Analysis
-
max time kernel
152s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
30-03-2022 01:13
Static task
static1
Behavioral task
behavioral1
Sample
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe
Resource
win10v2004-20220310-en
General
-
Target
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe
-
Size
201KB
-
MD5
84a756e63874418ad62808c01c4b7409
-
SHA1
fa66a84ae17ed4a78927780c5e975415293a4de0
-
SHA256
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba
-
SHA512
e662910e397457ba3473fa4ab67466f288e62cdb11a6de1f93b9683a8897d2771f0c9403eb0005ede3b7278a77d3d5b9984ca457afcd4073a830e5471f7c738d
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
https://tox.chat/download.html
http://pexdatax.com/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RegisterSuspend.tiff c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Drops startup file 5 IoCs
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe = "C:\\Windows\\System32\\c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe" c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Videos\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\Pictures\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\Desktop\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Searches\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Music\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\Documents\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2403053463-4052593947-3703345493-1000\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\Downloads\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Links\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\Music\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\Videos\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Public\Libraries\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Drops file in System32 directory 2 IoCs
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exedescription ioc process File created C:\Windows\System32\Info.hta c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Windows\System32\c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Drops file in Program Files directory 64 IoCs
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48_altform-unplated_devicefamily-colorfulunplated.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libdca_plugin.dll c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files\7-Zip\Lang\ja.txt.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\PlatformCapabilities\CommonCapabilities.json c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Trial-ul-oob.xrm-ms.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\LargeTile.scale-125.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\VisualElements\SmallLogoCanary.png.DATA c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL087.XML c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-96_altform-unplated.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-filesystem-l1-1-0.dll.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\ui-strings.js c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-ppd.xrm-ms c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_Subscription-pl.xrm-ms c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_ellipses_selected.svg c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_up_selected_18.svg.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\tr-tr\ui-strings.js c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-gb\ui-strings.js c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmkv_plugin.dll.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\Fingerprinting.DATA.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fi.pak c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files\Java\jre1.8.0_66\lib\ext\sunec.jar.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\people\rachelVaughan.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.OData.Core.NetFX35.dll c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon_hover.png.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_de.dll c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00C1-0000-1000-0000000FF1CE.xml.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\AccessMessageDismissal.txt.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\BadgeLogo.scale-100_contrast-black.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\de-de\ui-strings.js.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\pt-br\ui-strings.js c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Net.dll c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Office 2007 - 2010.xml.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\AppPackageMedTile.scale-125_contrast-white.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Background_RoomTracing_Success.jpg c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-24_altform-colorize.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\combinepdf-selector.js c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleAppAssets\Videos\people_fre_motionAsset_p2.mp4 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\dark\rhp_world_icon_hover.png.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\glass.dll.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-32_altform-unplated_contrast-black.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-72_altform-unplated_contrast-white.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\PeopleAppStoreLogo.scale-125.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_KMS_ClientC2R-ul.xrm-ms.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\css\main.css c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-REGULAR.TTF c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\PFM\SY______.PFM.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SlowMotionEditor\UserControls\SuperSlowMotionCheckbox.xbf c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ppd.xrm-ms c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-phn.xrm-ms.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_NinjaCat.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ppd.xrm-ms.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\ui-strings.js.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\sv-se\ui-strings.js c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\IEAWSDC.DLL.id-4916F204.[[email protected]].ROGER c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyShare.scale-200.png c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 4020 vssadmin.exe 1240 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exepid process 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1412 vssvc.exe Token: SeRestorePrivilege 1412 vssvc.exe Token: SeAuditPrivilege 1412 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.execmd.execmd.exedescription pid process target process PID 3976 wrote to memory of 2436 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe cmd.exe PID 3976 wrote to memory of 2436 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe cmd.exe PID 2436 wrote to memory of 960 2436 cmd.exe mode.com PID 2436 wrote to memory of 960 2436 cmd.exe mode.com PID 2436 wrote to memory of 4020 2436 cmd.exe vssadmin.exe PID 2436 wrote to memory of 4020 2436 cmd.exe vssadmin.exe PID 3976 wrote to memory of 4520 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe cmd.exe PID 3976 wrote to memory of 4520 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe cmd.exe PID 4520 wrote to memory of 4652 4520 cmd.exe mode.com PID 4520 wrote to memory of 4652 4520 cmd.exe mode.com PID 4520 wrote to memory of 1240 4520 cmd.exe vssadmin.exe PID 4520 wrote to memory of 1240 4520 cmd.exe vssadmin.exe PID 3976 wrote to memory of 3856 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe mshta.exe PID 3976 wrote to memory of 3856 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe mshta.exe PID 3976 wrote to memory of 4812 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe mshta.exe PID 3976 wrote to memory of 4812 3976 c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe"C:\Users\Admin\AppData\Local\Temp\c32ebb0804370f418daa4093c4cb2ef81a5b0cd4b69f78d5316fd624dbb89fba.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:960
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4020
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:4652
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1240
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:3856
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:4812
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD50cf219bc594198e258495add5b4bc4ef
SHA139570f3bfa9730b57260493e70b024a830acfda9
SHA256b0234055f85d27ef1660e03c7c1a1317343060e9c458ac37e86a20fb608677c4
SHA51291465c80c51dff5f7c0b8e045b7816271c4881f7f339c4a3f989edf34934dffc8e9b7cec169a7e71b322a443ecccda17712ba0c5978a10aa8e5c4356c04dd4e4
-
Filesize
7KB
MD50cf219bc594198e258495add5b4bc4ef
SHA139570f3bfa9730b57260493e70b024a830acfda9
SHA256b0234055f85d27ef1660e03c7c1a1317343060e9c458ac37e86a20fb608677c4
SHA51291465c80c51dff5f7c0b8e045b7816271c4881f7f339c4a3f989edf34934dffc8e9b7cec169a7e71b322a443ecccda17712ba0c5978a10aa8e5c4356c04dd4e4