Analysis
-
max time kernel
103s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2022, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe
Resource
win10v2004-20220812-en
General
-
Target
ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe
-
Size
225KB
-
MD5
0e8476b3c4099a42baca7f16ca8253e6
-
SHA1
e044edce8646124ddc39906e6fb6f02eaff16161
-
SHA256
ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b
-
SHA512
afeeda4d83a38e0ef3307fac88a63ed197a305501c84622151e07be17bd38d8d07ff91c36c832f5574c86165573940258c0d18f681e8346bf869089891b1021a
-
SSDEEP
6144:hRAvJmXbQwAPnZXJAc4V50DErB5xgTw7ozFz254W:hRAxebQwAPAkDWGcoxfW
Malware Config
Extracted
C:\README.html
us:<br><strong><br>email:[email protected]<br>email:[email protected]<br>skype
Extracted
C:\Users\Admin\AppData\Local\Temp\42807121641972527219.hta
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 6068 bcdedit.exe -
pid Process 6032 wbadmin.exe -
Executes dropped EXE 1 IoCs
pid Process 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\PushResume.png.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\ResolveBlock.tif => C:\Users\Admin\Pictures\ResolveBlock.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\SaveCompare.tif => C:\Users\Admin\Pictures\SaveCompare.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\UseBlock.raw => C:\Users\Admin\Pictures\UseBlock.raw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\PushResume.png => C:\Users\Admin\Pictures\PushResume.png.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\ReceiveRead.raw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\ReceiveResume.raw => C:\Users\Admin\Pictures\ReceiveResume.raw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\UseReceive.crw => C:\Users\Admin\Pictures\UseReceive.crw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\MountUninstall.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\ReceiveResume.raw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\ResolveBlock.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\UseBlock.raw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\UseReceive.crw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\ConvertStep.tif => C:\Users\Admin\Pictures\ConvertStep.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\MountUninstall.tif => C:\Users\Admin\Pictures\MountUninstall.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File renamed C:\Users\Admin\Pictures\ReceiveRead.raw => C:\Users\Admin\Pictures\ReceiveRead.raw.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\SaveCompare.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\ConvertStep.tif.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe = "C:\\Windows\\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe" ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\Music\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\Pictures\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Searches\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files (x86)\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\Videos\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2629973501-4017243118-3254762364-1000\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\Downloads\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification \Device\HarddiskVolume1\$RECYCLE.BIN\S-1-5-21-2629973501-4017243118-3254762364-1000\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Links\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Music\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Documents\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\Desktop\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\Documents\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Public\Libraries\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-2629973501-4017243118-3254762364-1000\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened (read-only) \??\F: ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\42807121641972527219.jpg" ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-timezone-l1-1-0.dll.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Portal\1033\PortalConnect.dll.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsSplashScreen.contrast-black_scale-100.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_download_pdf_18.svg ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\TURKISH.TXT ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019DemoR_BypassTrial180-ul-oob.xrm-ms.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_targetsize-20.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-80_altform-unplated.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMSB.TTF ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchSquare71x71Logo.scale-125_contrast-black.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeTile.scale-200.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-256_altform-unplated_contrast-black.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\te.pak.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailBadge.scale-150.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_ko.dll ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-ul-phn.xrm-ms.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-150.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Grace-ppd.xrm-ms ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TEXTCONV\MSCONV97.DLL.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECHO\ECHO.ELM ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.MsoInterop.dll.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libamem_plugin.dll ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-20_altform-unplated.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-application-views.jar ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Grace-ul-oob.xrm-ms.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-64_altform-unplated_contrast-white.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorStoreLogo.contrast-white_scale-100.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailBadge.scale-125.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PREVIEWTEMPLATE2.POTX.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.UI.dll.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft Help\MS.GRAPH.16.1033.hxn.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\HostConfigHighContrast.json ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\Office.UI.Xaml.Oart.dll ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\EPDF_RHP.aapp ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ppd.xrm-ms ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\REFINED\REFINED.ELM ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial2-ul-oob.xrm-ms.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.OData.Core.NetFX35.V7.dll ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\StudentReport.dotx ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libscene_plugin.dll ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-100.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jpeg.dll ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.osmmui.msi.16.en-us.xml.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.emf.common_2.10.1.v20140901-1043.jar.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ul-oob.xrm-ms ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-GoogleCloudCache.scale-200.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.properties.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic_5.5.0.165303.jar ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\librtpvideo_plugin.dll ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\WideTile.scale-200.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_zh_4.4.0.v20140623020002.jar.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\STSLIST.DLL ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\[email protected] ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Trial-ppd.xrm-ms.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_KMS_Client-ppd.xrm-ms.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Retail-ul-oob.xrm-ms.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_2.m4a ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-20_altform-unplated_contrast-black.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe File created C:\Windows\42807121641972527219.png ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2984 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 976 taskkill.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.venus\DefaultIcon\ = "C:\\Windows\\42807121641972527219.png" ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.venus ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.venus\DefaultIcon ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3840 PING.EXE -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Token: SeTcbPrivilege 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Token: SeTakeOwnershipPrivilege 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Token: SeSecurityPrivilege 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe Token: SeDebugPrivilege 976 taskkill.exe Token: SeBackupPrivilege 6072 wbengine.exe Token: SeRestorePrivilege 6072 wbengine.exe Token: SeSecurityPrivilege 6072 wbengine.exe Token: SeBackupPrivilege 5868 vssvc.exe Token: SeRestorePrivilege 5868 vssvc.exe Token: SeAuditPrivilege 5868 vssvc.exe Token: SeIncreaseQuotaPrivilege 1448 WMIC.exe Token: SeSecurityPrivilege 1448 WMIC.exe Token: SeTakeOwnershipPrivilege 1448 WMIC.exe Token: SeLoadDriverPrivilege 1448 WMIC.exe Token: SeSystemProfilePrivilege 1448 WMIC.exe Token: SeSystemtimePrivilege 1448 WMIC.exe Token: SeProfSingleProcessPrivilege 1448 WMIC.exe Token: SeIncBasePriorityPrivilege 1448 WMIC.exe Token: SeCreatePagefilePrivilege 1448 WMIC.exe Token: SeBackupPrivilege 1448 WMIC.exe Token: SeRestorePrivilege 1448 WMIC.exe Token: SeShutdownPrivilege 1448 WMIC.exe Token: SeDebugPrivilege 1448 WMIC.exe Token: SeSystemEnvironmentPrivilege 1448 WMIC.exe Token: SeRemoteShutdownPrivilege 1448 WMIC.exe Token: SeUndockPrivilege 1448 WMIC.exe Token: SeManageVolumePrivilege 1448 WMIC.exe Token: 33 1448 WMIC.exe Token: 34 1448 WMIC.exe Token: 35 1448 WMIC.exe Token: 36 1448 WMIC.exe Token: SeIncreaseQuotaPrivilege 1448 WMIC.exe Token: SeSecurityPrivilege 1448 WMIC.exe Token: SeTakeOwnershipPrivilege 1448 WMIC.exe Token: SeLoadDriverPrivilege 1448 WMIC.exe Token: SeSystemProfilePrivilege 1448 WMIC.exe Token: SeSystemtimePrivilege 1448 WMIC.exe Token: SeProfSingleProcessPrivilege 1448 WMIC.exe Token: SeIncBasePriorityPrivilege 1448 WMIC.exe Token: SeCreatePagefilePrivilege 1448 WMIC.exe Token: SeBackupPrivilege 1448 WMIC.exe Token: SeRestorePrivilege 1448 WMIC.exe Token: SeShutdownPrivilege 1448 WMIC.exe Token: SeDebugPrivilege 1448 WMIC.exe Token: SeSystemEnvironmentPrivilege 1448 WMIC.exe Token: SeRemoteShutdownPrivilege 1448 WMIC.exe Token: SeUndockPrivilege 1448 WMIC.exe Token: SeManageVolumePrivilege 1448 WMIC.exe Token: 33 1448 WMIC.exe Token: 34 1448 WMIC.exe Token: 35 1448 WMIC.exe Token: 36 1448 WMIC.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 760 wrote to memory of 5052 760 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 81 PID 760 wrote to memory of 5052 760 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 81 PID 760 wrote to memory of 5052 760 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 81 PID 760 wrote to memory of 4916 760 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 85 PID 760 wrote to memory of 4916 760 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 85 PID 5052 wrote to memory of 4152 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 83 PID 5052 wrote to memory of 4152 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 83 PID 4152 wrote to memory of 976 4152 cmd.exe 88 PID 4152 wrote to memory of 976 4152 cmd.exe 88 PID 4916 wrote to memory of 3840 4916 cmd.exe 89 PID 4916 wrote to memory of 3840 4916 cmd.exe 89 PID 5052 wrote to memory of 5984 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 97 PID 5052 wrote to memory of 5984 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 97 PID 5984 wrote to memory of 6032 5984 cmd.exe 99 PID 5984 wrote to memory of 6032 5984 cmd.exe 99 PID 5984 wrote to memory of 2984 5984 cmd.exe 103 PID 5984 wrote to memory of 2984 5984 cmd.exe 103 PID 5052 wrote to memory of 5892 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 104 PID 5052 wrote to memory of 5892 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 104 PID 5052 wrote to memory of 5892 5052 ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe 104 PID 5984 wrote to memory of 6068 5984 cmd.exe 108 PID 5984 wrote to memory of 6068 5984 cmd.exe 108 PID 5984 wrote to memory of 1448 5984 cmd.exe 109 PID 5984 wrote to memory of 1448 5984 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe"C:\Users\Admin\AppData\Local\Temp\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe"C:\Windows\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe" g g g o n e1232⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\System32\cmd.exe/C taskkill /F /IM msftesql.exe /IM sqlagent.exe /IM sqlbrowser.exe /IM sqlservr.exe /IM sqlwriter.exe /IM oracle.exe /IM ocssd.exe /IM dbsnmp.exe /IM synctime.exe /IM mydesktopqos.exe /IM agntsvc.exe /IM isqlplussvc.exe /IM xfssvccon.exe /IM mydesktopservice.exe /IM ocautoupds.exe /IM agntsvc.exe /IM agntsvc.exe /IM agntsvc.exe /IM encsvc.exe /IM firefoxconfig.exe /IM tbirdconfig.exe /IM ocomm.exe /IM mysqld.exe /IM mysqld-nt.exe /IM mysqld-opt.exe /IM dbeng50.exe /IM sqbcoreservice.exe /IM excel.exe /IM infopath.exe /IM msaccess.exe /IM mspub.exe /IM onenote.exe /IM outlook.exe /IM powerpnt.exe /IM sqlservr.exe /IM thebat64.exe /IM thunderbird.exe /IM winword.exe /IM wordpad.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\system32\taskkill.exetaskkill /F /IM msftesql.exe /IM sqlagent.exe /IM sqlbrowser.exe /IM sqlservr.exe /IM sqlwriter.exe /IM oracle.exe /IM ocssd.exe /IM dbsnmp.exe /IM synctime.exe /IM mydesktopqos.exe /IM agntsvc.exe /IM isqlplussvc.exe /IM xfssvccon.exe /IM mydesktopservice.exe /IM ocautoupds.exe /IM agntsvc.exe /IM agntsvc.exe /IM agntsvc.exe /IM encsvc.exe /IM firefoxconfig.exe /IM tbirdconfig.exe /IM ocomm.exe /IM mysqld.exe /IM mysqld-nt.exe /IM mysqld-opt.exe /IM dbeng50.exe /IM sqbcoreservice.exe /IM excel.exe /IM infopath.exe /IM msaccess.exe /IM mspub.exe /IM onenote.exe /IM outlook.exe /IM powerpnt.exe /IM sqlservr.exe /IM thebat64.exe /IM thunderbird.exe /IM winword.exe /IM wordpad.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
-
C:\Windows\System32\cmd.exe/C wbadmin delete catalog -quiet && vssadmin.exe delete shadows /all /quiet && bcdedit.exe /set {current} nx AlwaysOff && wmic SHADOWCOPY DELETE3⤵
- Suspicious use of WriteProcessMemory
PID:5984 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:6032
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2984
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} nx AlwaysOff4⤵
- Modifies boot configuration data using bcdedit
PID:6068
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\42807121641972527219.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:5892
-
-
-
C:\Windows\System32\cmd.exe/c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:3840
-
-
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:6116
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:1472
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58103aa0a52830e860d4e8457864e3b99
SHA19c0ed2ecd13d4fe060f76b9a3687cc113a0bedba
SHA2561da12388514e57bf5e2c3345e7ca3e6b1eba62617a5c27a1db73280e3a1429dc
SHA51269ad2a795c5ea0aa3b7e2d8584b1579c42f59f89bae4c3d608e5046a6ed7ab2d8903fcde3f57dea0845aa919f719b7253d9d8582a85787d0679ca1fa52af7416
-
Filesize
225KB
MD50e8476b3c4099a42baca7f16ca8253e6
SHA1e044edce8646124ddc39906e6fb6f02eaff16161
SHA256ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b
SHA512afeeda4d83a38e0ef3307fac88a63ed197a305501c84622151e07be17bd38d8d07ff91c36c832f5574c86165573940258c0d18f681e8346bf869089891b1021a
-
Filesize
225KB
MD50e8476b3c4099a42baca7f16ca8253e6
SHA1e044edce8646124ddc39906e6fb6f02eaff16161
SHA256ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b
SHA512afeeda4d83a38e0ef3307fac88a63ed197a305501c84622151e07be17bd38d8d07ff91c36c832f5574c86165573940258c0d18f681e8346bf869089891b1021a