Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:13
Static task
static1
Behavioral task
behavioral1
Sample
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe
Resource
win10v2004-20230220-en
General
-
Target
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe
-
Size
92KB
-
MD5
10e32edb068eec09bcb2c06e493d267c
-
SHA1
0564166e48cf4873061197af92845aeb8003c79c
-
SHA256
af1342c508451269009121f620068a7da6c848e360475e5017c8eb7199b1ecc6
-
SHA512
26878fd95338f14ef3b64b0fcc97c2074b54e4454fd4ac2b4f22cd931f35456b38c41ac7259ccfb31cf7dd4b98851b2e2a6bd549956ff7a520971d459eadf69c
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AiGra1OVu/GajEpd6xFI51Mhv:Qw+asqN5aW/hLUGGsSGajGdT1
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
mail(herozerman@proton.com
herozerman@tutanota.com
kollooria@xyzmailpro.com
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\GrantAssert.tiff 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Pictures\NewReset.tiff 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe -
Drops startup file 5 IoCs
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe = "C:\\Windows\\System32\\2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe" 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GE2OV5ZK\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOIUPPDG\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3VUIY5IU\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Music\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\IMRPFW0Y\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\POQAGXKK\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\S9P6CX9X\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\N8RJZ5NM\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe -
Drops file in System32 directory 2 IoCs
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exedescription ioc process File created C:\Windows\System32\2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Windows\System32\Info.hta 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\skins\winamp2.xml.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files\Java\jre7\lib\zi\America\Cancun.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Bougainville.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Windows.Presentation.resources.dll 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist.json.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0234687.GIF 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR4F.GIF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Medium.jpg.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mshwLatin.dll.mui 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-text.jar.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.xml 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.ini 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\THMBNAIL.PNG 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME14.CSS 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\gfserrorfromgroove.ico.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\REMINDER.WAV.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\PhotoViewer.dll.mui 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic_5.5.0.165303.jar 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099183.WMF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Accra.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\QUAD.ELM 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files\Mozilla Firefox\msvcp140.dll.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.dll.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\PUSH.WAV.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\stdole.dll.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\rtscom.dll 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recife 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.SF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_F_COL.HXK.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONFILTER.DLL 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-sampler.jar.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101856.BMP.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Mozilla Firefox\Accessible.tlb 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14514_.GIF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14791_.GIF 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_snow.png 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.xml 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\fxplugins.dll.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libaudiobargraph_v_plugin.dll.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18245_.WMF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedShuangPin.txt 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\PMAILEXT.ECF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCHDCNCL.CFG.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Denver.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\default.vlt 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0300840.WMF 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ERROR.GIF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02298_.WMF 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285820.WMF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\TAB_ON.GIF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\ADD.GIF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libsid_plugin.dll 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\DEEPBLUE.INF.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_h.png 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341475.JPG.id-F666134E.[herozerman@tutanota.com].h3r 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 3044 vssadmin.exe 824 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.exepid process 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 996 vssvc.exe Token: SeRestorePrivilege 996 vssvc.exe Token: SeAuditPrivilege 996 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2023050110e32edb068eec09bcb2c06e493d267ccrysis.execmd.execmd.exedescription pid process target process PID 2040 wrote to memory of 1872 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 2040 wrote to memory of 1872 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 2040 wrote to memory of 1872 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 2040 wrote to memory of 1872 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 1872 wrote to memory of 1520 1872 cmd.exe mode.com PID 1872 wrote to memory of 1520 1872 cmd.exe mode.com PID 1872 wrote to memory of 1520 1872 cmd.exe mode.com PID 1872 wrote to memory of 824 1872 cmd.exe vssadmin.exe PID 1872 wrote to memory of 824 1872 cmd.exe vssadmin.exe PID 1872 wrote to memory of 824 1872 cmd.exe vssadmin.exe PID 2040 wrote to memory of 3932 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 2040 wrote to memory of 3932 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 2040 wrote to memory of 3932 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 2040 wrote to memory of 3932 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe cmd.exe PID 3932 wrote to memory of 1004 3932 cmd.exe mode.com PID 3932 wrote to memory of 1004 3932 cmd.exe mode.com PID 3932 wrote to memory of 1004 3932 cmd.exe mode.com PID 3932 wrote to memory of 3044 3932 cmd.exe vssadmin.exe PID 3932 wrote to memory of 3044 3932 cmd.exe vssadmin.exe PID 3932 wrote to memory of 3044 3932 cmd.exe vssadmin.exe PID 2040 wrote to memory of 3696 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe PID 2040 wrote to memory of 3696 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe PID 2040 wrote to memory of 3696 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe PID 2040 wrote to memory of 3696 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe PID 2040 wrote to memory of 2300 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe PID 2040 wrote to memory of 2300 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe PID 2040 wrote to memory of 2300 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe PID 2040 wrote to memory of 2300 2040 2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe"C:\Users\Admin\AppData\Local\Temp\2023050110e32edb068eec09bcb2c06e493d267ccrysis.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.id-F666134E.[herozerman@tutanota.com].h3rFilesize
3.6MB
MD597b6f9605513d23003a30ad637d843de
SHA1c021f7bd4301814d753897c179fa73fccf99bbee
SHA256f883b6f1b363a37dd1058371b403434fb1c2cf71a688fdff143c3ce13df5a796
SHA512cfa53d685904283165394b25eb78fb9d4129bae8fb0f771861a5c2b73ade145b6f085b48acdef9db1f27c0a43c27640b4282f85721490283fdc7e9d6fc8ecb94
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
4KB
MD5df1ae32715b9d4516c285f9445e0d1fd
SHA1a3b9d4398cff067e9e136ac31c12eb2804db9a40
SHA256262856be9ab8bbf047b12edb10f6bc24fb325cae53b3f77b4e9789036f3677c2
SHA512a12a333e27cc3995dbd3126edfced0fb8110071c8c844d611e47dd9a367f7f7eff16231f99c488d0f33ba976aa5917936ec94bec8947fe218788922e6c642d11
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
4KB
MD5df1ae32715b9d4516c285f9445e0d1fd
SHA1a3b9d4398cff067e9e136ac31c12eb2804db9a40
SHA256262856be9ab8bbf047b12edb10f6bc24fb325cae53b3f77b4e9789036f3677c2
SHA512a12a333e27cc3995dbd3126edfced0fb8110071c8c844d611e47dd9a367f7f7eff16231f99c488d0f33ba976aa5917936ec94bec8947fe218788922e6c642d11
-
memory/2300-20131-0x000007FFFFF90000-0x000007FFFFFA0000-memory.dmpFilesize
64KB