Analysis
-
max time kernel
150s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 13:29
Static task
static1
Behavioral task
behavioral1
Sample
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe
Resource
win10v2004-20220414-en
General
-
Target
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe
-
Size
206KB
-
MD5
185fbc550a671187d6aeb3db3bdb22f8
-
SHA1
bf80ac2aa2e0f854366d987f240c780a230f40c5
-
SHA256
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36
-
SHA512
7524b4dba73dc03f83af3ab2bdca4fe65fccb145b4933103b624819603cc6999c4cb42e75fb4c0f5b33ea0d9a7f2bc29b9dfff6460abdcb3acfac29370bf5be5
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 5 IoCs
Processes:
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe = "C:\\Windows\\System32\\502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe" 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exedescription ioc process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z8MOBTG4\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FDVO4NFQ\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Public\Documents\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Public\Videos\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Public\Music\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\1O80FYZJ\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XM8UCER\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9BAYTI1Z\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W5LB8O2W\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Links\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe -
Drops file in System32 directory 1 IoCs
Processes:
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exedescription ioc process File created C:\Windows\System32\502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe -
Drops file in Program Files directory 64 IoCs
Processes:
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\SWBELL.NET.XML 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GIFT.XML 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kabul.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105490.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234001.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_stats_plugin.dll.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\hxds.dll 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKUPD.CFG 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-oql_ja.jar.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdater.cer.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00078_.WMF 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Curacao 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0164153.JPG.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files\7-Zip\descript.ion.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSEngine.dll 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_ta.dll.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\PAWPRINT.HTM 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_08.MID.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcanvas_plugin.dll.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Main.gif.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\MSB1ESEN.DLL.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Verve.eftx.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\PREVIEW.GIF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libtcp_plugin.dll 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_bg.dll.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\Hiring Requisition.fdt.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-api-caching.xml 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187881.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199483.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107458.WMF 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\settings.html 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Canary 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_ja.jar.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_floating.png 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Fancy.dotx.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.DLL.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\GoldRing.png 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-attach.jar.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00417_.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaprsr.dll 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00902_.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04269_.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00564_.WMF 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_SlateBlue.gif.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\STSUPLD.INTL.DLL.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_ja_4.4.0.v20140623020002.jar.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00486_.WMF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15056_.GIF.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.util.gui_1.7.0.v200903091627.jar 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\TAB_ON.GIF 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GRINTL32.DLL.IDX_DLL.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AD.DPV.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-outline.xml.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\Java\jre7\lib\psfontj2d.properties.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\it-IT\msadcfr.dll.mui 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL087.XML.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt.id-79B478B7.[[email protected]].ROGER 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport_mask_right.png 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR20F.GIF 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1396 vssadmin.exe 392 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exepid process 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1500 vssvc.exe Token: SeRestorePrivilege 1500 vssvc.exe Token: SeAuditPrivilege 1500 vssvc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.execmd.execmd.exedescription pid process target process PID 1464 wrote to memory of 736 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 1464 wrote to memory of 736 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 1464 wrote to memory of 736 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 1464 wrote to memory of 736 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 736 wrote to memory of 1108 736 cmd.exe mode.com PID 736 wrote to memory of 1108 736 cmd.exe mode.com PID 736 wrote to memory of 1108 736 cmd.exe mode.com PID 736 wrote to memory of 1396 736 cmd.exe vssadmin.exe PID 736 wrote to memory of 1396 736 cmd.exe vssadmin.exe PID 736 wrote to memory of 1396 736 cmd.exe vssadmin.exe PID 1464 wrote to memory of 1384 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 1464 wrote to memory of 1384 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 1464 wrote to memory of 1384 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 1464 wrote to memory of 1384 1464 502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe cmd.exe PID 1384 wrote to memory of 1992 1384 cmd.exe mode.com PID 1384 wrote to memory of 1992 1384 cmd.exe mode.com PID 1384 wrote to memory of 1992 1384 cmd.exe mode.com PID 1384 wrote to memory of 392 1384 cmd.exe vssadmin.exe PID 1384 wrote to memory of 392 1384 cmd.exe vssadmin.exe PID 1384 wrote to memory of 392 1384 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe"C:\Users\Admin\AppData\Local\Temp\502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1108
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1396
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1992
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:392
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1500