Analysis
-
max time kernel
151s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 00:38
Static task
static1
Behavioral task
behavioral1
Sample
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe
Resource
win10v2004-20220414-en
General
-
Target
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe
-
Size
404KB
-
MD5
faba065344e5f585a8e7acfce2ffff5f
-
SHA1
bdbbc7f1ec213771a593dfc8f273e2c0b28a46af
-
SHA256
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e
-
SHA512
ea128b2e682085bf41fc5b322f89ea4d8c1f6090bdf723d688818f91e3e6395a05368c1029ca7c647d90e4bce118ddea9f19fd4b73938636862d2047c664986e
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\EnablePush.tiff 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Drops startup file 4 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe = "C:\\Windows\\System32\\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe" 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z8MOBTG4\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9BAYTI1Z\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\TP9I05FL\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\Music\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XM8UCER\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Links\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W5LB8O2W\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GA2W0K9L\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FDVO4NFQ\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\1O80FYZJ\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Drops file in System32 directory 1 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription ioc process File created C:\Windows\System32\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription pid process target process PID 2036 set thread context of 1900 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Drops file in Program Files directory 64 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\org-openide-util_zh_CN.jar 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01255G.GIF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libvmem_plugin.dll 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\tipresx.dll.mui 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.png 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15019_.GIF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_left_disable.gif.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.ja_5.5.0.165303.jar 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02441_.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\SPRING.INF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdate.cer 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.THD.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02155_.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00396_.WMF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME20.CSS.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_flat_10_000000_40x100.png.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\flyoutBack.png 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Newsprint.xml.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\RSSFeeds.js 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\vlc.mo.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jre7\lib\accessibility.properties.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Belem.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00853_.WMF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0171847.WMF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\settings.css 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\TURKISH.TXT.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152894.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\MP00021_.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00390_.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\MedianMergeFax.Dotx.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Internet Explorer\en-US\F12.dll.mui 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_settings.png 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Pontianak 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099171.WMF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Essential.thmx 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21520_.GIF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.SYX.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.PPD.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\libfile_logger_plugin.dll.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00018_.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\27.png 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0214948.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.zh_CN_5.5.0.165303.jar.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_ja.jar.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00723_.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\msmdsrv.rll.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONINTL.DLL.IDX_DLL.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\scrapbook.png 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring.xml.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105506.WMF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\vlc.mo 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00116_.WMF 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15185_.GIF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\init.js 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_ja_4.4.0.v20140623020002.jar 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Common Files\System\ado\msadrh15.dll 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.SYD.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Microsoft.Synchronization.dll 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox.nl_zh_4.4.0.v20140623020002.jar.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287019.WMF.id-36648B91.[[email protected]].ROGER 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 748 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exepid process 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exedescription pid process Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe Token: SeLoadDriverPrivilege 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.execmd.exedescription pid process target process PID 2036 wrote to memory of 1900 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe PID 2036 wrote to memory of 1900 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe PID 2036 wrote to memory of 1900 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe PID 2036 wrote to memory of 1900 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe PID 2036 wrote to memory of 1900 2036 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe PID 1900 wrote to memory of 1572 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe cmd.exe PID 1900 wrote to memory of 1572 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe cmd.exe PID 1900 wrote to memory of 1572 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe cmd.exe PID 1900 wrote to memory of 1572 1900 23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe cmd.exe PID 1572 wrote to memory of 1440 1572 cmd.exe mode.com PID 1572 wrote to memory of 1440 1572 cmd.exe mode.com PID 1572 wrote to memory of 1440 1572 cmd.exe mode.com PID 1572 wrote to memory of 748 1572 cmd.exe vssadmin.exe PID 1572 wrote to memory of 748 1572 cmd.exe vssadmin.exe PID 1572 wrote to memory of 748 1572 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe"C:\Users\Admin\AppData\Local\Temp\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exeC:\Users\Admin\AppData\Local\Temp\23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e.exe2⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\mode.commode con cp select=12514⤵PID:1440
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:748
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1724