Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 01:30
Static task
static1
Behavioral task
behavioral1
Sample
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe
Resource
win10v2004-20230220-en
General
-
Target
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe
-
Size
144KB
-
MD5
8ee82932641f3f527110b0f8ce6b11ce
-
SHA1
fef4e9bc0d20f52423e02ec0bc6a52ea36af97a5
-
SHA256
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a
-
SHA512
6330e3ef0d523406edaf6a2e4e597a460a59e80efe477e574e6e49455637221505152ebb885be9fdd139831e78636567c11f1d161ce4e39a9e65d094ea65968a
-
SSDEEP
3072:tjQgjwASUryVehsZnsTQqLSA/thZhUzcB4r50W23HnBB:R9iV3nspZ/t/6KWmH
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RestoreComplete.tiff e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Pictures\UseConvertTo.tiff e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Pictures\DisableFind.tiff e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Drops startup file 5 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe = "C:\\Windows\\System32\\e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe" e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\Documents\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\Videos\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Searches\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Links\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\Libraries\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Videos\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\Desktop\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\Pictures\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-144354903-2550862337-1367551827-1000\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Public\Downloads\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Users\Admin\Music\desktop.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Drops file in System32 directory 2 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exedescription ioc process File created C:\Windows\System32\e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Windows\System32\Info.hta e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Drops file in Program Files directory 64 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\PeopleSmallTile.scale-100.png e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-phn.xrm-ms e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-oob.xrm-ms e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\Close.png.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\it-it\ui-strings.js e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nl-nl\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-40.png e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_fa.dll.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libadjust_plugin.dll.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\msdaprsr.dll e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-phn.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\ui-strings.js e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\api-ms-win-crt-heap-l1-1-0.dll e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\NetworkServerControl.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sl-SI\View3d\3DViewerProductDescription-universal.xml e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-gb\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileAcrobatCard_Dark.pdf e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.MagicEdit\UserControls\CroppedImage.xbf e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Combine_R_RHP.aapp.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\office.core.operational.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Grace-ul-oob.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-ul-oob.xrm-ms e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Grace-ppd.xrm-ms e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_Subscription-pl.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nb-no\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_OEM_Perp-ul-oob.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ul-oob.xrm-ms e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon.png.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SFBAPPSDK.DLL.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\ConvertToPush.jpg.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.ini e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\VideoLAN\VLC\axvlc.dll.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\UIAutomationTypes.dll e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\glib-lite.dll.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\virgo-new-folder.svg e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-pl.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\export.svg e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\liblibbluray_plugin.dll.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\40.jpg e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\OutlookMailWideTile.scale-200.png e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\vlc.mo.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\resources.pri e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_KMS_Client_AE-ppd.xrm-ms e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ja-jp\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Grace-ppd.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\selection-actions.png e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jconsole.jar.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-ul-oob.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\resources.pri e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Weather_LogoSmall.targetsize-48_altform-unplated.png e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\main.css.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\office32ww.msi.16.x-none.vreg.dat.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp-ppd.xrm-ms.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Yahoo-Light.scale-250.png e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fr-fr\ui-strings.js.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MINSBROAMINGPROXY.DLL e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_basestyle.css.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\Sybase.xsl.id-2BCE1B8F.[[email protected]].java e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 4984 vssadmin.exe 5112 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exepid process 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2520 vssvc.exe Token: SeRestorePrivilege 2520 vssvc.exe Token: SeAuditPrivilege 2520 vssvc.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exepid process 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.execmd.execmd.exedescription pid process target process PID 3704 wrote to memory of 1824 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe cmd.exe PID 3704 wrote to memory of 1824 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe cmd.exe PID 1824 wrote to memory of 2240 1824 cmd.exe mode.com PID 1824 wrote to memory of 2240 1824 cmd.exe mode.com PID 1824 wrote to memory of 4984 1824 cmd.exe vssadmin.exe PID 1824 wrote to memory of 4984 1824 cmd.exe vssadmin.exe PID 3704 wrote to memory of 5572 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe cmd.exe PID 3704 wrote to memory of 5572 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe cmd.exe PID 5572 wrote to memory of 6248 5572 cmd.exe mode.com PID 5572 wrote to memory of 6248 5572 cmd.exe mode.com PID 5572 wrote to memory of 5112 5572 cmd.exe vssadmin.exe PID 5572 wrote to memory of 5112 5572 cmd.exe vssadmin.exe PID 3704 wrote to memory of 5772 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe mshta.exe PID 3704 wrote to memory of 5772 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe mshta.exe PID 3704 wrote to memory of 5496 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe mshta.exe PID 3704 wrote to memory of 5496 3704 e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe"C:\Users\Admin\AppData\Local\Temp\e9bbcfb5d9f42ef0dd75eb435e78d5226087679593893e0c08977694e720cd7a.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookAW
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2240
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4984
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5572 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:6248
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5112
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:5772
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:5496
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-2BCE1B8F.[[email protected]].java
Filesize2.9MB
MD52b2b847d851f912d4513fa07587d474d
SHA12460c0098d69eb892cf3ad89363f29cede98a61d
SHA2561555e6c6c76aae54ae04b68d5e2e315fbb5e8dddbc2d7b7596dd5df2da2ab94f
SHA5121518357178bd731828d401a68fdcf68b0b4844bed5c4514f1b169cf4e98475015e39b5ac77391cf05eeb4ac7828bec351e7186e984a4bce7249eb1fa3f4a7a8b
-
Filesize
13KB
MD539cab6fda3395497cacd48067a7fde79
SHA1a6db34fac24971822fec559823ecc3cfd2d438dd
SHA2568791da815b4a4e082ff35b1aa3c5dfc6257e80231579a7de479df799c267a9c5
SHA51236d234c41b46ba95c64c61737e24bac3dcd2947787c1c38bad76766e92de75bb2660246e3638dfb51ef1749fb5ad61d14fe54f4ce5a4c04f7c5fcbf8e841dc0c
-
Filesize
13KB
MD539cab6fda3395497cacd48067a7fde79
SHA1a6db34fac24971822fec559823ecc3cfd2d438dd
SHA2568791da815b4a4e082ff35b1aa3c5dfc6257e80231579a7de479df799c267a9c5
SHA51236d234c41b46ba95c64c61737e24bac3dcd2947787c1c38bad76766e92de75bb2660246e3638dfb51ef1749fb5ad61d14fe54f4ce5a4c04f7c5fcbf8e841dc0c