Analysis
-
max time kernel
149s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-03-2023 04:45
Static task
static1
Behavioral task
behavioral1
Sample
liketesc.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
liketesc.bin.exe
Resource
win10v2004-20230221-en
General
-
Target
liketesc.bin.exe
-
Size
92KB
-
MD5
2bbb2d9be1a993a8dfef0dd719c589a0
-
SHA1
c03d6401902a7b07ac88dbde7f93c6cc74e57221
-
SHA256
bf20b92755cd5c2542cdcef804ee795932cc4b0e070ca6b81ff8fd30908a8f97
-
SHA512
b810d0b4b775afbc7d69e7159363d9778b6d22bd7cdc0271dac595500ed3243aadae47b060ba55374c27b6c00137bdc3c2277ecef9b18242a0d62c15e0941343
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AecO0xq0j9OnjXZFekIaOaUBRUpkqa:Qw+asqN5aW/hLUcJc0jQjJ7Oa1Gq
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
help@decrypt-files.info
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 5 IoCs
Processes:
liketesc.bin.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\liketesc.bin.exe liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini liketesc.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta liketesc.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
liketesc.bin.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" liketesc.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" liketesc.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\liketesc.bin.exe = "C:\\Windows\\System32\\liketesc.bin.exe" liketesc.bin.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
liketesc.bin.exedescription ioc process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Libraries\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Videos\desktop.ini liketesc.bin.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2647223082-2067913677-935928954-1000\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\KDJSR44L\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Music\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\D3BHGYNU\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FPRRZWTM\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Links\desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTIFN44A\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Searches\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Music\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files (x86)\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M3HSS2N\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Desktop\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Downloads\desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\D3FFX6WH\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Pictures\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Documents\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\F9XZZTVM\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini liketesc.bin.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini liketesc.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini liketesc.bin.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini liketesc.bin.exe -
Drops file in System32 directory 2 IoCs
Processes:
liketesc.bin.exedescription ioc process File created C:\Windows\System32\liketesc.bin.exe liketesc.bin.exe File created C:\Windows\System32\Info.hta liketesc.bin.exe -
Drops file in Program Files directory 64 IoCs
Processes:
liketesc.bin.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\Microsoft.Synchronization.Data.Server.dll liketesc.bin.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)grayStateIcon.png liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215709.WMF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21344_.GIF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDS.DLL.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\SERVWRAP.ASP liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnWD.dll liketesc.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_zh_4.4.0.v20140623020002.jar.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD07804_.WMF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02417_.WMF liketesc.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\libtdummy_plugin.dll liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageAttachmentIconImages.jpg liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNOteFilter.dll liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\button_right.gif liketesc.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jawt.h liketesc.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.repository_2.3.0.v20131211-1531.jar liketesc.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Dawson.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\South_Georgia.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\zh-CN.pak.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Brussels.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsPrintTemplate.html liketesc.bin.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\drag.png liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00242_.WMF liketesc.bin.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_videoinset.png liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00238_.WMF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL01395_.WMF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\HICCUP.WAV.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwLatin.dll liketesc.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkServerCP.bat liketesc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Winnipeg.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Flow.xml.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01140_.WMF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\MSOSVINT.DLL liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\Office14\EntityDataHandler.dll.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\attention.gif.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt liketesc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\ffjcext.zip liketesc.bin.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.RSA.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\Hearts.exe.mui.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\as90.xsl.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0227419.JPG.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14793_.GIF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\TAB_OFF.GIF liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewFrame.html liketesc.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.ssl_1.1.0.v20140827-1444.jar liketesc.bin.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01238_.GIF.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsPrintTemplate.html.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\vlc.mo.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libaddonsfsstorage_plugin.dll.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Office Classic 2.xml liketesc.bin.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui liketesc.bin.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-plaf.xml.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Copenhagen liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\EquityFax.Dotx liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\XLSLICER.DLL.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\PicturesToolIconImagesMask.bmp.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\ActiveTabImageMask.bmp liketesc.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\TOOLICON.ICO.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services.nl_ja_4.4.0.v20140623020002.jar.id-59E86D67.[help@decrypt-files.info].like liketesc.bin.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe liketesc.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2016 vssadmin.exe 3788 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
liketesc.bin.exepid process 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe 528 liketesc.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1356 vssvc.exe Token: SeRestorePrivilege 1356 vssvc.exe Token: SeAuditPrivilege 1356 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
liketesc.bin.execmd.execmd.exedescription pid process target process PID 528 wrote to memory of 1808 528 liketesc.bin.exe cmd.exe PID 528 wrote to memory of 1808 528 liketesc.bin.exe cmd.exe PID 528 wrote to memory of 1808 528 liketesc.bin.exe cmd.exe PID 528 wrote to memory of 1808 528 liketesc.bin.exe cmd.exe PID 1808 wrote to memory of 340 1808 cmd.exe mode.com PID 1808 wrote to memory of 340 1808 cmd.exe mode.com PID 1808 wrote to memory of 340 1808 cmd.exe mode.com PID 1808 wrote to memory of 2016 1808 cmd.exe vssadmin.exe PID 1808 wrote to memory of 2016 1808 cmd.exe vssadmin.exe PID 1808 wrote to memory of 2016 1808 cmd.exe vssadmin.exe PID 528 wrote to memory of 3964 528 liketesc.bin.exe cmd.exe PID 528 wrote to memory of 3964 528 liketesc.bin.exe cmd.exe PID 528 wrote to memory of 3964 528 liketesc.bin.exe cmd.exe PID 528 wrote to memory of 3964 528 liketesc.bin.exe cmd.exe PID 3964 wrote to memory of 4084 3964 cmd.exe mode.com PID 3964 wrote to memory of 4084 3964 cmd.exe mode.com PID 3964 wrote to memory of 4084 3964 cmd.exe mode.com PID 3964 wrote to memory of 3788 3964 cmd.exe vssadmin.exe PID 3964 wrote to memory of 3788 3964 cmd.exe vssadmin.exe PID 3964 wrote to memory of 3788 3964 cmd.exe vssadmin.exe PID 528 wrote to memory of 3772 528 liketesc.bin.exe mshta.exe PID 528 wrote to memory of 3772 528 liketesc.bin.exe mshta.exe PID 528 wrote to memory of 3772 528 liketesc.bin.exe mshta.exe PID 528 wrote to memory of 3772 528 liketesc.bin.exe mshta.exe PID 528 wrote to memory of 3764 528 liketesc.bin.exe mshta.exe PID 528 wrote to memory of 3764 528 liketesc.bin.exe mshta.exe PID 528 wrote to memory of 3764 528 liketesc.bin.exe mshta.exe PID 528 wrote to memory of 3764 528 liketesc.bin.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\liketesc.bin.exe"C:\Users\Admin\AppData\Local\Temp\liketesc.bin.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.id-59E86D67.[help@decrypt-files.info].likeFilesize
3.6MB
MD519b06f5acdcf26b43c198aaaffac1789
SHA1617d2e19968c0a7c4ca85badc9737a76bee3dfa6
SHA256161b4ea98b0134b7377db8d2b9486ca4923d524a60549089afe2f6f5178a4433
SHA51291dc6c6ab9cefa8bc890576d6a72893a2f5627e98b9ac8e13c2fcae2625fbc0dd5e18c9574a861de9865b61cf1cccb9ff8f967abf14d6b405ffbd5614025f43d
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
13KB
MD53ecf4ddbc83501fe2bf76ddf69c1c6de
SHA1c57ccc6f0cb55ef1d497898314a96c7f22f1d500
SHA256d1a038f3ff0cd03e352e50dee93dc4174b5aab95c034d327a4715ffaf49d83a8
SHA512a5698e5933ab05492934e3002c8f0aa31a443b05ec043752689e393f8db765d1d01111ac9a4a2c0b0833de80a3b4dd578ed6cbd9b4968a41b257536881a1eaea
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
13KB
MD53ecf4ddbc83501fe2bf76ddf69c1c6de
SHA1c57ccc6f0cb55ef1d497898314a96c7f22f1d500
SHA256d1a038f3ff0cd03e352e50dee93dc4174b5aab95c034d327a4715ffaf49d83a8
SHA512a5698e5933ab05492934e3002c8f0aa31a443b05ec043752689e393f8db765d1d01111ac9a4a2c0b0833de80a3b4dd578ed6cbd9b4968a41b257536881a1eaea
-
memory/3764-20079-0x000007FFFFF80000-0x000007FFFFF90000-memory.dmpFilesize
64KB