Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-04-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe
Resource
win10v2004-20220414-en
General
-
Target
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe
-
Size
254KB
-
MD5
bbba01a6c32d8ac6682dc99e0b402ef3
-
SHA1
63e0503b313ae1c91cd80b975268f3a28fd71cbd
-
SHA256
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f
-
SHA512
4f987303c750a4e8880e754e1bb5a6b0a9de7a7d101c9da4dfe886a9abbdad4cc674c9a4208caba8c75cb1aca5179b78dcf9f3e80fc0a28bb265dc887e2e0576
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe = "C:\\Windows\\System32\\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe" 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\desktop.ini 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Drops file in System32 directory 1 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File created C:\Windows\System32\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Drops file in Program Files directory 64 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exedescription ioc process File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_ja_4.4.0.v20140623020002.jar.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-visual.xml.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\7-Zip\Lang\an.txt.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.zh_CN_5.5.0.165303.jar.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.properties 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\preface.htm 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.app_1.3.200.v20130910-1609.jar.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fa.pak.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_cs.jar 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPOlive.png 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\snmp.acl.template.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.properties 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor_1.0.300.v20131211-1531.jar.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_CN_5.5.0.165303.jar 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.descriptorProvider.exsd.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-sendopts.xml.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\NetworkServerControl.bat.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\hu.pak.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\deployJava1.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\feature.properties.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_hu.jar 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-dialogs.xml.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\jaccess.jar 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\calendars.properties 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_zh_CN.properties 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Common Files\System\ado\msado26.tlb 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\w2k_lsa_auth.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightDemiBold.ttf 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_zh_4.4.0.v20140623020002.jar 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jaas_nt.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javacpl.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\nio.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.ja_5.5.0.165303.jar.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\hprof-16.png.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOLoaderUI.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.nl_zh_4.4.0.v20140623020002.jar 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.properties.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7.png.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\manifest.json.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\LICENSE 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setEmbeddedCP.bat 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.properties.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-settings.xml 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core.nl_ja_4.4.0.v20140623020002.jar 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.es-es.dll.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\jvm.lib.id-3B7022E7.[telegram_@spacedatax].ROGER 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Program crash 25 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4424 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 2028 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 4568 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 456 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 5024 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 2236 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 792 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 2144 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1160 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 4976 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1040 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1244 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 2944 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 4360 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3680 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 4412 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 2940 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 668 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 392 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 912 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 1584 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3504 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 2260 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 2644 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 4164 3356 WerFault.exe 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4860 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exepid process 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2848 vssvc.exe Token: SeRestorePrivilege 2848 vssvc.exe Token: SeAuditPrivilege 2848 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.execmd.exedescription pid process target process PID 3356 wrote to memory of 5044 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 3356 wrote to memory of 5044 3356 010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe cmd.exe PID 5044 wrote to memory of 4132 5044 cmd.exe mode.com PID 5044 wrote to memory of 4132 5044 cmd.exe mode.com PID 5044 wrote to memory of 4860 5044 cmd.exe vssadmin.exe PID 5044 wrote to memory of 4860 5044 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe"C:\Users\Admin\AppData\Local\Temp\010776a6716ad9b20674abab7e20a8e7cae6523a9bad222c8c98ff9bc6c7120f.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:4132
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 5242⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 5322⤵
- Program crash
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 5882⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6042⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6082⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 5722⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 5562⤵
- Program crash
PID:792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6762⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6842⤵
- Program crash
PID:1160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 7282⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 7522⤵
- Program crash
PID:1040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 7682⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 7362⤵
- Program crash
PID:2944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 7762⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6762⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 8722⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 8882⤵
- Program crash
PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 9802⤵
- Program crash
PID:668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 9322⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6762⤵
- Program crash
PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 8842⤵
- Program crash
PID:1584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 9362⤵
- Program crash
PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 9002⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 9202⤵
- Program crash
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 6762⤵
- Program crash
PID:4164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3356 -ip 33561⤵PID:4284
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3356 -ip 33561⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3356 -ip 33561⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3356 -ip 33561⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3356 -ip 33561⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3356 -ip 33561⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3356 -ip 33561⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3356 -ip 33561⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3356 -ip 33561⤵PID:740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3356 -ip 33561⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3356 -ip 33561⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3356 -ip 33561⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3356 -ip 33561⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3356 -ip 33561⤵PID:764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3356 -ip 33561⤵PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3356 -ip 33561⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 3356 -ip 33561⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3356 -ip 33561⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3356 -ip 33561⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 3356 -ip 33561⤵PID:328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 3356 -ip 33561⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3356 -ip 33561⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 3356 -ip 33561⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3356 -ip 33561⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3356 -ip 33561⤵PID:280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3356 -ip 33561⤵PID:4176