Analysis
-
max time kernel
204s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09-06-2022 08:18
Static task
static1
Behavioral task
behavioral1
Sample
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe
Resource
win10v2004-20220414-en
General
-
Target
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe
-
Size
202KB
-
MD5
792f3bdd88a09c14d83d1729e1daaaa6
-
SHA1
3db459771b7b5d89271f2c40946f015a749edcf8
-
SHA256
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41
-
SHA512
d1e0f3f1c4e03c08cf62df380c6aa5be21b6d79cfb1903501aa76d7b54bf34191d4254ac0323291db7afda0c6de9032f8560908fe986f6c26439b168a429d508
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe = "C:\\Windows\\System32\\15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe" 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe -
Drops desktop.ini file(s) 11 IoCs
Processes:
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe -
Drops file in System32 directory 1 IoCs
Processes:
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exedescription ioc process File created C:\Windows\System32\15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe -
Drops file in Program Files directory 64 IoCs
Processes:
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\t2k.dll 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_zh_4.4.0.v20140623020002.jar.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Gaza 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\icon.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tabskb.dll.mui 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata.ja_5.5.0.165303.jar 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\jni_md.h.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\mix.gif.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\npt.dll 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.ja_5.5.0.165303.jar.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\7-Zip\Uninstall.exe.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-overlay.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lt.pak.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\uarrow.gif.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\javafx.properties.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\22.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ja_JP.jar 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Helsinki.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui_5.5.0.165303.jar 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_mac.css 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\slideShow.html 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Internet Explorer\sqmapi.dll 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunjce_provider.jar 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Riga 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\MANIFEST.MF.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.felix.gogo.command_0.10.0.v201209301215.jar 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.lucene.core_3.5.0.v20120725-1805.jar 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Mexico_City.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCellMCE.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_de.properties 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dushanbe.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Goose_Bay.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\icon.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Yekaterinburg.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\OCT.CHM.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_CN_5.5.0.165303.jar.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerActionExceptionHandlers.exsd.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_settings.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Yellowknife.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Rome.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\stop_collection_data.gif 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome.dll.sig.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-previous-static.png 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\Louisville.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-explorer.xml.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\db\NOTICE.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\javafx.properties.id-F324B1AD.[[email protected]].bot 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1484 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exepid process 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1676 vssvc.exe Token: SeRestorePrivilege 1676 vssvc.exe Token: SeAuditPrivilege 1676 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.execmd.exedescription pid process target process PID 1728 wrote to memory of 1304 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe cmd.exe PID 1728 wrote to memory of 1304 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe cmd.exe PID 1728 wrote to memory of 1304 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe cmd.exe PID 1728 wrote to memory of 1304 1728 15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe cmd.exe PID 1304 wrote to memory of 1300 1304 cmd.exe mode.com PID 1304 wrote to memory of 1300 1304 cmd.exe mode.com PID 1304 wrote to memory of 1300 1304 cmd.exe mode.com PID 1304 wrote to memory of 1484 1304 cmd.exe vssadmin.exe PID 1304 wrote to memory of 1484 1304 cmd.exe vssadmin.exe PID 1304 wrote to memory of 1484 1304 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe"C:\Users\Admin\AppData\Local\Temp\15261902cbeea085d10a5b0a37b11ac259346bf62145095bc9b4427b343a0c41.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1300
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1484
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676