Analysis
-
max time kernel
169s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 06:49
Static task
static1
Behavioral task
behavioral1
Sample
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe
Resource
win10v2004-20220414-en
General
-
Target
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe
-
Size
152KB
-
MD5
d6404f089ef2bfb45a8a890fdb30b980
-
SHA1
e7a5369e72ecc7b013b124a8c2ada9918a3ef930
-
SHA256
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605
-
SHA512
36a3ef42420beaacac79d7d2863ec7f67f83be7ad8c9863fede4d84ad79d093a1d103ad8989bb60fb9f7db09a7558429d141768fcdca49b91789be43dcbe0426
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.top/?9B7FDA8D33FEC3F9CD9E338A11EDDD73
http://lockbitks2tvnmwk.onion/?9B7FDA8D33FEC3F9CD9E338A11EDDD73
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1952 bcdedit.exe 972 bcdedit.exe -
Processes:
wbadmin.exepid process 1504 wbadmin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe\"" 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exepid process 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe -
Drops file in Program Files directory 64 IoCs
Processes:
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.ui.nl_zh_4.4.0.v20140623020002.jar 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02740G.GIF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_ja.jar 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CG1606.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14997_.GIF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21427_.GIF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.services_1.1.0.v20140328-1925.jar 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File created C:\Program Files\Windows Defender\de-DE\Restore-My-Files.txt 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0160590.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR36F.GIF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105412.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Fancy.dotx 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\SWBELL.NET.XML 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313965.JPG 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART6.BDR 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\INVITE11.POC 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\DVD Maker\es-ES\DVDMaker.exe.mui 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Bogota 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185842.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR40F.GIF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04267_.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099168.JPG 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00223_.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\Restore-My-Files.txt 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Araguaina 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\Restore-My-Files.txt 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00343_.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03668_.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107724.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02077_.GIF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+12 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02291U.BMP 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21503_.GIF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_ja.jar 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-api_zh_CN.jar 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kamchatka 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02092_.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGACCBAR.DPV 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\localizedStrings.js 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00636_.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Metro.xml 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUDGESCH.HTM 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Sofia 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HTECH_01.MID 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0297749.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Country.css 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.xml 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\New_Salem 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\timeZones.js 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Equity.eftx 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\ECLIPSE_.SF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\Restore-My-Files.txt 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\vlc.mo 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\vlc.mo 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME53.CSS 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01858_.WMF 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\CST6 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1476 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exepid process 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exevssvc.exeWMIC.exewbengine.exedescription pid process Token: SeTakeOwnershipPrivilege 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe Token: SeDebugPrivilege 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe Token: SeBackupPrivilege 1132 vssvc.exe Token: SeRestorePrivilege 1132 vssvc.exe Token: SeAuditPrivilege 1132 vssvc.exe Token: SeIncreaseQuotaPrivilege 1728 WMIC.exe Token: SeSecurityPrivilege 1728 WMIC.exe Token: SeTakeOwnershipPrivilege 1728 WMIC.exe Token: SeLoadDriverPrivilege 1728 WMIC.exe Token: SeSystemProfilePrivilege 1728 WMIC.exe Token: SeSystemtimePrivilege 1728 WMIC.exe Token: SeProfSingleProcessPrivilege 1728 WMIC.exe Token: SeIncBasePriorityPrivilege 1728 WMIC.exe Token: SeCreatePagefilePrivilege 1728 WMIC.exe Token: SeBackupPrivilege 1728 WMIC.exe Token: SeRestorePrivilege 1728 WMIC.exe Token: SeShutdownPrivilege 1728 WMIC.exe Token: SeDebugPrivilege 1728 WMIC.exe Token: SeSystemEnvironmentPrivilege 1728 WMIC.exe Token: SeRemoteShutdownPrivilege 1728 WMIC.exe Token: SeUndockPrivilege 1728 WMIC.exe Token: SeManageVolumePrivilege 1728 WMIC.exe Token: 33 1728 WMIC.exe Token: 34 1728 WMIC.exe Token: 35 1728 WMIC.exe Token: SeIncreaseQuotaPrivilege 1728 WMIC.exe Token: SeSecurityPrivilege 1728 WMIC.exe Token: SeTakeOwnershipPrivilege 1728 WMIC.exe Token: SeLoadDriverPrivilege 1728 WMIC.exe Token: SeSystemProfilePrivilege 1728 WMIC.exe Token: SeSystemtimePrivilege 1728 WMIC.exe Token: SeProfSingleProcessPrivilege 1728 WMIC.exe Token: SeIncBasePriorityPrivilege 1728 WMIC.exe Token: SeCreatePagefilePrivilege 1728 WMIC.exe Token: SeBackupPrivilege 1728 WMIC.exe Token: SeRestorePrivilege 1728 WMIC.exe Token: SeShutdownPrivilege 1728 WMIC.exe Token: SeDebugPrivilege 1728 WMIC.exe Token: SeSystemEnvironmentPrivilege 1728 WMIC.exe Token: SeRemoteShutdownPrivilege 1728 WMIC.exe Token: SeUndockPrivilege 1728 WMIC.exe Token: SeManageVolumePrivilege 1728 WMIC.exe Token: 33 1728 WMIC.exe Token: 34 1728 WMIC.exe Token: 35 1728 WMIC.exe Token: SeBackupPrivilege 604 wbengine.exe Token: SeRestorePrivilege 604 wbengine.exe Token: SeSecurityPrivilege 604 wbengine.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.execmd.exedescription pid process target process PID 1172 wrote to memory of 1744 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe cmd.exe PID 1172 wrote to memory of 1744 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe cmd.exe PID 1172 wrote to memory of 1744 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe cmd.exe PID 1172 wrote to memory of 1744 1172 97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe cmd.exe PID 1744 wrote to memory of 1476 1744 cmd.exe vssadmin.exe PID 1744 wrote to memory of 1476 1744 cmd.exe vssadmin.exe PID 1744 wrote to memory of 1476 1744 cmd.exe vssadmin.exe PID 1744 wrote to memory of 1728 1744 cmd.exe WMIC.exe PID 1744 wrote to memory of 1728 1744 cmd.exe WMIC.exe PID 1744 wrote to memory of 1728 1744 cmd.exe WMIC.exe PID 1744 wrote to memory of 1952 1744 cmd.exe bcdedit.exe PID 1744 wrote to memory of 1952 1744 cmd.exe bcdedit.exe PID 1744 wrote to memory of 1952 1744 cmd.exe bcdedit.exe PID 1744 wrote to memory of 972 1744 cmd.exe bcdedit.exe PID 1744 wrote to memory of 972 1744 cmd.exe bcdedit.exe PID 1744 wrote to memory of 972 1744 cmd.exe bcdedit.exe PID 1744 wrote to memory of 1504 1744 cmd.exe wbadmin.exe PID 1744 wrote to memory of 1504 1744 cmd.exe wbadmin.exe PID 1744 wrote to memory of 1504 1744 cmd.exe wbadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe"C:\Users\Admin\AppData\Local\Temp\97dc0777cadf1db157c5bb345a82a0757da92eb21d6a7402e11ea3e2d6209605.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/972-63-0x0000000000000000-mapping.dmp
-
memory/1172-54-0x00000000002CB000-0x00000000002E2000-memory.dmpFilesize
92KB
-
memory/1172-55-0x00000000755A1000-0x00000000755A3000-memory.dmpFilesize
8KB
-
memory/1172-58-0x00000000002CB000-0x00000000002E2000-memory.dmpFilesize
92KB
-
memory/1172-59-0x00000000001B0000-0x00000000001D6000-memory.dmpFilesize
152KB
-
memory/1172-60-0x0000000000400000-0x0000000002FB1000-memory.dmpFilesize
43.7MB
-
memory/1476-57-0x0000000000000000-mapping.dmp
-
memory/1504-64-0x0000000000000000-mapping.dmp
-
memory/1504-65-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmpFilesize
8KB
-
memory/1728-61-0x0000000000000000-mapping.dmp
-
memory/1744-56-0x0000000000000000-mapping.dmp
-
memory/1952-62-0x0000000000000000-mapping.dmp