Analysis
-
max time kernel
105s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-11-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe
Resource
win10v2004-20220812-en
General
-
Target
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe
-
Size
69KB
-
MD5
f12d5cb1e1ef0bd2cfb84e5bfe4a374a
-
SHA1
b2fc939142188430def4d782d0294a2ecb95d522
-
SHA256
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605
-
SHA512
60c3e8406d1f91e94d4f5bc9e50cae8cd256fb0a46395b010bab65c359899aa3e359a4417de062aef1656dcf235047cec547f023465dad48bdda392753335eeb
-
SSDEEP
1536:bLFfx65YA4hsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Hl:Vfx6yA0srQLOJgY8Zp8LHD4XWaNH71dj
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\NewWrite.tiff ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\OpenRead.raw => C:\Users\Admin\Pictures\OpenRead.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\OpenRead.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\ResumeUninstall.png.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\NewWrite.tiff => C:\Users\Admin\Pictures\NewWrite.tiff.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\NewWrite.tiff.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\ResumeUninstall.png => C:\Users\Admin\Pictures\ResumeUninstall.png.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\UndoProtect.raw => C:\Users\Admin\Pictures\UndoProtect.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\UndoProtect.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Drops desktop.ini file(s) 39 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Desktop\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Documents\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Documents\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Pictures\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Music\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Videos\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Music\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Links\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Libraries\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Downloads\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Searches\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\J: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\Z: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\W: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\T: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\O: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\B: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\E: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\R: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\A: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\S: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\G: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\H: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\K: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\V: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\Q: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\U: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\I: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\F: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\L: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\X: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\N: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\M: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\Y: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_win7.css ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Detroit ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\RenderingControl.xml ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_left.gif.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)notConnectedStateIcon.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-modules-queries.xml ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\settings.html ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\Panel_Mask_PAL.wmv ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00459_.WMF.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsColorChart.html.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_choosefont.gif.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text_3.5.300.v20130515-1451.jar ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.dom.svg_1.1.0.v201011041433.jar.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPreviewTemplate.html.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tabskb.dll.mui ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-util-enumerations_ja.jar ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guatemala.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_top.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\PREVIEW.GIF.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\settings.js ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyDrop32x32.gif ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dhaka.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Mozilla Firefox\uninstall\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_SlateBlue.gif.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02753U.BMP ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\jconsole.jar.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository.nl_ja_4.4.0.v20140623020002.jar ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Volgograd ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Common Files\System\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR.HXS.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\COUPON.POC.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.nl_ja_4.4.0.v20140623020002.jar ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.forms_3.6.100.v20140422-1825.jar ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Oral ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0251871.WMF ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePageStyle.css ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB00703L.GIF.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONINTL.REST.IDX_DLL.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_FormsHomePageBlank.gif ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\flyout.css ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME22.CSS ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME49.CSS ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\bckgzm.exe.mui ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Windows Journal\en-US\JNTFiltr.dll.mui ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\6.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105530.WMF ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02567J.JPG.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-uisupport_ja.jar.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Distinctive.dotx ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Tokyo.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 916 1600 WerFault.exe 26 -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1284 vssadmin.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\ʌ\?\C:\Program Files\Internet Explorer\images\bing.ico.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\\?\C:\Program Files\Common Files\Services\verisign.bmp.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1776 vssvc.exe Token: SeRestorePrivilege 1776 vssvc.exe Token: SeAuditPrivilege 1776 vssvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1596 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 27 PID 1600 wrote to memory of 1596 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 27 PID 1600 wrote to memory of 1596 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 27 PID 1600 wrote to memory of 1596 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 27 PID 1596 wrote to memory of 1284 1596 cmd.exe 29 PID 1596 wrote to memory of 1284 1596 cmd.exe 29 PID 1596 wrote to memory of 1284 1596 cmd.exe 29 PID 1600 wrote to memory of 916 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 33 PID 1600 wrote to memory of 916 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 33 PID 1600 wrote to memory of 916 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 33 PID 1600 wrote to memory of 916 1600 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe"C:\Users\Admin\AppData\Local\Temp\ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 8202⤵
- Program crash
PID:916
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD51988dc08a39f268f55d4fba5bfe5d1a6
SHA13c182d7b11772169a7876e4a2bb4a402aecdfbe8
SHA256ff1d195ddad9e5a42b9d8e947c898d19c8c325a257edbc4723cfa22c4b75feed
SHA5128acf81dc447bfdaadb15018dbcaac8f11eed60cf918f97ffa21c7bc60e53e9b51b4af5f8e0ebecd8ec84b0f0ba684514d86e947f75d6c4ec3ccd4ab164c6b31f