Analysis
-
max time kernel
153s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 15:12
Static task
static1
Behavioral task
behavioral1
Sample
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe
Resource
win10v2004-20220414-en
General
-
Target
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe
-
Size
121KB
-
MD5
ab63a7a89035d0d5239ae04b4c4199a7
-
SHA1
6393431048f88dc34cd87bd5ef0926de72c8f196
-
SHA256
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074
-
SHA512
b00f9e68792b5428866e7c04fdfce2d789face0e62877421f3c6967e009eae947dab67ab73a842f1d73e2c4aaf9234b4e7b2f2198027c40df916ce86665c0cf0
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
http://pexdatax.com/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\ImportSubmit.tiff 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Pictures\RegisterTrace.tiff 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe -
Drops startup file 5 IoCs
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe = "C:\\Windows\\System32\\195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe" 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exedescription ioc process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Videos\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VCRELHVT\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T2CDOEA4\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\A9INZ3MO\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M1JJU24G\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Music\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\N6KW9TJE\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Documents\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HEH6I4DR\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe -
Drops file in System32 directory 2 IoCs
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exedescription ioc process File created C:\Windows\System32\195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Windows\System32\Info.hta 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe -
Drops file in Program Files directory 64 IoCs
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exedescription ioc process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter.png 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234376.WMF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Urban.xml.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18193_.WMF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_K_COL.HXK.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-modules-appui_zh_CN.jar.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MENU98.POC.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can.hyp.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\AUTOSHAP.DLL.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_ja.jar 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\VelvetRose.css.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate.css.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\MANIFEST.MF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\EXPTOOWS.DLL.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Troll 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106816.WMF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\NOTES.ICO.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMSS.ICO.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309902.WMF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\flyout.css 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\STOCKS.DAT.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdcp_plugin.dll.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Montreal.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02082_.GIF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\System.AddIn.dll 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-core-kit_zh_CN.jar.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_PDF.DLL.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Santo_Domingo.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-private-l1-1-0.dll.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jre7\bin\w2k_lsa_auth.dll.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsImageTemplate.html.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_hyperlink.gif.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02413_.WMF 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\hxdsui.dll.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mshwjpn.dll 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\LINEAR_RGB.pf.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\STUDIO.INF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsMacroTemplate.html.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\ContactSelector.ico.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\calendar.html 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01246_.GIF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143754.GIF 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\WMPDMCCore.dll.mui 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_COL.HXT 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL107.XML.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WPFT632.CNV 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\stopNetworkServer.bat 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.attach_5.5.0.165303.jar.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Mozilla Firefox\install.log.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dt_socket.dll 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaBrightDemiItalic.ttf.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\EEINTL.DLL.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382948.JPG 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15155_.GIF.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSO.DLL.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLKIRM.XML 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\EXITEML.ICO.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous.png 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-10.id-47B9DC33.[[email protected]].ROGER 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00453_.WMF 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1820 vssadmin.exe 1596 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exepid process 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 468 vssvc.exe Token: SeRestorePrivilege 468 vssvc.exe Token: SeAuditPrivilege 468 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.execmd.execmd.exedescription pid process target process PID 1960 wrote to memory of 1668 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1960 wrote to memory of 1668 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1960 wrote to memory of 1668 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1960 wrote to memory of 1668 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1668 wrote to memory of 900 1668 cmd.exe mode.com PID 1668 wrote to memory of 900 1668 cmd.exe mode.com PID 1668 wrote to memory of 900 1668 cmd.exe mode.com PID 1668 wrote to memory of 1820 1668 cmd.exe vssadmin.exe PID 1668 wrote to memory of 1820 1668 cmd.exe vssadmin.exe PID 1668 wrote to memory of 1820 1668 cmd.exe vssadmin.exe PID 1960 wrote to memory of 1720 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1960 wrote to memory of 1720 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1960 wrote to memory of 1720 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1960 wrote to memory of 1720 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe cmd.exe PID 1720 wrote to memory of 1556 1720 cmd.exe mode.com PID 1720 wrote to memory of 1556 1720 cmd.exe mode.com PID 1720 wrote to memory of 1556 1720 cmd.exe mode.com PID 1720 wrote to memory of 1596 1720 cmd.exe vssadmin.exe PID 1720 wrote to memory of 1596 1720 cmd.exe vssadmin.exe PID 1720 wrote to memory of 1596 1720 cmd.exe vssadmin.exe PID 1960 wrote to memory of 524 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe PID 1960 wrote to memory of 524 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe PID 1960 wrote to memory of 524 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe PID 1960 wrote to memory of 524 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe PID 1960 wrote to memory of 1540 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe PID 1960 wrote to memory of 1540 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe PID 1960 wrote to memory of 1540 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe PID 1960 wrote to memory of 1540 1960 195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe"C:\Users\Admin\AppData\Local\Temp\195441de009c9ce6d469e8b150a5f5cbe3a91cef7cdbeca7d7dfb11205af6074.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:900
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1820
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1556
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1596
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:524
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:1540
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD599bfc68b202ea91994fd116ae20bee8e
SHA1233fbea5909eb00899aa25fc0347f760c99bcec2
SHA2564b3373a9d2efff065003afdb91e9c37804b2e0d69b5f4fe58030940b381a8bfb
SHA512c2e6c2ef78083a639d8daaf05241920380f0ab8b406fa60f4022e0481d3f2cf2b631a09415b48698eca20b696d28f3c0dc0f5a5d22fa775a827cdb2f5d414301
-
Filesize
7KB
MD599bfc68b202ea91994fd116ae20bee8e
SHA1233fbea5909eb00899aa25fc0347f760c99bcec2
SHA2564b3373a9d2efff065003afdb91e9c37804b2e0d69b5f4fe58030940b381a8bfb
SHA512c2e6c2ef78083a639d8daaf05241920380f0ab8b406fa60f4022e0481d3f2cf2b631a09415b48698eca20b696d28f3c0dc0f5a5d22fa775a827cdb2f5d414301