Analysis
-
max time kernel
151s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 09:54
Behavioral task
behavioral1
Sample
cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe
Resource
win10v2004-20220812-en
General
-
Target
cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe
-
Size
1.9MB
-
MD5
f09a781eeb97acf68c8c1783e76c29e6
-
SHA1
ec2b7eebfcbf263424ae194817060eac44c380c7
-
SHA256
cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64
-
SHA512
972fc4759d344c3eab157fe8bb345596592895ab9d27546961a93047142e8236dd876f3449a9f60dd5eb93a54035dcd3d7c8d70d468e3233341bfa4d674cfa64
-
SSDEEP
49152:jL7kITp6hTJEfHdQ2+Sd3KmkZt1EOS09VE8zbRfc7id4oPg:YITpmafy2+S5KmkZt1EOSP8zdfc7i5P
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
resource yara_rule behavioral1/memory/1932-55-0x0000000000400000-0x00000000005E6000-memory.dmp upx behavioral1/memory/1932-56-0x0000000000400000-0x00000000005E6000-memory.dmp upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe = "C:\\Windows\\System32\\cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe" cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe -
Drops desktop.ini file(s) 11 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2292972927-2705560509-2768824231-1000\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.properties.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.RSA.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitevignette1047.png cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\settings.html cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Chatham cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs.xml.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\PREVIEW.GIF.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\MST7MDT.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\uninstall.log cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Dawson_Creek.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\README-JDK.html.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\preface.htm cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Internet Explorer\IEShims.dll cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jdwp.dll cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\picturePuzzle.css cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\localizedStrings.js cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Norfolk.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\eula.ini.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Green Bubbles.htm cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.zh_CN_5.5.0.165303.jar cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kcms.dll.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\pdf.gif cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\SY______.PFM.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoCanary.png.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_100_percent.pak.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\SETUP.XML.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application.xml cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\clock.js cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\derby_common.bat.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\setEmbeddedCP.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-plaf.xml.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Rangoon cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\clock.css cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.png cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Port_Moresby cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\MSTTSLoc.dll.mui cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\index.gif.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\PREVIEW.GIF.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.service.exsd.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-docked.png cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Shanghai.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\mip.exe.mui cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\id.pak cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\clock.html cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Zurich.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\plugin.xml.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\NOTICE cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-heapwalker.xml cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Kaliningrad.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Funafuti cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-filesystems.xml.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\PYCC.pf.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fontconfig.bfc cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaTypewriterBold.ttf.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\feature.xml.id-58F3ADF4.[[email protected] ].wiki cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 316 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1868 vssvc.exe Token: SeRestorePrivilege 1868 vssvc.exe Token: SeAuditPrivilege 1868 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1932 wrote to memory of 844 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 29 PID 1932 wrote to memory of 844 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 29 PID 1932 wrote to memory of 844 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 29 PID 1932 wrote to memory of 844 1932 cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe 29 PID 844 wrote to memory of 324 844 cmd.exe 31 PID 844 wrote to memory of 324 844 cmd.exe 31 PID 844 wrote to memory of 324 844 cmd.exe 31 PID 844 wrote to memory of 316 844 cmd.exe 32 PID 844 wrote to memory of 316 844 cmd.exe 32 PID 844 wrote to memory of 316 844 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe"C:\Users\Admin\AppData\Local\Temp\cc3b570fa8f87354f06a20d8873c45087684c217f1b434b3b0048acd96fe3e64.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:324
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:316
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868