Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-06-2022 23:37
Static task
static1
Behavioral task
behavioral1
Sample
359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe
Resource
win10v2004-20220414-en
General
-
Target
359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe
-
Size
471KB
-
MD5
68ae1cfdc0b53730b7ad43781155e598
-
SHA1
fb4b60e97cb4445957d74de46b842e7d51ae950c
-
SHA256
359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a
-
SHA512
0dbf148442cee19da08d6a5033013098e75f31c79057d2b2a76e43bfbde6e60aba495d12aeb69be31eb60c8e20e48256e93f62e0e4453c573d240fb37db710f7
Malware Config
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MountTest.tiff => C:\Users\Admin\Pictures\MountTest.tiff.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\ReadInstall.tif => C:\Users\Admin\Pictures\ReadInstall.tif.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\RepairSuspend.raw => C:\Users\Admin\Pictures\RepairSuspend.raw.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\SyncEnable.png => C:\Users\Admin\Pictures\SyncEnable.png.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\FormatLock.tif => C:\Users\Admin\Pictures\FormatLock.tif.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Pictures\MountTest.tiff 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\SelectConvertFrom.png => C:\Users\Admin\Pictures\SelectConvertFrom.png.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\UninstallAssert.png => C:\Users\Admin\Pictures\UninstallAssert.png.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\ExportSync.crw => C:\Users\Admin\Pictures\ExportSync.crw.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File renamed C:\Users\Admin\Pictures\ResolveRedo.tif => C:\Users\Admin\Pictures\ResolveRedo.tif.DOCM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe" 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Documents\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Music\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Videos\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Links\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Music\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 980 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 28 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.LEX 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\VOLTAGE.WAV 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\CALENDAR.GIF 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\TAB_ON.GIF 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Premium.gif 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Payment Type.accft 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CERT98.POC 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\HEADER.GIF 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\DISTLSTL.ICO 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\BriefcaseIcon.jpg 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageMaskSmall.bmp 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Marketing Projects.accdt 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MENU.XML 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsMacroTemplate.html 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SOCIALPROVIDER.DLL 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\EXITEM.CFG 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AppConfigInternal.zip 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.Adapter.dll 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyMergeLetter.dotx 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\System.AddIn.dll 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DVDHM.POC 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LINEACT.POC 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CSS7DATA000A.DLL 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\THOCRAPI.DLL 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\ACWZDAT12.ACCDU 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\LoginTool24x24Images.jpg 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Restore-My-Files.txt 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCOUPON.DPV 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\HEADER.GIF 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\TEXTAREA.JPG 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN108.XML 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\Restore-My-Files.txt 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\CALENDAR.GIF 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SIGNS.ICO 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\MSOSEC.XML 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OSPP.HTM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGNHM.POC 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\MSGR3ES.DLL 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\PABR.SAM 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL103.XML 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\MessageBoxIconImagesMask.bmp 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPPT.OLB 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OMML2MML.XSL 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTIRMV.XML 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\Restore-My-Files.txt 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\REMOTES.ICO 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\FAXEXT.ECF 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\desktop.ini 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.DLL 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.AR.XML 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\ALERT.ICO 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Dataset.zip 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_en.dub 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALHM.POC 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.InfoPath.FormControl.dll 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\TRANSMGR.DLL 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIDEBARVERTBB.POC 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB3B.BDR 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\utilityfunctions.js 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.Xml.xml 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBCAL.DPV 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBPQT.DPV 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_OliveGreen.gif 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1824 wrote to memory of 980 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 28 PID 1824 wrote to memory of 980 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 28 PID 1824 wrote to memory of 980 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 28 PID 1824 wrote to memory of 980 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 28 PID 1824 wrote to memory of 980 1824 359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe"C:\Users\Admin\AppData\Local\Temp\359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe"C:\Users\Admin\AppData\Local\Temp\359dba8d2718cae69e16a4dbb97bd01673d65efc5715ea935ce395679ee3516a.exe"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:980
-