Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 18:24
Static task
static1
Behavioral task
behavioral1
Sample
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe
Resource
win10v2004-20220812-en
General
-
Target
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe
-
Size
366KB
-
MD5
dd065e54805dfc8c1640065803a3fa23
-
SHA1
e0e3646919b6fdb37fd9d9d70d3c0ef23d46dc1a
-
SHA256
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579
-
SHA512
5f7885acfa03411e743579b537257b68aec67e08babcf035689338663f27be082307e65adced4a7f94a413f44a141b5670872d1791b728d4ef6fb592a2b958b0
-
SSDEEP
6144:W8afWfuCiCEfwdciYYx8+W5p56UKV4UszE7hvriQi:W6ueEMPvW8UhUszE7hvDi
Malware Config
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exedescription ioc process File renamed C:\Users\Admin\Pictures\RenameCopy.crw => C:\Users\Admin\Pictures\RenameCopy.crw.DOCM 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Pictures\ResumeApprove.tiff 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File renamed C:\Users\Admin\Pictures\ResumeApprove.tiff => C:\Users\Admin\Pictures\ResumeApprove.tiff.DOCM 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File renamed C:\Users\Admin\Pictures\UndoRestore.crw => C:\Users\Admin\Pictures\UndoRestore.crw.DOCM 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File renamed C:\Users\Admin\Pictures\EnableRead.crw => C:\Users\Admin\Pictures\EnableRead.crw.DOCM 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File renamed C:\Users\Admin\Pictures\ExitTest.raw => C:\Users\Admin\Pictures\ExitTest.raw.DOCM 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File renamed C:\Users\Admin\Pictures\RegisterGroup.raw => C:\Users\Admin\Pictures\RegisterGroup.raw.DOCM 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe" 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe -
Drops desktop.ini file(s) 27 IoCs
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exedescription ioc process File opened for modification C:\Users\Admin\Links\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Music\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Videos\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Music\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Public\Documents\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exedescription pid process target process PID 972 set thread context of 364 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe -
Drops file in Program Files directory 64 IoCs
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.PPD 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_es.dub 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSRuntime.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excel.exe.manifest 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MAPISHELL.DLL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.GIF 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Module.zip 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Pitchbook.potx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.GIF 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyLetter.dotx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\List.accdt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\PINELUMB.JPG 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\DBGHELP.DLL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MML2OMML.XSL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\VSTAProjectUI.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Form.zip 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\DataSet.zip 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\PersonalMonthlyBudget.xltx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\WidescreenPresentation.potx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\Restore-My-Files.txt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Msgbox.accdt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\NOTEBOOK.JPG 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BillingStatement.xltx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialLetter.dotx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialResume.dotx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_en.dub 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEAWSDC.DLL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDCAT.DLL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.INF 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_en.dub 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityLetter.Dotx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveNewsletter.dotx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginLetter.Dotx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Form.zip 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Restore-My-Files.txt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CDLMSO.DLL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKPowerPoint.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPPT.OLB 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\Restore-My-Files.txt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\1 Right.accdt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Custom.propdesc 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDS.DLL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ASCIIENG.LNG 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\TextFile.zip 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.AddInManager.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Restore-My-Files.txt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKExcel.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Restore-My-Files.txt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\FeedSync.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryResume.dotx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Restore-My-Files.txt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUNGLE.HTM 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSF.DLL 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXLIRM.XML 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExpenseReport.xltx 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Details.accdt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Media.accdt 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\VSTAClientPkgUI.dll 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\LOOKUP.DAT 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exepid process 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exepid process 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exedescription pid process target process PID 972 wrote to memory of 364 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe PID 972 wrote to memory of 364 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe PID 972 wrote to memory of 364 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe PID 972 wrote to memory of 364 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe PID 972 wrote to memory of 364 972 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe 418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe"C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe"C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:364
-