Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe
Resource
win10v2004-20220414-en
General
-
Target
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe
-
Size
254KB
-
MD5
bbba01a6c32d8ac6682dc99e0b402ef3
-
SHA1
63e0503b313ae1c91cd80b975268f3a28fd71cbd
-
SHA256
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f
-
SHA512
4f987303c750a4e8880e754e1bb5a6b0a9de7a7d101c9da4dfe886a9abbdad4cc674c9a4208caba8c75cb1aca5179b78dcf9f3e80fc0a28bb265dc887e2e0576
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
http://dj55huaqbbsnhwngb5rgeq65ns3nteyon7wlp32gkamzs3k2ogrdr5qd.onion/chat.php
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 5 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe = "C:\\Windows\\System32\\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe" 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\P4R98AUH\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Music\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Links\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D396AG1W\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I7JGZPUA\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\Documents\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\8WU7A3BP\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\PWZ8QZ9F\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2HTZSS82\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Public\Music\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Drops file in System32 directory 2 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File created C:\Windows\System32\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Windows\System32\Info.hta 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Drops file in Program Files directory 64 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaremr.dll.mui 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Yakutsk.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00453_.WMF 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Clarity.xml.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME37.CSS.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluHandle.png 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_zh_TW.properties.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145168.JPG 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\HEADER.GIF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guatemala.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\icudt26l.dat 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\feature.properties 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01184_.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+7 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293240.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Rangoon.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153514.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-uisupport.jar.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00810_.WMF 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_ja.jar.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\TAB_ON.GIF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0183574.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL_COL.HXT.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0305493.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationClientsideProviders.resources.dll 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\wmlaunch.exe.mui 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-favorites.xml.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jmx.xml.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\ij.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287018.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03224I.JPG.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01747_.GIF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18250_.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL093.XML 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0221903.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\ACTIVITS.ICO.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WSIDBR98.POC 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Kosrae.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18254_.WMF 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\extensibility.dll.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-remote.xml.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Shanghai 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\VSTOLoaderUI.dll.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_en.dll 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Internet Explorer\pdmproxy100.dll 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.Xml.xml 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excel.exe.manifest.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\ActionsPane3.xsd.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)alertIcon.png 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-crescent_partly-cloudy.png 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01084_.WMF 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01170_.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CHECKER.POC.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241037.WMF.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02053J.JPG.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285444.WMF 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationProvider.resources.dll 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf.id-68071F82.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2044 vssadmin.exe 1784 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exepid process 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 644 vssvc.exe Token: SeRestorePrivilege 644 vssvc.exe Token: SeAuditPrivilege 644 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.execmd.execmd.exedescription pid process target process PID 1180 wrote to memory of 2040 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 1180 wrote to memory of 2040 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 1180 wrote to memory of 2040 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 1180 wrote to memory of 2040 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 2040 wrote to memory of 1328 2040 cmd.exe mode.com PID 2040 wrote to memory of 1328 2040 cmd.exe mode.com PID 2040 wrote to memory of 1328 2040 cmd.exe mode.com PID 2040 wrote to memory of 2044 2040 cmd.exe vssadmin.exe PID 2040 wrote to memory of 2044 2040 cmd.exe vssadmin.exe PID 2040 wrote to memory of 2044 2040 cmd.exe vssadmin.exe PID 1180 wrote to memory of 976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 1180 wrote to memory of 976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 1180 wrote to memory of 976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 1180 wrote to memory of 976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 976 wrote to memory of 1572 976 cmd.exe mode.com PID 976 wrote to memory of 1572 976 cmd.exe mode.com PID 976 wrote to memory of 1572 976 cmd.exe mode.com PID 976 wrote to memory of 1784 976 cmd.exe vssadmin.exe PID 976 wrote to memory of 1784 976 cmd.exe vssadmin.exe PID 976 wrote to memory of 1784 976 cmd.exe vssadmin.exe PID 1180 wrote to memory of 2028 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe PID 1180 wrote to memory of 2028 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe PID 1180 wrote to memory of 2028 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe PID 1180 wrote to memory of 2028 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe PID 1180 wrote to memory of 1976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe PID 1180 wrote to memory of 1976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe PID 1180 wrote to memory of 1976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe PID 1180 wrote to memory of 1976 1180 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe"C:\Users\Admin\AppData\Local\Temp\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1328
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2044
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1572
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1784
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2028
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:1976
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55445900eedf179cc1a4c4050e2188ed7
SHA16e3966bba122320b8ea4f11c0201051faad90fec
SHA256c35ee8dea96cd8046379c8fa52bfa1f39345cf51e3a397f83bfb56070b0ed521
SHA512de4ea58c2fd6ac20c6fcd3cf2f13d178748df788049fe3b4f832a6984bac248df8306d9daac546ab622e52763b872ff77ee0f275f05c78ae799ea050f9fa31a6
-
Filesize
7KB
MD55445900eedf179cc1a4c4050e2188ed7
SHA16e3966bba122320b8ea4f11c0201051faad90fec
SHA256c35ee8dea96cd8046379c8fa52bfa1f39345cf51e3a397f83bfb56070b0ed521
SHA512de4ea58c2fd6ac20c6fcd3cf2f13d178748df788049fe3b4f832a6984bac248df8306d9daac546ab622e52763b872ff77ee0f275f05c78ae799ea050f9fa31a6