Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-03-2022 19:39
Static task
static1
Behavioral task
behavioral1
Sample
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe
Resource
win10v2004-en-20220113
General
-
Target
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe
-
Size
92KB
-
MD5
e874441b0e0c0fa908b9ee2b4fcc91e9
-
SHA1
13defa034619bf14c1b64a485c9b37e3b20cc1c1
-
SHA256
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363
-
SHA512
46776eda623f59aa91a4ece0ff55d687e714a7f2132b197f8ef639f2ccfd4205f589106b541fde5a598fba2881fac7f5b44110872c006fa8d803692a206d92d8
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\EnterCheckpoint.tiff 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Pictures\InstallDismount.tiff 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Pictures\RedoMove.tiff 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Drops startup file 5 IoCs
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe = "C:\\Windows\\System32\\5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe" 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exedescription ioc process File opened for modification C:\Users\Admin\Music\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1346565761-3498240568-4147300184-1000\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\Videos\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\Documents\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Links\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\Music\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\desktop.ini 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Drops file in System32 directory 2 IoCs
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exedescription ioc process File created C:\Windows\System32\5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Windows\System32\Info.hta 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Drops file in Program Files directory 64 IoCs
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-ul-oob.xrm-ms 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\EXCELPLUGINCORE.DLL.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\rhp_world_icon_hover.png.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1253.TXT.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_bho_64.dll 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxMediumTile.scale-100.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Trial-pl.xrm-ms.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluDCFilesEmpty_180x180.svg.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-br.dll.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Google.scale-250.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sendforcomments_18.svg.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\XLLEX.DLL.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\DEEPBLUE\DEEPBLUE.ELM 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\7-Zip\Lang\fur.txt.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\Dismiss.scale-64.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-48.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ul-oob.xrm-ms.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviewers.gif.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-il\ui-strings.js 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\sfs_icons.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\ui-strings.js.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\WideTile.scale-125.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial5-ppd.xrm-ms.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ppd.xrm-ms.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-down_32.svg.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\dumpmeta.luac.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-180.png.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxSmallTile.scale-125.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.scale-200_contrast-black.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ui-strings.js 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pt-br\ui-strings.js.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\api-ms-win-crt-private-l1-1-0.dll 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pl-pl\ui-strings.js.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\oledb32r.dll.mui 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookLargeTile.scale-200.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\TagAlbumDefinitions\8C918D9A-F447-4EBD-BD45-29F1D9209FC9.json 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTest-ul-oob.xrm-ms 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pt-br\ui-strings.js.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\169.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_targetsize-96.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-GoogleCloudCacheMini.scale-150.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_Subscription-ul-oob.xrm-ms.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Retail-ul-phn.xrm-ms.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pt-br\ui-strings.js.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdarem.dll 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-PT.pak.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\onboarding\contacts_permission_android.gif 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\da-dk\ui-strings.js.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\api-ms-win-core-timezone-l1-1-0.dll.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_autodel_plugin.dll.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_es.properties 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\ui-strings.js 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\VBE7.DLL.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\MSFT_PackageManagement.strings.psd1.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\MSOSEC.XML.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected].[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\ui-strings.js.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\epl-v10.html 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-80.png 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\tl.gif.id-5E59ECB9.[[email protected]].ZIN 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 4528 vssadmin.exe 756 vssadmin.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exepid process 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4624 vssvc.exe Token: SeRestorePrivilege 4624 vssvc.exe Token: SeAuditPrivilege 4624 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.execmd.execmd.exedescription pid process target process PID 3264 wrote to memory of 3660 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe cmd.exe PID 3264 wrote to memory of 3660 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe cmd.exe PID 3660 wrote to memory of 3852 3660 cmd.exe mode.com PID 3660 wrote to memory of 3852 3660 cmd.exe mode.com PID 3660 wrote to memory of 4528 3660 cmd.exe vssadmin.exe PID 3660 wrote to memory of 4528 3660 cmd.exe vssadmin.exe PID 3264 wrote to memory of 4768 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe cmd.exe PID 3264 wrote to memory of 4768 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe cmd.exe PID 4768 wrote to memory of 684 4768 cmd.exe mode.com PID 4768 wrote to memory of 684 4768 cmd.exe mode.com PID 4768 wrote to memory of 756 4768 cmd.exe vssadmin.exe PID 4768 wrote to memory of 756 4768 cmd.exe vssadmin.exe PID 3264 wrote to memory of 632 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe mshta.exe PID 3264 wrote to memory of 632 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe mshta.exe PID 3264 wrote to memory of 1632 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe mshta.exe PID 3264 wrote to memory of 1632 3264 5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe"C:\Users\Admin\AppData\Local\Temp\5c40efc5d62c055eba9a2679d660d3cd4315358a63c396f3baecc27da1eed363.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:3852
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4528 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:684
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:756 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:632
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:1632
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:2388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaMD5
9588ae73967b4f95f8a7110a49bac2b7
SHA1777e320f4c68e1259d739f21caf14db28b2cebc4
SHA256209ba84adcb8e01eddb416d1ddb04aacb6bd0f48f8db581a0b7260c40b1e1dc1
SHA51261a2cbc8e9dcbbc31bfbd7073eaebea2fe7750d3de348852249a96dd57c127012ec194f53a6ce90bebc0bc9e31f992dfd0064289e71ee1ccae5084d8ba245340
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaMD5
9588ae73967b4f95f8a7110a49bac2b7
SHA1777e320f4c68e1259d739f21caf14db28b2cebc4
SHA256209ba84adcb8e01eddb416d1ddb04aacb6bd0f48f8db581a0b7260c40b1e1dc1
SHA51261a2cbc8e9dcbbc31bfbd7073eaebea2fe7750d3de348852249a96dd57c127012ec194f53a6ce90bebc0bc9e31f992dfd0064289e71ee1ccae5084d8ba245340
-
memory/2388-134-0x0000015284940000-0x0000015284950000-memory.dmpFilesize
64KB
-
memory/2388-135-0x0000015285520000-0x0000015285530000-memory.dmpFilesize
64KB
-
memory/2388-136-0x00000152855E0000-0x00000152855E1000-memory.dmpFilesize
4KB
-
memory/2388-137-0x00000152855E0000-0x00000152855E1000-memory.dmpFilesize
4KB
-
memory/2388-138-0x00000152878B0000-0x00000152878B4000-memory.dmpFilesize
16KB