Analysis
-
max time kernel
169s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29-05-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe
Resource
win10v2004-20220414-en
General
-
Target
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe
-
Size
425KB
-
MD5
a204a6598182464aec31426ef3190cf1
-
SHA1
5af8a417b66cd5a20ae4c01d648ce5f26a1e9ef1
-
SHA256
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca
-
SHA512
0e6e05645cc59f21a6671d401b939f5504038f24c78e2f8a6756e962af791a9e7667828716ec8e52016f131d34e8d075a95cef4a803a8b3b023591d8efbc5bb8
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe = "C:\\Windows\\System32\\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe" 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\desktop.ini 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Drops file in System32 directory 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File created C:\Windows\System32\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription pid process target process PID 3112 set thread context of 3580 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Drops file in Program Files directory 64 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\TipRes.dll.mui 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\bundles.info 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ApiClient.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7.png.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-modules.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\msinfo32.exe.mui 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdfmap.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\hr.pak 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\oledb32r.dll.mui 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-coredump.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\THIRDPARTYLICENSEREADME.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\msvcp120.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\win32_LinkNoDrop32x32.gif.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lv.pak 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\vcruntime140.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\blacklist.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\dt.jar.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\feature.properties.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winClassicTSFrame.png.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0409-1000-0000000FF1CE.xml 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPivot.PowerPivot.x-none.msi.16.x-none.xml 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\DESIGNER\MSADDNDR.OLB 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\classfile_constants.h.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\[email protected] 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.it-it.dll 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\BlockReceive.dib.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\diagnostic-command-16.png 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-awt.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red Orange.xml 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer_eula.txt.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\7-Zip\Lang\ky.txt.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msdaremr.dll.mui 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-explorer.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-windows.xml 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\npt.dll.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\CIEXYZ.pf 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.properties.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\ConvertToOpen.3g2.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome.dll.sig.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\MANIFEST.MF.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\mojo_core.dll.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\README.txt 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-1000-0000000FF1CE.xml.id-80513884.[[email protected]].bot 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 5096 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exepid process 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4624 vssvc.exe Token: SeRestorePrivilege 4624 vssvc.exe Token: SeAuditPrivilege 4624 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.execmd.exedescription pid process target process PID 3112 wrote to memory of 3580 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 3112 wrote to memory of 3580 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 3112 wrote to memory of 3580 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 3112 wrote to memory of 3580 3112 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe PID 3580 wrote to memory of 3384 3580 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe cmd.exe PID 3580 wrote to memory of 3384 3580 0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe cmd.exe PID 3384 wrote to memory of 3316 3384 cmd.exe mode.com PID 3384 wrote to memory of 3316 3384 cmd.exe mode.com PID 3384 wrote to memory of 5096 3384 cmd.exe vssadmin.exe PID 3384 wrote to memory of 5096 3384 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe"C:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exeC:\Users\Admin\AppData\Local\Temp\0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\mode.commode con cp select=12514⤵PID:3316
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:5096
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3732
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4624