Analysis
-
max time kernel
111s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
22-07-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe
Resource
win10v2004-20220721-en
General
-
Target
24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe
-
Size
1.0MB
-
MD5
42800d065e5855e261cc617fa688850f
-
SHA1
6c7b35e36830c1cc613fb08280ee25e5fbba9937
-
SHA256
24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59
-
SHA512
9e6e09aa81666c491058773b312d2c3178c4d6d6d295c455e8ad40f186f2081a6cc3b00e6a9eeefd66a806e05019d496cb2d54e2dcf45cc6b63ab7d55f9c2154
Malware Config
Extracted
C:\readme.txt
conti
http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/rw0J6Ap3LZNfxsJyo6UpClQbrgD1dzRjxZLVZep0QQEFdl01ihbHIkEvZt91EvtA
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ResumeDisable.png => C:\Users\Admin\Pictures\ResumeDisable.png.XKLKO 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File renamed C:\Users\Admin\Pictures\SaveSplit.png => C:\Users\Admin\Pictures\SaveSplit.png.XKLKO 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File renamed C:\Users\Admin\Pictures\SkipDeny.crw => C:\Users\Admin\Pictures\SkipDeny.crw.XKLKO 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File renamed C:\Users\Admin\Pictures\ResumeApprove.png => C:\Users\Admin\Pictures\ResumeApprove.png.XKLKO 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 46 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Links\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Documents\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Videos\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\Y4L7EXDB\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\70L7AE9U\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Music\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4SXR972F\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Music\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\N7QPJOQI\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLFLTR.DAT 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14830_.GIF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN054.XML 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.security.ui_1.1.200.v20130626-2037.jar 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-ui.xml 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Manuscript.dotx 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Winnipeg 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_mid_over.gif 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21304_.GIF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\BG_ADOBE.GIF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\zipfs.jar 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Zurich 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\ct.sym 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196110.WMF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_07.MID 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Aspect.eftx 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository.nl_ja_4.4.0.v20140623020002.jar 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\FrameworkList.xml 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Earthy.css 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Guam 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-applemenu.xml 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106816.WMF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0230876.WMF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_it.jar 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_VelvetRose.gif 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files (x86)\Common Files\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304861.WMF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02757U.BMP 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jre7\lib\management\jmxremote.access 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\vlc.mo 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Guadalcanal 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0186346.WMF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR28F.GIF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-cli.xml 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-plaf.xml 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101858.BMP 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0300862.WMF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.felix.gogo.runtime_0.10.0.v201209301036.jar 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Casablanca 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File created C:\Program Files\DVD Maker\en-US\readme.txt 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\artifacts.xml 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME31.CSS 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\GoldRing.png 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground_PAL.wmv 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\vlc.mo 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0281904.WMF 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7ES.LEX 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport.png 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\THMBNAIL.PNG 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Monrovia 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\speaker-32.png 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2016 vssvc.exe Token: SeRestorePrivilege 2016 vssvc.exe Token: SeAuditPrivilege 2016 vssvc.exe Token: SeIncreaseQuotaPrivilege 472 WMIC.exe Token: SeSecurityPrivilege 472 WMIC.exe Token: SeTakeOwnershipPrivilege 472 WMIC.exe Token: SeLoadDriverPrivilege 472 WMIC.exe Token: SeSystemProfilePrivilege 472 WMIC.exe Token: SeSystemtimePrivilege 472 WMIC.exe Token: SeProfSingleProcessPrivilege 472 WMIC.exe Token: SeIncBasePriorityPrivilege 472 WMIC.exe Token: SeCreatePagefilePrivilege 472 WMIC.exe Token: SeBackupPrivilege 472 WMIC.exe Token: SeRestorePrivilege 472 WMIC.exe Token: SeShutdownPrivilege 472 WMIC.exe Token: SeDebugPrivilege 472 WMIC.exe Token: SeSystemEnvironmentPrivilege 472 WMIC.exe Token: SeRemoteShutdownPrivilege 472 WMIC.exe Token: SeUndockPrivilege 472 WMIC.exe Token: SeManageVolumePrivilege 472 WMIC.exe Token: 33 472 WMIC.exe Token: 34 472 WMIC.exe Token: 35 472 WMIC.exe Token: SeIncreaseQuotaPrivilege 472 WMIC.exe Token: SeSecurityPrivilege 472 WMIC.exe Token: SeTakeOwnershipPrivilege 472 WMIC.exe Token: SeLoadDriverPrivilege 472 WMIC.exe Token: SeSystemProfilePrivilege 472 WMIC.exe Token: SeSystemtimePrivilege 472 WMIC.exe Token: SeProfSingleProcessPrivilege 472 WMIC.exe Token: SeIncBasePriorityPrivilege 472 WMIC.exe Token: SeCreatePagefilePrivilege 472 WMIC.exe Token: SeBackupPrivilege 472 WMIC.exe Token: SeRestorePrivilege 472 WMIC.exe Token: SeShutdownPrivilege 472 WMIC.exe Token: SeDebugPrivilege 472 WMIC.exe Token: SeSystemEnvironmentPrivilege 472 WMIC.exe Token: SeRemoteShutdownPrivilege 472 WMIC.exe Token: SeUndockPrivilege 472 WMIC.exe Token: SeManageVolumePrivilege 472 WMIC.exe Token: 33 472 WMIC.exe Token: 34 472 WMIC.exe Token: 35 472 WMIC.exe Token: SeIncreaseQuotaPrivilege 816 WMIC.exe Token: SeSecurityPrivilege 816 WMIC.exe Token: SeTakeOwnershipPrivilege 816 WMIC.exe Token: SeLoadDriverPrivilege 816 WMIC.exe Token: SeSystemProfilePrivilege 816 WMIC.exe Token: SeSystemtimePrivilege 816 WMIC.exe Token: SeProfSingleProcessPrivilege 816 WMIC.exe Token: SeIncBasePriorityPrivilege 816 WMIC.exe Token: SeCreatePagefilePrivilege 816 WMIC.exe Token: SeBackupPrivilege 816 WMIC.exe Token: SeRestorePrivilege 816 WMIC.exe Token: SeShutdownPrivilege 816 WMIC.exe Token: SeDebugPrivilege 816 WMIC.exe Token: SeSystemEnvironmentPrivilege 816 WMIC.exe Token: SeRemoteShutdownPrivilege 816 WMIC.exe Token: SeUndockPrivilege 816 WMIC.exe Token: SeManageVolumePrivilege 816 WMIC.exe Token: 33 816 WMIC.exe Token: 34 816 WMIC.exe Token: 35 816 WMIC.exe Token: SeIncreaseQuotaPrivilege 816 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 2036 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 31 PID 860 wrote to memory of 2036 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 31 PID 860 wrote to memory of 2036 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 31 PID 860 wrote to memory of 2036 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 31 PID 2036 wrote to memory of 472 2036 cmd.exe 33 PID 2036 wrote to memory of 472 2036 cmd.exe 33 PID 2036 wrote to memory of 472 2036 cmd.exe 33 PID 860 wrote to memory of 1424 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 34 PID 860 wrote to memory of 1424 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 34 PID 860 wrote to memory of 1424 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 34 PID 860 wrote to memory of 1424 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 34 PID 1424 wrote to memory of 816 1424 cmd.exe 36 PID 1424 wrote to memory of 816 1424 cmd.exe 36 PID 1424 wrote to memory of 816 1424 cmd.exe 36 PID 860 wrote to memory of 1172 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 37 PID 860 wrote to memory of 1172 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 37 PID 860 wrote to memory of 1172 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 37 PID 860 wrote to memory of 1172 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 37 PID 1172 wrote to memory of 852 1172 cmd.exe 39 PID 1172 wrote to memory of 852 1172 cmd.exe 39 PID 1172 wrote to memory of 852 1172 cmd.exe 39 PID 860 wrote to memory of 620 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 40 PID 860 wrote to memory of 620 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 40 PID 860 wrote to memory of 620 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 40 PID 860 wrote to memory of 620 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 40 PID 620 wrote to memory of 1664 620 cmd.exe 42 PID 620 wrote to memory of 1664 620 cmd.exe 42 PID 620 wrote to memory of 1664 620 cmd.exe 42 PID 860 wrote to memory of 1348 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 43 PID 860 wrote to memory of 1348 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 43 PID 860 wrote to memory of 1348 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 43 PID 860 wrote to memory of 1348 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 43 PID 1348 wrote to memory of 1924 1348 cmd.exe 45 PID 1348 wrote to memory of 1924 1348 cmd.exe 45 PID 1348 wrote to memory of 1924 1348 cmd.exe 45 PID 860 wrote to memory of 928 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 46 PID 860 wrote to memory of 928 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 46 PID 860 wrote to memory of 928 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 46 PID 860 wrote to memory of 928 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 46 PID 928 wrote to memory of 904 928 cmd.exe 48 PID 928 wrote to memory of 904 928 cmd.exe 48 PID 928 wrote to memory of 904 928 cmd.exe 48 PID 860 wrote to memory of 1596 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 49 PID 860 wrote to memory of 1596 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 49 PID 860 wrote to memory of 1596 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 49 PID 860 wrote to memory of 1596 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 49 PID 1596 wrote to memory of 1612 1596 cmd.exe 51 PID 1596 wrote to memory of 1612 1596 cmd.exe 51 PID 1596 wrote to memory of 1612 1596 cmd.exe 51 PID 860 wrote to memory of 1540 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 52 PID 860 wrote to memory of 1540 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 52 PID 860 wrote to memory of 1540 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 52 PID 860 wrote to memory of 1540 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 52 PID 1540 wrote to memory of 584 1540 cmd.exe 54 PID 1540 wrote to memory of 584 1540 cmd.exe 54 PID 1540 wrote to memory of 584 1540 cmd.exe 54 PID 860 wrote to memory of 1028 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 55 PID 860 wrote to memory of 1028 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 55 PID 860 wrote to memory of 1028 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 55 PID 860 wrote to memory of 1028 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 55 PID 1028 wrote to memory of 1360 1028 cmd.exe 57 PID 1028 wrote to memory of 1360 1028 cmd.exe 57 PID 1028 wrote to memory of 1360 1028 cmd.exe 57 PID 860 wrote to memory of 1800 860 24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe"C:\Users\Admin\AppData\Local\Temp\24ac73821de77cc9644d2ac40e97067ff63f625b5f20e085ad10535e47d7db59.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4E703D7C-5FC8-41DB-B347-8DBEF2105885}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4E703D7C-5FC8-41DB-B347-8DBEF2105885}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8C5FAB52-53D2-4047-9BE6-AAEFB7D906C5}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8C5FAB52-53D2-4047-9BE6-AAEFB7D906C5}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6F6F7FFD-4DBC-4A3E-941D-2C3016046FF7}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6F6F7FFD-4DBC-4A3E-941D-2C3016046FF7}'" delete3⤵PID:852
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A17D7D9A-3309-41F3-A1FF-E8CDB31A0197}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A17D7D9A-3309-41F3-A1FF-E8CDB31A0197}'" delete3⤵PID:1664
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DE17D7CD-4080-42E0-9852-116A0AFFE983}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DE17D7CD-4080-42E0-9852-116A0AFFE983}'" delete3⤵PID:1924
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{69C24B62-2B0A-4224-B2B1-FE8910EC9666}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{69C24B62-2B0A-4224-B2B1-FE8910EC9666}'" delete3⤵PID:904
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0B707B11-044E-4F85-A417-14DD5201B7BF}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0B707B11-044E-4F85-A417-14DD5201B7BF}'" delete3⤵PID:1612
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{392F08C9-E8B7-4273-948C-8FBE99E6459D}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{392F08C9-E8B7-4273-948C-8FBE99E6459D}'" delete3⤵PID:584
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8602EFF5-3908-481E-BB4B-41C0DDD67BAE}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8602EFF5-3908-481E-BB4B-41C0DDD67BAE}'" delete3⤵PID:1360
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A5966B2D-2E4E-46BF-AEAD-7E6A0E42C124}'" delete2⤵PID:1800
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A5966B2D-2E4E-46BF-AEAD-7E6A0E42C124}'" delete3⤵PID:1716
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AE902913-3BF6-441C-8057-91F4E8F5FF80}'" delete2⤵PID:696
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AE902913-3BF6-441C-8057-91F4E8F5FF80}'" delete3⤵PID:1124
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07B79EA4-E0F1-412B-AB2B-A15E11076096}'" delete2⤵PID:828
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07B79EA4-E0F1-412B-AB2B-A15E11076096}'" delete3⤵PID:1512
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B5FE4EBE-C54B-4AF3-9EEE-0935D1231A02}'" delete2⤵PID:1576
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B5FE4EBE-C54B-4AF3-9EEE-0935D1231A02}'" delete3⤵PID:924
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{34F088A8-5F9B-4DC7-9E77-231808158A02}'" delete2⤵PID:1192
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{34F088A8-5F9B-4DC7-9E77-231808158A02}'" delete3⤵PID:1268
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E24951D2-AEE8-4417-9E95-5A93F1D181F4}'" delete2⤵PID:1588
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E24951D2-AEE8-4417-9E95-5A93F1D181F4}'" delete3⤵PID:900
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F0382E77-6CE2-434B-822C-6E3F0C88FDE6}'" delete2⤵PID:1824
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F0382E77-6CE2-434B-822C-6E3F0C88FDE6}'" delete3⤵PID:1424
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{48A33F66-0E37-44C2-89A9-D481C30BB325}'" delete2⤵PID:1168
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{48A33F66-0E37-44C2-89A9-D481C30BB325}'" delete3⤵PID:1172
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1CEBEC55-22BE-43CF-AFA0-26BCA5DD95F3}'" delete2⤵PID:1560
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1CEBEC55-22BE-43CF-AFA0-26BCA5DD95F3}'" delete3⤵PID:1664
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016