Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-05-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe
Resource
win10v2004-20220414-en
General
-
Target
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe
-
Size
425KB
-
MD5
a204a6598182464aec31426ef3190cf1
-
SHA1
5af8a417b66cd5a20ae4c01d648ce5f26a1e9ef1
-
SHA256
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca
-
SHA512
0e6e05645cc59f21a6671d401b939f5504038f24c78e2f8a6756e962af791a9e7667828716ec8e52016f131d34e8d075a95cef4a803a8b3b023591d8efbc5bb8
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe = "C:\\Windows\\System32\\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe" 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Drops desktop.ini file(s) 12 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Drops file in System32 directory 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File created C:\Windows\System32\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription pid process target process PID 1212 set thread context of 1680 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Drops file in Program Files directory 64 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\7-Zip\Lang\pl.txt.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\include\classfile_constants.h.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04108_.WMF 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.docs.zh_CN_5.5.0.165303.jar 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\PREVIEW.GIF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.nl_ja_4.4.0.v20140623020002.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ChessMCE.png 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.engine.nl_ja_4.4.0.v20140623020002.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.forms.nl_ja_4.4.0.v20140623020002.jar 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_windy.png 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02039U.BMP.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00486_.WMF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\WindowsAccessBridge-64.dll.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre7\bin\jfxmedia.dll.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Belize.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\settings.css 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\METCONV.TXT 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099172.WMF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Manaus.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee90.tlb 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01332U.BMP 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00919_.WMF 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\org-netbeans-modules-profiler_visualvm.jar 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Boa_Vista.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00202_.WMF 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00276_.WMF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\settings.css 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT-10.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00914_.WMF 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedShuangPin.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-visual_ja.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-options-keymap.jar 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh89 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\contbig.gif 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.lucene.analysis_3.5.0.v20120725-1805.jar 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099171.WMF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_zh_CN.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuching.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\7-Zip\Lang\uz.txt.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-actions.xml.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-10.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01046J.JPG 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\System\it-IT\wab32res.dll.mui 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\feature.xml 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.SF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text_3.5.300.v20130515-1451.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107192.WMF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre7\bin\eula.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02398U.BMP 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_hu.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\adovbs.inc 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02282_.WMF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jre7\lib\zi\America\Rankin_Inlet.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\stopNetworkServer.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\charsets.jar.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Qyzylorda 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01176_.WMF 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00833_.WMF 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfr.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2ssv.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086478.WMF.id-2169807F.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 268 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exepid process 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 552 vssvc.exe Token: SeRestorePrivilege 552 vssvc.exe Token: SeAuditPrivilege 552 vssvc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.execmd.exedescription pid process target process PID 1212 wrote to memory of 1680 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 1212 wrote to memory of 1680 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 1212 wrote to memory of 1680 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 1212 wrote to memory of 1680 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 1212 wrote to memory of 1680 1212 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 1680 wrote to memory of 1280 1680 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe cmd.exe PID 1680 wrote to memory of 1280 1680 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe cmd.exe PID 1680 wrote to memory of 1280 1680 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe cmd.exe PID 1680 wrote to memory of 1280 1680 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe cmd.exe PID 1280 wrote to memory of 1004 1280 cmd.exe mode.com PID 1280 wrote to memory of 1004 1280 cmd.exe mode.com PID 1280 wrote to memory of 1004 1280 cmd.exe mode.com PID 1280 wrote to memory of 268 1280 cmd.exe vssadmin.exe PID 1280 wrote to memory of 268 1280 cmd.exe vssadmin.exe PID 1280 wrote to memory of 268 1280 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe"C:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exeC:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\mode.commode con cp select=12514⤵PID:1004
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:268
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:552