Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 17:37
Static task
static1
Behavioral task
behavioral1
Sample
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe
Resource
win10v2004-20220414-en
General
-
Target
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe
-
Size
200KB
-
MD5
fd80e80c66e845241f572f13aaf0d9d0
-
SHA1
2af2cc6c7840e7a32e9460d8463a6d8a9c22c59a
-
SHA256
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34
-
SHA512
424119a5989754e12cda7e4d66f0971afc28cd5f0dfcb1c125b2ff283b05c31617ec9b0fdaea815f7331c5dee7623b16d56028a90fac5d40c49f5e173d20c26d
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe = "C:\\Windows\\System32\\3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe" 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-3751123196-3323558407-1869646069-1000\desktop.ini 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\desktop.ini 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe -
Drops file in System32 directory 1 IoCs
Processes:
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exedescription ioc process File created C:\Windows\System32\3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe -
Drops file in Program Files directory 64 IoCs
Processes:
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rightnav.gif 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\sunec.jar.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\StartMenu_Win8.mp4.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.repository_2.3.0.v20131211-1531.jar.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-BR.pak.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-editor-mimelookup.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-100.png.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\7-Zip\Lang\it.txt.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0409-1000-0000000FF1CE.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\msdasqlr.dll.mui 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiler.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Microsoft Office\Office16\OSPP.VBS.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Office Theme.thmx.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_zh_4.4.0.v20140623020002.jar.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvSubsystemController.dll.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sk.pak.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.properties 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-output2.xml 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_ja_4.4.0.v20140623020002.jar 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\3RDPARTY.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\trdtv2r41.xsl.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_school.png.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-100.png.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\masterix.gif.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\time-span-16.png.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.text.nl_ja_4.4.0.v20140623020002.jar.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core.nl_zh_4.4.0.v20140623020002.jar 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-80.png.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyclient.jar.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Yellow Orange.xml 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\bwcapitalized.dotx.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\orcl7.xsl.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.nl_ja_4.4.0.v20140623020002.jar 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-swing-plaf.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jaas_nt.dll 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\cursors.properties.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-80.png.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\msvcr100.dll.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.excelmui.msi.16.en-us.xml 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\DESIGNER\MSADDNDR.OLB 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\7-Zip\Lang\eo.txt.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sl.pak.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\ssn_high_group_info.txt.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench_1.1.0.v20140512-1820.jar.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\CHIMES.WAV.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-output2.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-loaders.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-util.xml 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-views.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-1000-0000000FF1CE.xml.id-CE14C9AF.[[email protected]].bot 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2936 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exepid process 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 904 vssvc.exe Token: SeRestorePrivilege 904 vssvc.exe Token: SeAuditPrivilege 904 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.execmd.exedescription pid process target process PID 4772 wrote to memory of 5024 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe cmd.exe PID 4772 wrote to memory of 5024 4772 3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe cmd.exe PID 5024 wrote to memory of 2712 5024 cmd.exe mode.com PID 5024 wrote to memory of 2712 5024 cmd.exe mode.com PID 5024 wrote to memory of 2936 5024 cmd.exe vssadmin.exe PID 5024 wrote to memory of 2936 5024 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe"C:\Users\Admin\AppData\Local\Temp\3929729e7b0f42902887cc1739b6dc23a2ae916e476e6ed32177d26a52f82d34.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2712
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2936
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:904