Analysis
-
max time kernel
96s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe
Resource
win10v2004-20220901-en
General
-
Target
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe
-
Size
69KB
-
MD5
f12d5cb1e1ef0bd2cfb84e5bfe4a374a
-
SHA1
b2fc939142188430def4d782d0294a2ecb95d522
-
SHA256
ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605
-
SHA512
60c3e8406d1f91e94d4f5bc9e50cae8cd256fb0a46395b010bab65c359899aa3e359a4417de062aef1656dcf235047cec547f023465dad48bdda392753335eeb
-
SSDEEP
1536:bLFfx65YA4hsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Hl:Vfx6yA0srQLOJgY8Zp8LHD4XWaNH71dj
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\UseUnlock.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\BlockSet.crw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\FormatSet.tiff.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\ReadMerge.tiff ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\ReadMerge.tiff => C:\Users\Admin\Pictures\ReadMerge.tiff.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\ReadMerge.tiff.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\RedoGet.png => C:\Users\Admin\Pictures\RedoGet.png.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\UseUnlock.raw => C:\Users\Admin\Pictures\UseUnlock.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\FormatSet.tiff ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\BlockSet.crw => C:\Users\Admin\Pictures\BlockSet.crw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\FormatSet.tiff => C:\Users\Admin\Pictures\FormatSet.tiff.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File renamed C:\Users\Admin\Pictures\WaitGrant.raw => C:\Users\Admin\Pictures\WaitGrant.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\RedoGet.png.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\WaitGrant.raw.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Drops desktop.ini file(s) 29 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Documents\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Music\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Links\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Music\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Documents\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Pictures\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Videos\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Downloads\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Desktop\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\Libraries\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Admin\Searches\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Users\Public\desktop.ini ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\O: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\B: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\Q: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\P: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\F: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\K: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\L: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\X: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\V: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\T: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\E: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\Y: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\A: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\G: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\H: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\N: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\M: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\W: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\U: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\S: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\J: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\Z: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened (read-only) \??\R: ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\cs.pak.DATA ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-100.png.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fi-fi\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\it-it\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\Light\IsoLeft.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_ja.jar ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_OEM_Perp-ul-oob.xrm-ms.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-24_altform-lightunplated.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pl-pl\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSplashLogo.scale-125.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\FacebookDialog.xbf ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nl-nl\ui-strings.js ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Notifications\SoftLandingAssetLight.gif.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup.xml ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSplashScreen.contrast-black_scale-125.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\Resources\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-32_altform-unplated.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\AppxMetadata\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\ThankYou\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\NavigationIcons\nav_icons_trending.targetsize-48.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\ui-strings.js.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailLargeTile.scale-125.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreSmallTile.scale-200.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\ccloud.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\gimap.jar.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription3-pl.xrm-ms.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\msmdsrv.rll.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_neutral_~_8wekyb3d8bbwe\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\root\ui-strings.js.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-100.png.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_targetsize-36.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-80_contrast-black.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hu-hu\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntryR_PrepidBypass-ppd.xrm-ms ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreBadgeLogo.scale-200.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-si\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\am_get.svg ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.sun.el_2.2.0.v201303151357.jar ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest2-ul-oob.xrm-ms ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\ViewEnv.ddsh ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\cpdf\plugin.js ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Internet Explorer\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ul-phn.xrm-ms ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_KMS_Client_AE-ul-oob.xrm-ms ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\AppxManifest.xml ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\search_emptystate.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-80_altform-unplated.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Internet Explorer\images\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription5-pl.xrm-ms.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-high\..\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ScreenSketchSquare310x310Logo.scale-100_contrast-black.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Images\Ratings\Yelp8.scale-100.png ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-il\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\.\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\ANTQUABI.TTF ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ARCTIC\THMBNAIL.PNG.rabel ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\WOW.txt ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1984 vssadmin.exe 4776 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2012 vssvc.exe Token: SeRestorePrivilege 2012 vssvc.exe Token: SeAuditPrivilege 2012 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1204 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 82 PID 4752 wrote to memory of 1204 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 82 PID 1204 wrote to memory of 4776 1204 cmd.exe 85 PID 1204 wrote to memory of 4776 1204 cmd.exe 85 PID 4752 wrote to memory of 3624 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 96 PID 4752 wrote to memory of 3624 4752 ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe 96 PID 3624 wrote to memory of 1984 3624 cmd.exe 98 PID 3624 wrote to memory of 1984 3624 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe"C:\Users\Admin\AppData\Local\Temp\ddc016c4106eb349e0d219f2ec70ba1428d3bc0e1b6aeb0b9f4a6242169b6605.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1984
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD5f920d1a16cf07f383f77d86caf4c214e
SHA10661d627ac59023e1c0e29b5af7d85e3d5113727
SHA256629db6ced8628973f6ca5bfcb95d67a0431df20dd857210c8758907b1a4ddb82
SHA512f0e47700405e73128f26b61dd3b0822c7cb94ba6b0f24ab0b4ab4c85d8997a0c047aa2c231aac30a1de90256ebf8c2dc96fa980cf6113324f5492e84e089375d