-2344.jar.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PowerPointNaiveBayesCommandRanker.txt ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.emf.ecore.change_2.10.0.v20140901-1043.jar ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvmstat.xml ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\meta-index ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-ul-phn.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_Subscription-ppd.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\TracePendingIcon-glyph-E72C.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jsse.jar.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2.16.GrayF.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC32.DLL.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\WideTile.scale-125.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-100_contrast-white.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-pl.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui_5.5.0.165303.jar ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-pl.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-black_scale-180.png.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_MouseEar.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ppd.xrm-ms ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeTile.scale-200_contrast-black.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-16_altform-unplated.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0115-0409-1000-0000000FF1CE.xml.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\shaded.dotx.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ul-oob.xrm-ms ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageBadgeLogo.scale-125_contrast-black.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\MedTile.scale-200.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.properties ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_KMS_Client_AE-ul.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue II.xml.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_SubTrial-pl.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_Subscription-ul-oob.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-pl.xrm-ms ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_MAK_AE-pl.xrm-ms ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarSplashLogo.scale-400.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\gu.pak ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-phn.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\WideTile.scale-100.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-32_contrast-high.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-phn.xrm-ms.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-80_altform-unplated.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSplashLogo.scale-400.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler.jar.id-4576F852.[[email protected]].14x ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-125_contrast-white.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-400_contrast-black.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-40_altform-unplated_contrast-white.png ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1104 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exepid process 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 3540 vssvc.exe Token: SeRestorePrivilege 3540 vssvc.exe Token: SeAuditPrivilege 3540 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.execmd.exedescription pid process target process PID 324 wrote to memory of 3784 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe cmd.exe PID 324 wrote to memory of 3784 324 ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe cmd.exe PID 3784 wrote to memory of 616 3784 cmd.exe mode.com PID 3784 wrote to memory of 616 3784 cmd.exe mode.com PID 3784 wrote to memory of 1104 3784 cmd.exe vssadmin.exe PID 3784 wrote to memory of 1104 3784 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe"C:\Users\Admin\AppData\Local\Temp\ceeebc607039d96fd8dea033f23e9323190c60c9aecd9fe2b93f82979af1fc57.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:616
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1104
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3540