Analysis
-
max time kernel
179s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 11:59
Static task
static1
Behavioral task
behavioral1
Sample
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe
Resource
win10v2004-20220414-en
General
-
Target
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe
-
Size
240KB
-
MD5
7bdd62b697e996cabb3a992be8532971
-
SHA1
3a9052106aa104c96ac3028faa71b09ef7ee5b69
-
SHA256
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4
-
SHA512
fe5568b10cbb97e5122d43e4ad8dfeddc0c09b6c6ae44ff07366a4202fbaedc4d589b36c46419e359a29f6e32cab4849712fafcb635dfc72c82c5f0b3e939651
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe = "C:\\Windows\\System32\\bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe" bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\desktop.ini bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\desktop.ini bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe -
Drops file in System32 directory 1 IoCs
Processes:
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exedescription ioc process File created C:\Windows\System32\bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe -
Drops file in Program Files directory 64 IoCs
Processes:
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring.xml.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_MoveNoDrop32x32.gif bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fi.pak.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME.txt.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaSansDemiBold.ttf bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.alert.zh_CN_5.5.0.165303.jar bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.DCF.DCF.x-none.msi.16.x-none.xml.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0.dll.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.update\platform.xml bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ro.pak.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\console_view.png bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\7-Zip\Lang\tr.txt.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoCanary.png.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\index.gif.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\ECLIPSE_.RSA.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\manifest.json bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaprsr.dll.mui bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.xml.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\sunec.jar.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.common.16.xml.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_preferencestyle.css.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\dnsns.jar bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\MANIFEST.MF.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jli.dll.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jpeg.dll.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\amd64\jvm.cfg bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-1000-0000000FF1CE.xml.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msaddsr.dll.mui bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_ko.properties bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\da.pak bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\msvcr100.dll bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.alert_5.5.0.165303.jar.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\7-Zip\Lang\kab.txt.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-javahelp.xml bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_fr.properties bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\ECLIPSE_.SF bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OSMUX.OSMUX.x-none.msi.16.x-none.xml bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.syntheticattribute.exsd bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\splash.gif.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\about.html.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\WindowsAccessBridge-64.dll.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPivot.PowerPivot.x-none.msi.16.x-none.xml.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\youtube.crx.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\gstreamer-lite.dll.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfontj2d.properties.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach_5.5.0.165303.jar.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe File created C:\Program Files\7-Zip\Lang\hi.txt.id-B5B9E17E.[telegram_@spacedatax].ROGER bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3700 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exepid process 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4392 vssvc.exe Token: SeRestorePrivilege 4392 vssvc.exe Token: SeAuditPrivilege 4392 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.execmd.exedescription pid process target process PID 1596 wrote to memory of 2788 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe cmd.exe PID 1596 wrote to memory of 2788 1596 bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe cmd.exe PID 2788 wrote to memory of 4692 2788 cmd.exe mode.com PID 2788 wrote to memory of 4692 2788 cmd.exe mode.com PID 2788 wrote to memory of 3700 2788 cmd.exe vssadmin.exe PID 2788 wrote to memory of 3700 2788 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe"C:\Users\Admin\AppData\Local\Temp\bf7912bd83f3a74062274ff0cedd43c64282f5afaf88e77497673433e1ca07b4.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:4692
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3700
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4392