Analysis
-
max time kernel
186s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe
Resource
win10v2004-20220414-en
General
-
Target
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe
-
Size
431KB
-
MD5
01908989c865949654fd19b58fc9657c
-
SHA1
a515287d73a6655c01accf6ca3705dd19c9b0d21
-
SHA256
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550
-
SHA512
a93c0f6d739cba56a730a99600f226df68083e136d5be125c9448effd79662ea6019f9a0129b2782afc86e55c8f12bf05b4066791c30550265323cc83477b062
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\StartEnter.tiff 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Drops startup file 4 IoCs
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe = "C:\\Windows\\System32\\00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe" 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exedescription ioc process File opened for modification C:\Users\Admin\3D Objects\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\Videos\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Music\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Links\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\Documents\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\Music\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Drops file in System32 directory 1 IoCs
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exedescription ioc process File created C:\Windows\System32\00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Drops file in Program Files directory 64 IoCs
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exedescription ioc process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\SearchEmail2x.png.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-compat_ja.jar.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\css\main-selector.css 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-80.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_checkbox_partialselected-default_18.svg.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketchAppService\ReadMe.txt 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-72_altform-lightunplated.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ru-ru\ui-strings.js 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\mashupcompression.dll.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-core.xml.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL077.XML.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\StoreLogo.scale-200_contrast-white.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN082.XML.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CANYON\PREVIEW.GIF 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings_0.10.200.v20140424-2042.jar 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-core-file-l2-1-0.dll 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-pl.xrm-ms.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\j2pkcs11.dll.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ul-oob.xrm-ms.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-140.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Retail-pl.xrm-ms 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_hu.jar.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.scale-100.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\MedTile.scale-100_contrast-white.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\pl-pl\ui-strings.js 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-20.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\v8_context_snapshot.bin.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-si\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\v8_context_snapshot.bin.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_de_DE.jar 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\plugin.js 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ul-oob.xrm-ms.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\198.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_contrast-black.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\icons_ie8.gif.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp-pl.xrm-ms.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ul-oob.xrm-ms.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-spi-actions.jar 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-de_de_2x.gif.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-60.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sk-sk\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ca-es\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageSmallTile.scale-150_contrast-white.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\invalid32x32.gif.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach.zh_CN_5.5.0.165303.jar.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\zh-cn_get.svg.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-100.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-64.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\nb-no\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_ja_4.4.0.v20140623020002.jar 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sl-sl\ui-strings.js.id-732124AC.[telegram_@spacedatax].ROGER 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\Movie-TVStoreLogo.scale-100_contrast-black.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-fr\ui-strings.js 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\illustrations_retina.png 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Program crash 45 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2564 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3228 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2648 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2288 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1456 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3284 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 204 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3996 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 628 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 288 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1088 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3120 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 4048 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2720 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1212 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3644 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2552 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1936 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2792 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3816 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3716 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3992 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 3060 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 276 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2656 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1568 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2892 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2720 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 360 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 440 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 616 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2608 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2232 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2824 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 444 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 4008 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 4072 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 280 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2260 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2596 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2040 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1212 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 440 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1532 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 1420 2588 WerFault.exe 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3380 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exepid process 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1764 vssvc.exe Token: SeRestorePrivilege 1764 vssvc.exe Token: SeAuditPrivilege 1764 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.execmd.exedescription pid process target process PID 2588 wrote to memory of 1492 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe cmd.exe PID 2588 wrote to memory of 1492 2588 00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe cmd.exe PID 1492 wrote to memory of 1644 1492 cmd.exe mode.com PID 1492 wrote to memory of 1644 1492 cmd.exe mode.com PID 1492 wrote to memory of 3380 1492 cmd.exe vssadmin.exe PID 1492 wrote to memory of 3380 1492 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe"C:\Users\Admin\AppData\Local\Temp\00fd74dd5519249df4a2ac90f8d22616d2a068c520d41ee19b53c7311ab65550.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1644
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6282⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6482⤵
- Program crash
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6642⤵
- Program crash
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6962⤵
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6682⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 7002⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 7522⤵
- Program crash
PID:204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6922⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6522⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8082⤵
- Program crash
PID:288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8402⤵
- Program crash
PID:1088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8242⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8602⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8122⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9922⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10002⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9682⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9002⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9482⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10162⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9042⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9642⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9882⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8962⤵
- Program crash
PID:276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9042⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9522⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10042⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9002⤵
- Program crash
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8722⤵
- Program crash
PID:360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10042⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8722⤵
- Program crash
PID:616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9522⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8842⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8282⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9362⤵
- Program crash
PID:444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8842⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9962⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9642⤵
- Program crash
PID:280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8442⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10042⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8642⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 7442⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9562⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 9922⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 8722⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2588 -ip 25881⤵PID:1252
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2588 -ip 25881⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2588 -ip 25881⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2588 -ip 25881⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2588 -ip 25881⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2588 -ip 25881⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2588 -ip 25881⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2588 -ip 25881⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2588 -ip 25881⤵PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2588 -ip 25881⤵PID:268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2588 -ip 25881⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2588 -ip 25881⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2588 -ip 25881⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2588 -ip 25881⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2588 -ip 25881⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2588 -ip 25881⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2588 -ip 25881⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 2588 -ip 25881⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 2588 -ip 25881⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2588 -ip 25881⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 2588 -ip 25881⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 2588 -ip 25881⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 2588 -ip 25881⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 2588 -ip 25881⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 2588 -ip 25881⤵PID:296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 2588 -ip 25881⤵PID:504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 2588 -ip 25881⤵PID:420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 2588 -ip 25881⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 852 -p 2588 -ip 25881⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 836 -p 2588 -ip 25881⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 848 -p 2588 -ip 25881⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 2588 -ip 25881⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 940 -p 2588 -ip 25881⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 948 -p 2588 -ip 25881⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 948 -p 2588 -ip 25881⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 932 -p 2588 -ip 25881⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 884 -p 2588 -ip 25881⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 988 -p 2588 -ip 25881⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 988 -p 2588 -ip 25881⤵PID:292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 892 -p 2588 -ip 25881⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 948 -p 2588 -ip 25881⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1012 -p 2588 -ip 25881⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1012 -p 2588 -ip 25881⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 884 -p 2588 -ip 25881⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1004 -p 2588 -ip 25881⤵PID:820