Analysis
-
max time kernel
155s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 04:55
Static task
static1
Behavioral task
behavioral1
Sample
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe
Resource
win10v2004-20220721-en
General
-
Target
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe
-
Size
92KB
-
MD5
b443d5c04e420ad73636247c48894667
-
SHA1
19627871518443b9f4abca29896ca068cb246f10
-
SHA256
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31
-
SHA512
0446741fbf9b1ffb1cec055477c1e2a13816b03724369b215661c0fb6e11f1ceb8137a22641010fb71cb4b1c6b36a5217d59aee7c50478db6f3aadcecc6bb1e4
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe = "C:\\Windows\\System32\\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe" 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-1101907861-274115917-2188613224-1000\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\desktop.ini 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Drops file in System32 directory 1 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File created C:\Windows\System32\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Drops file in Program Files directory 64 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-nodes.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\Welcome.html.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0000-1000-0000000FF1CE.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20131211-1531.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-140.png.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_ja_4.4.0.v20140623020002.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVManifest.dll 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\7-Zip\Lang\tr.txt.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\win32_MoveDrop32x32.gif.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\blacklisted.certs 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-io.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\eula.dll.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013bw.dotx.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher.nl_ja_4.4.0.v20140623020002.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\mshwLatin.dll.mui 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_win.css.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-lib-uihandler.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-remote.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ext_5.5.0.165303.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core.nl_ja_4.4.0.v20140623020002.jar 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-80.png.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Grayscale.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_ja_4.4.0.v20140623020002.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.ui.nl_zh_4.4.0.v20140623020002.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-80.png.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\DismountAdd.ods 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\HideGroup.jtx 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.ja_5.5.0.165303.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf.nl_zh_4.4.0.v20140623020002.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator_2.0.0.v20131217-1203.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hi-in.dll.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-output2.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jmx.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_it.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.swt.win32.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\7-Zip\History.txt 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sr.pak 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-windows.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0000-1000-0000000FF1CE.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javafx_font.dll 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PowerPointNaiveBayesCommandRanker.txt.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-180.png 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-lib-uihandler.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-execution.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-ui.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Yellow Orange.xml 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\c2rpridslicensefiles_auto.xml.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\jhall-2.0_05.jar.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-process-l1-1-0.dll.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt.id-77493F8C.[[email protected]].bip 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 4960 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exepid process 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2792 vssvc.exe Token: SeRestorePrivilege 2792 vssvc.exe Token: SeAuditPrivilege 2792 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.execmd.exedescription pid process target process PID 1848 wrote to memory of 5088 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe cmd.exe PID 1848 wrote to memory of 5088 1848 5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe cmd.exe PID 5088 wrote to memory of 2204 5088 cmd.exe mode.com PID 5088 wrote to memory of 2204 5088 cmd.exe mode.com PID 5088 wrote to memory of 4960 5088 cmd.exe vssadmin.exe PID 5088 wrote to memory of 4960 5088 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe"C:\Users\Admin\AppData\Local\Temp\5cec86494711c0700e876922ad52c7aec3caabecd7a2577ce4a7f0cd40b0aa31.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2204
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4960
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792