Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
27-03-2022 21:26
Static task
static1
Behavioral task
behavioral1
Sample
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe
Resource
win10v2004-en-20220113
General
-
Target
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe
-
Size
332KB
-
MD5
cdeb26fdda31ec0b91549dd7066be08a
-
SHA1
b6015d8c1ecfaa862b6208e5b516e8369a167b49
-
SHA256
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0
-
SHA512
4f36908b1e90662312c7397cb86aac9c5a2270090573ae2e14069f31cd09f0a6b4de65fde472eca25e509997975753e6c9e9ce6f169d70a95d0b033d530f78cb
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe = "C:\\Windows\\System32\\edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe" edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe -
Drops desktop.ini file(s) 13 IoCs
Processes:
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exedescription ioc process File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-594401021-1341801952-2355885667-1000\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe -
Drops file in System32 directory 1 IoCs
Processes:
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exedescription ioc process File created C:\Windows\System32\edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe -
Drops file in Program Files directory 64 IoCs
Processes:
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD09664_.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIcon.png edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\settings.html edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_Groove.gif edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Aspect.thmx.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdvdread_plugin.dll.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00934_.WMF edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01742_.GIF edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR1B.GIF edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePageStyle.css edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\localedata.jar.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01015_.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239965.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02074U.BMP edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\Java\jdk1.7.0_80\db\3RDPARTY.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.event_1.3.100.v20140115-1647.jar edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00170_.GIF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD09194_.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler.nl_ja_4.4.0.v20140623020002.jar edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304853.WMF edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\shvlzm.exe.mui.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299611.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages.properties edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.ja_5.5.0.165303.jar edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03339_.WMF edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Office\Office14\NPAUTHZ.DLL.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14868_.GIF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-dialogs_ja.jar.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\CLNTWRAP.HTM edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382927.JPG.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PSRCHKEY.DAT.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_ok.gif edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Fiji.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkObj.dll.mui edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedShuangPin.txt edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Anchorage.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Stanley.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.update.configurator.nl_ja_4.4.0.v20140623020002.jar.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\org-openide-util_ja.jar edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\vlc.mo.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvm.xml edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_228ef1_256x240.png edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\bckgzm.exe.mui edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\ChkrRes.dll.mui edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_ON.GIF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\cpu.html edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-io_ja.jar.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101980.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE05870_.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14578_.GIF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME47.CSS.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_ps_plugin.dll edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\accessibility.properties.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\mailapi.jar.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_bottom_left.png edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199465.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0278702.WMF.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\file_obj.gif.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-heapwalker.xml.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\jaccess.jar.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00452_.WMF edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-progress-ui.xml.id-5C12D5A4.[[email protected]].ROGER edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1940 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exepid process 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1496 vssvc.exe Token: SeRestorePrivilege 1496 vssvc.exe Token: SeAuditPrivilege 1496 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.execmd.exedescription pid process target process PID 1620 wrote to memory of 1816 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe cmd.exe PID 1620 wrote to memory of 1816 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe cmd.exe PID 1620 wrote to memory of 1816 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe cmd.exe PID 1620 wrote to memory of 1816 1620 edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe cmd.exe PID 1816 wrote to memory of 1764 1816 cmd.exe mode.com PID 1816 wrote to memory of 1764 1816 cmd.exe mode.com PID 1816 wrote to memory of 1764 1816 cmd.exe mode.com PID 1816 wrote to memory of 1940 1816 cmd.exe vssadmin.exe PID 1816 wrote to memory of 1940 1816 cmd.exe vssadmin.exe PID 1816 wrote to memory of 1940 1816 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe"C:\Users\Admin\AppData\Local\Temp\edc04c29fc92b8a1ef8e47ed9935d54d4d8b93c3d7ab3893e8da749bcc418ac0.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1764
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1940
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1496