Analysis
-
max time kernel
84s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2022 03:52
Static task
static1
Behavioral task
behavioral1
Sample
702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe
Resource
win10v2004-20220812-en
General
-
Target
702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe
-
Size
211KB
-
MD5
b774d0ad0ae7a9d3ec00281bc8682cd2
-
SHA1
6c8d2b7035721dd184597cfd2864b0afd28d7bd2
-
SHA256
702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0
-
SHA512
606dcbfea802773509d30e7de88209a5abe11f89697bdf8dbe92a89252ed4cc9873a64797d19e2cbd71b1a39a6ed06d76a0d59821592d44a6f8a6c9e45bd94eb
-
SSDEEP
3072:owAJkyMS4a+RQ3dTmx0Tth+cySxE+s9WRhP6v8xZduobdwV:RAJeRQ3dT++GnOR/5bGV
Malware Config
Extracted
C:\readme.txt
http://4s4lnfeujzo67fy2jebz2dxskez2gsqj2jeb35m75ktufxensdicqxad.onion/chat/3194223a728c446ebfb50c494adb674da4d8c5622e124bcca9943f2b9a3f35f7/
Signatures
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertFromSync.raw => C:\Users\Admin\Pictures\ConvertFromSync.raw.PUUUK 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File renamed C:\Users\Admin\Pictures\ExitConnect.crw => C:\Users\Admin\Pictures\ExitConnect.crw.PUUUK 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File renamed C:\Users\Admin\Pictures\PopSubmit.png => C:\Users\Admin\Pictures\PopSubmit.png.PUUUK 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File renamed C:\Users\Admin\Pictures\ResetStart.png => C:\Users\Admin\Pictures\ResetStart.png.PUUUK 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File renamed C:\Users\Admin\Pictures\SearchUndo.raw => C:\Users\Admin\Pictures\SearchUndo.raw.PUUUK 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Admin\3D Objects\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\Documents\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\Music\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Music\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Links\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\Videos\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Public\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-ul-oob.xrm-ms 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-snaptracer_ja.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\THMBNAIL.PNG 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_OEM_Perp-ul-phn.xrm-ms 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\trusted.libraries 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-attach.xml 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Google\Update\Install\{4CA8DFAB-80A0-43FC-AC78-FBACDED770CF}\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\he.pak 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.VBS 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-ul-phn.xrm-ms 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\ui-strings.js 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\he-il\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-cn\ui-strings.js 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fr-fr\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer_3.2.200.v20140827-1444.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EVRGREEN\EVRGREEN.ELM 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ppd.xrm-ms 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\mk.pak.DATA 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ar-ae\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core-execution.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-keymap_ja.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_ja.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dc_logo.png 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\root\ui-strings.js 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\email_initiator.gif 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.properties 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\az.pak.DATA 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings_0.10.200.v20140424-2042.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.xml 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\sendforsignature.svg 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\ui-strings.js 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ul-oob.xrm-ms 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-api-caching_zh_CN.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RADIAL\RADIAL.INF 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluTSFrame.png 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\flat_officeFontsPreview.ttf 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files\Microsoft Office\root\Office16\STARTUP\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.w3c.dom.svg_1.1.0.v201011041433.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\macGrey.png 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_ja.jar 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-il\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-il\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-pl.xrm-ms 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-util-lookup.xml 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\de-de\ui-strings.js 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Common Files\System\Ole DB\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_filetype_psd.svg 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\readme.txt 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\core_icons_fw.png 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 3592 vssvc.exe Token: SeRestorePrivilege 3592 vssvc.exe Token: SeAuditPrivilege 3592 vssvc.exe Token: SeIncreaseQuotaPrivilege 3652 WMIC.exe Token: SeSecurityPrivilege 3652 WMIC.exe Token: SeTakeOwnershipPrivilege 3652 WMIC.exe Token: SeLoadDriverPrivilege 3652 WMIC.exe Token: SeSystemProfilePrivilege 3652 WMIC.exe Token: SeSystemtimePrivilege 3652 WMIC.exe Token: SeProfSingleProcessPrivilege 3652 WMIC.exe Token: SeIncBasePriorityPrivilege 3652 WMIC.exe Token: SeCreatePagefilePrivilege 3652 WMIC.exe Token: SeBackupPrivilege 3652 WMIC.exe Token: SeRestorePrivilege 3652 WMIC.exe Token: SeShutdownPrivilege 3652 WMIC.exe Token: SeDebugPrivilege 3652 WMIC.exe Token: SeSystemEnvironmentPrivilege 3652 WMIC.exe Token: SeRemoteShutdownPrivilege 3652 WMIC.exe Token: SeUndockPrivilege 3652 WMIC.exe Token: SeManageVolumePrivilege 3652 WMIC.exe Token: 33 3652 WMIC.exe Token: 34 3652 WMIC.exe Token: 35 3652 WMIC.exe Token: 36 3652 WMIC.exe Token: SeIncreaseQuotaPrivilege 3652 WMIC.exe Token: SeSecurityPrivilege 3652 WMIC.exe Token: SeTakeOwnershipPrivilege 3652 WMIC.exe Token: SeLoadDriverPrivilege 3652 WMIC.exe Token: SeSystemProfilePrivilege 3652 WMIC.exe Token: SeSystemtimePrivilege 3652 WMIC.exe Token: SeProfSingleProcessPrivilege 3652 WMIC.exe Token: SeIncBasePriorityPrivilege 3652 WMIC.exe Token: SeCreatePagefilePrivilege 3652 WMIC.exe Token: SeBackupPrivilege 3652 WMIC.exe Token: SeRestorePrivilege 3652 WMIC.exe Token: SeShutdownPrivilege 3652 WMIC.exe Token: SeDebugPrivilege 3652 WMIC.exe Token: SeSystemEnvironmentPrivilege 3652 WMIC.exe Token: SeRemoteShutdownPrivilege 3652 WMIC.exe Token: SeUndockPrivilege 3652 WMIC.exe Token: SeManageVolumePrivilege 3652 WMIC.exe Token: 33 3652 WMIC.exe Token: 34 3652 WMIC.exe Token: 35 3652 WMIC.exe Token: 36 3652 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2484 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 86 PID 4740 wrote to memory of 2484 4740 702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe 86 PID 2484 wrote to memory of 3652 2484 cmd.exe 88 PID 2484 wrote to memory of 3652 2484 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe"C:\Users\Admin\AppData\Local\Temp\702099b63cb2384e11f088d6bc33afbd43a4c91848f393581242a6a17f1b30a0.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{12FB7ADA-8519-4F30-9407-AB09CE62AC88}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{12FB7ADA-8519-4F30-9407-AB09CE62AC88}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3592