Analysis
-
max time kernel
172s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:23
Behavioral task
behavioral1
Sample
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe
Resource
win10v2004-20220721-en
General
-
Target
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe
-
Size
420KB
-
MD5
859553e76bcfb7c19bbf1ad1290b360c
-
SHA1
6a71def09b4b0058ca6f0b077a93c22b4eb63082
-
SHA256
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4
-
SHA512
100dc319e1082da1f4a2d779642c785a89b2e00272ee85390c4cdcaa589ed0091eacdda5fc06ac9a87ea025b4fe0be62323ba51bd34b7968d96d8859f0676d2b
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Processes:
resource yara_rule behavioral2/memory/2460-130-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral2/memory/2460-139-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe = "C:\\Windows\\System32\\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe" 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\desktop.ini 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\desktop.ini 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Drops file in System32 directory 1 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exedescription ioc process File created C:\Windows\System32\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exedescription pid process target process PID 2460 set thread context of 1208 2460 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Drops file in Program Files directory 64 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\ShapeCollector.exe.mui 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\cs.pak.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.xml 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\it.pak.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ru.jar 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.zh-cn.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-io.xml 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-api.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jmx.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\GRAY.pf.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXPTOOWS.XLA 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-modules-appui.xml 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_fr.properties.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\docs.crx 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-search.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-swing-plaf.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\sunmscapi.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\7-Zip\Lang\hi.txt.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodbig.gif.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sw.pak.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Violet II.xml 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.alert.zh_CN_5.5.0.165303.jar 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\id.pak 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.batik.css_1.7.0.v201011041433.jar 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\7-Zip\Uninstall.exe.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\index.gif.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\dblook 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\mailapi.jar.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.et-ee.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\7-Zip\Lang\ro.txt.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-sampler.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.zh_CN_5.5.0.165303.jar 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jmc.ini.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\docs.crx.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\toc.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_mac.css 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\net.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.felix.gogo.shell_0.10.0.v201212101605.jar.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.attach_5.5.0.165303.jar.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\officeinventoryagentlogon.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark.css.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\prism_d3d.dll 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0409-1000-0000000FF1CE.xml 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata_5.5.0.165303.jar.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-attach.xml 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\prism_d3d.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\TelemetryDashboard.xltx.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\HideInvoke.pot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\jawt_md.h.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue Green.xml.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-timezone-l1-1-0.dll.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF.id-C5D6242E.[[email protected]].bot 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4540 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exepid process 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2648 vssvc.exe Token: SeRestorePrivilege 2648 vssvc.exe Token: SeAuditPrivilege 2648 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exepid process 2460 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exepid process 2460 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.execmd.exedescription pid process target process PID 2460 wrote to memory of 1208 2460 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe PID 2460 wrote to memory of 1208 2460 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe PID 2460 wrote to memory of 1208 2460 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe PID 2460 wrote to memory of 1208 2460 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe PID 1208 wrote to memory of 2212 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe cmd.exe PID 1208 wrote to memory of 2212 1208 970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe cmd.exe PID 2212 wrote to memory of 408 2212 cmd.exe mode.com PID 2212 wrote to memory of 408 2212 cmd.exe mode.com PID 2212 wrote to memory of 4540 2212 cmd.exe vssadmin.exe PID 2212 wrote to memory of 4540 2212 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe"C:\Users\Admin\AppData\Local\Temp\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exeC:\Users\Admin\AppData\Local\Temp\970959bc3aef1c6198b105a4983599ea566f29ca26f307258f86d0a6585502f4.exe2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\mode.commode con cp select=12514⤵PID:408
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4540
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648