Analysis
-
max time kernel
182s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-04-2022 17:56
Static task
static1
Behavioral task
behavioral1
Sample
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe
Resource
win10v2004-20220414-en
General
-
Target
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe
-
Size
139KB
-
MD5
6701c127b786991e4b7da189db851667
-
SHA1
7db26a3dd0e2d5498f0755fd46e7f04a3f9d758c
-
SHA256
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2
-
SHA512
ede5c4e03833d0db7323893e18945deec1d549affc2087940abc223b297204bc5c8e26bfb3cec542836b600f024c3f7fe0898668bb60145caddf215a5ac407e5
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe = "C:\\Windows\\System32\\653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe" 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\desktop.ini 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\desktop.ini 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe -
Drops file in System32 directory 1 IoCs
Processes:
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exedescription ioc process File created C:\Windows\System32\653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe -
Drops file in Program Files directory 64 IoCs
Processes:
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-tw.dll.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\nl.pak.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\MANIFEST.MF 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\basicsimple.dotx 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\stopNetworkServer 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-sendopts.xml.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-text.xml.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\card_terms_dict.txt 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_ja_4.4.0.v20140623020002.jar 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help_3.6.0.v20130326-1254.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lt-lt.dll 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tipskins.dll 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\feature.xml 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark.css 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-api-caching.xml 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange.xml 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer2019_eula.txt 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-utilities.xml.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-execution.xml.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2ssv.dll 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets.nl_ja_4.4.0.v20140623020002.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\alert_obj.png.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\net.properties.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPoint.PowerPoint.x-none.msi.16.x-none.xml 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcvbs.inc 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.xml 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-views.xml 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ja_JP.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\console_view.png.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.properties.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.app_1.3.200.v20130910-1609.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.nl_zh_4.4.0.v20140623020002.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es.pak.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.ja_5.5.0.165303.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense_eula.txt.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-text.xml 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Author2String.XSL.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.nl_zh_4.4.0.v20140623020002.jar.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File created C:\Program Files\7-Zip\Lang\fa.txt.id-258DD64C.[[email protected]].ROGER 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msaddsr.dll.mui 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\eclipse_update_120.jpg 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4680 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exepid process 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4832 vssvc.exe Token: SeRestorePrivilege 4832 vssvc.exe Token: SeAuditPrivilege 4832 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.execmd.exedescription pid process target process PID 4852 wrote to memory of 3376 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe cmd.exe PID 4852 wrote to memory of 3376 4852 653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe cmd.exe PID 3376 wrote to memory of 632 3376 cmd.exe mode.com PID 3376 wrote to memory of 632 3376 cmd.exe mode.com PID 3376 wrote to memory of 4680 3376 cmd.exe vssadmin.exe PID 3376 wrote to memory of 4680 3376 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe"C:\Users\Admin\AppData\Local\Temp\653efc3a4dec10ffb97b2bcd0b3197731a00b9f412eb0b31506ba27d628f71d2.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:632
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4680
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4832