Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
01-08-2022 04:55
Static task
static1
Behavioral task
behavioral1
Sample
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe
Resource
win10v2004-20220721-en
General
-
Target
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe
-
Size
92KB
-
MD5
b443d5c04e420ad73636247c48894667
-
SHA1
19627871518443b9f4abca29896ca068cb246f10
-
SHA256
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31
-
SHA512
0446741fbf9b1ffb1cec055477c1e2a13816b03724369b215661c0fb6e11f1ceb8137a22641010fb71cb4b1c6b36a5217d59aee7c50478db6f3aadcecc6bb1e4
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe = "C:\\Windows\\System32\\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe" 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Drops desktop.ini file(s) 13 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3762437355-3468409815-1164039494-1000\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Drops file in System32 directory 1 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File created C:\Windows\System32\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Drops file in Program Files directory 64 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\chrome.VisualElementsManifest.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\settings.html 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\GREEK.TXT.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB00673L.GIF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Waveform.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Formal.dotx 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_settings.png 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01151_.WMF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs.xml.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Andorra.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_zh_4.4.0.v20140623020002.jar.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0318810.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\ir.idl 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench_1.2.1.v20140901-1244.jar.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02470U.BMP 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341559.JPG.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\MST7MDT.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_config_window.html 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\Chess.exe.mui 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IpsMigrationPlugin.dll 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationUp_SelectionSubpicture.png 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\artifacts.xml.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert.zh_CN_5.5.0.165303.jar 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107500.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0295069.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01044_.WMF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Taipei.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\7-Zip\Lang\et.txt.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Lagos.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach.ja_5.5.0.165303.jar.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01568_.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jre7\bin\gstreamer-lite.dll 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21318_.GIF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\La_Paz.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bn.pak.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\as80.xsl.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.nl_zh_4.4.0.v20140623020002.jar.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jetty.servlet_8.1.14.v20131031.jar.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\TAB_ON.GIF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03451_.WMF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\library.js 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\WinFXList.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01180_.WMF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00530_.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01474_.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01563_.WMF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\MST.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00164_.GIF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\Perth.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME23.CSS 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\feature.xml.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.properties.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0230558.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Pangnirtung.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\cpu.css 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01628_.WMF 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00694_.WMF.id-C46DA4A3.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1716 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exepid process 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1832 vssvc.exe Token: SeRestorePrivilege 1832 vssvc.exe Token: SeAuditPrivilege 1832 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.execmd.exedescription pid process target process PID 1540 wrote to memory of 1200 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe cmd.exe PID 1540 wrote to memory of 1200 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe cmd.exe PID 1540 wrote to memory of 1200 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe cmd.exe PID 1540 wrote to memory of 1200 1540 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe cmd.exe PID 1200 wrote to memory of 1496 1200 cmd.exe mode.com PID 1200 wrote to memory of 1496 1200 cmd.exe mode.com PID 1200 wrote to memory of 1496 1200 cmd.exe mode.com PID 1200 wrote to memory of 1716 1200 cmd.exe vssadmin.exe PID 1200 wrote to memory of 1716 1200 cmd.exe vssadmin.exe PID 1200 wrote to memory of 1716 1200 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe"C:\Users\Admin\AppData\Local\Temp\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1496
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1716
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1832