Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 21:24
Static task
static1
Behavioral task
behavioral1
Sample
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe
Resource
win10v2004-20220721-en
General
-
Target
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe
-
Size
291KB
-
MD5
25dad6ce880d6ca55c66a3e32d380a83
-
SHA1
af2cd7985b3805cac94160c29782f62489a981fc
-
SHA256
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6
-
SHA512
0b653399ca3ee5cb71ae06b7da5e0fd123cd165cb6ecd1b41f2c0109ae4327612a8def1e8f3c37284096d7a422c0f2ea4bb87d75bc8c96e7012d13527f9b490e
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe = "C:\\Windows\\System32\\e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe" e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe -
Drops desktop.ini file(s) 40 IoCs
Processes:
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exedescription ioc process File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\5LQN3UAD\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\EEQJXKAI\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5V37SD41\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0JX876I\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4084403625-2215941253-1760665084-1000\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GFG94K26\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\7RK1CK32\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YJH7S53B\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZEMPWX1N\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe -
Drops file in System32 directory 1 IoCs
Processes:
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exedescription ioc process File created C:\Windows\System32\e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe -
Drops file in Program Files directory 64 IoCs
Processes:
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exedescription ioc process File created C:\Program Files\Java\jre7\lib\zi\America\Cambridge_Bay.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Web.Entity.Design.Resources.dll e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\VideoLAN\VLC\skins\winamp2.xml.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_ja.jar.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jakarta.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state.nl_zh_4.4.0.v20140623020002.jar e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02280_.WMF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02073_.GIF e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-time-l1-1-0.dll e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Fancy.dotx e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services.nl_zh_4.4.0.v20140623020002.jar.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21344_.GIF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\AUTHOR.XSL.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_VelvetRose.gif.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\wmpnssci.dll.mui e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\RSSFeeds.js e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\slideShow.css e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00166_.WMF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libes_plugin.dll.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.log.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\VBCN6.CHM.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jce.jar.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115844.GIF e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15155_.GIF e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkTSFrame.png.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\LockRename.emf e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03459_.WMF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00943_.WMF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe.sig.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\BREAK.JPG.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01066_.WMF e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\settings.css e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.service.exsd.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text.nl_zh_4.4.0.v20140623020002.jar.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145810.JPG.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\Minesweeper.exe.mui e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\shvlzm.exe.mui.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\clock.js e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_s.png e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_few-showers.png e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.IE.XML.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00014_.WMF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME55.CSS.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\anevia_xml.luac.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Bold.otf e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\MountRestore.jpeg.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105272.WMF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0252629.WMF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libposterize_plugin.dll e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tabskb.dll.mui e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkServerCP.bat e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_ON.GIF.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt.id-FDC20C5E.[[email protected]].bot e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00578_.WMF e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2040 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exepid process 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1876 vssvc.exe Token: SeRestorePrivilege 1876 vssvc.exe Token: SeAuditPrivilege 1876 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.execmd.exedescription pid process target process PID 1072 wrote to memory of 1904 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe cmd.exe PID 1072 wrote to memory of 1904 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe cmd.exe PID 1072 wrote to memory of 1904 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe cmd.exe PID 1072 wrote to memory of 1904 1072 e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe cmd.exe PID 1904 wrote to memory of 292 1904 cmd.exe mode.com PID 1904 wrote to memory of 292 1904 cmd.exe mode.com PID 1904 wrote to memory of 292 1904 cmd.exe mode.com PID 1904 wrote to memory of 2040 1904 cmd.exe vssadmin.exe PID 1904 wrote to memory of 2040 1904 cmd.exe vssadmin.exe PID 1904 wrote to memory of 2040 1904 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe"C:\Users\Admin\AppData\Local\Temp\e66f45509b5ab1ddd411ae19c3f3c47b54aaf730b2411b74e48176e2dbb169f6.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:292
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2040
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1876