Analysis
-
max time kernel
61s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2022, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe
Resource
win10v2004-20220812-en
General
-
Target
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe
-
Size
143KB
-
MD5
6307838a9cef952321a44cc3e189213e
-
SHA1
2b3fea431f342c7b8bcff4b89715002e44d662c7
-
SHA256
7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6
-
SHA512
3b31e14fdfa6ecd33a0086b3db84ac1b0fef97a40cb82115007c69680e201c22bb638af4a4255dd21a2219e1143f1c940b4308d618467d9f0f22b0bab40cf18d
-
SSDEEP
1536:4uFohxL86e7tnkZXYklWXuiMqeGKPPRxPv8/0JS1CjhSlUUbvF7kFrWyaBvEEUAX:4RhxktIWTMqPKPPH1yUUB4kVUXsB/
Malware Config
Extracted
C:\!-Recovery_Instructions-!.html
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertToOptimize.crw => C:\Users\Admin\Pictures\ConvertToOptimize.crw.SunnyDay 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File renamed C:\Users\Admin\Pictures\ExpandClear.png => C:\Users\Admin\Pictures\ExpandClear.png.SunnyDay 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File renamed C:\Users\Admin\Pictures\ImportUndo.tif => C:\Users\Admin\Pictures\ImportUndo.tif.SunnyDay 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File renamed C:\Users\Admin\Pictures\SearchResize.crw => C:\Users\Admin\Pictures\SearchResize.crw.SunnyDay 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File renamed C:\Users\Admin\Pictures\UnpublishRedo.png => C:\Users\Admin\Pictures\UnpublishRedo.png.SunnyDay 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe -
Drops desktop.ini file(s) 28 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Music\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Links\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\Music\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\Documents\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Public\Videos\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_EnterpriseSub_Bypass30-ppd.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Grace-ppd.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ru-ru\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\illustrations.png 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\example_icons.png 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\ui-strings.js 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\MSGR8ES.LEX 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART10.BDR 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Trial-ul-oob.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalDemoR_BypassTrial180-ul-oob.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp-ul-oob.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\ccloud.png 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\lv_get.svg 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.OData.Edm.NetFX35.V7.dll 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\AccessRuntime_eula.txt 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_OEM_Perp-ppd.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\selector.js 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\cs-cz\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\zh-hk_get.svg 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hr-hr\ui-strings.js 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-fr\ui-strings.js 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\AppCenter_R.aapp 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProXC2RVL_MAKC2R-ppd.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pl-pl\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\it-it\ui-strings.js 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Retail-pl.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\management.dll 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-fr\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\SkypeForBusinessVDI2019_eula.txt 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest3-ul-oob.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\splash.gif 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fullscreen-press.svg 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1254.TXT 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\plugin.js 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ru-ru\ui-strings.js 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\ATPVBAEN.XLAM 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icucnv58.dll 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sl-si\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.engine_2.3.0.v20140506-1720.jar 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.text_3.9.1.v20140827-1810.jar 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libau_plugin.dll 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_equalizer.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\dbghelp.dll 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Checkmark.White.png 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Grace-ul-oob.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\plugin2\npjp2.dll 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\Welcome.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\sign-in.png 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-il\!-Recovery_Instructions-!.html 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ul-phn.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ul.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_TW.properties 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\calendars.properties 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Grace-ul-oob.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Trial-ppd.xrm-ms 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-common.xml 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.es-es.msi.16.es-es.boot.tree.dat 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2304 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 540 vssvc.exe Token: SeRestorePrivilege 540 vssvc.exe Token: SeAuditPrivilege 540 vssvc.exe Token: SeIncBasePriorityPrivilege 1584 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4820 1584 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe 84 PID 1584 wrote to memory of 4820 1584 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe 84 PID 4820 wrote to memory of 2304 4820 cmd.exe 86 PID 4820 wrote to memory of 2304 4820 cmd.exe 86 PID 1584 wrote to memory of 1840 1584 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe 96 PID 1584 wrote to memory of 1840 1584 7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe"C:\Users\Admin\AppData\Local\Temp\7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" cd %userprofile%\documents\ attrib Default.rdp -s -h del Default.rdp for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"2⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2304
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\7b379458349f338d22093bb634b60b867d7fd1873cbd7c65c445f08e73cbb1f6.exe > nul2⤵PID:1840
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:540