Analysis
-
max time kernel
150s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 03:01
Static task
static1
Behavioral task
behavioral1
Sample
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe
Resource
win10v2004-20230220-en
General
-
Target
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe
-
Size
92KB
-
MD5
d3a5c66e319bd71259570ed86f0a1bce
-
SHA1
3c5e36913aa97748981f3471edebb05a8ec9adcb
-
SHA256
c221cb99f25328e6bf50d435b4ab3a2ff8b09f05f7cd90e5ce2006855b3aa619
-
SHA512
def8de735c2153b8a607d3e871d828fd68ac860ec4260e022d3e47c5f816c32eca177a1ee2d4e50d1c4d3fcb55b5a9c6fb46e81c57d704cc97bb489e20d33425
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AZfl0tWOWkNQllq5ywFDOsValHWPMtS+:Qw+asqN5aW/hL9k5NQl80wJalHWP
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
mr.hacker@nerdmail.co
mr.hacker@onionmail.org
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 5 IoCs
Processes:
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe = "C:\\Windows\\System32\\2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe" 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7GRQG1KT\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\27279TJF\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GD4IID9A\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\FKH3QY1L\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JRKDF3EN\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1563773381-2037468142-1146002597-1000\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ARRDY5WI\desktop.ini 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe -
Drops file in System32 directory 2 IoCs
Processes:
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exedescription ioc process File created C:\Windows\System32\2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Windows\System32\Info.hta 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Apothecary.xml.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21305_.GIF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationProvider.resources.dll 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcor.dll 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cancun 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01462_.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_MoveDrop32x32.gif 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jre7\lib\meta-index.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Web.Entity.Design.Resources.dll 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18242_.WMF 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00543_.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL108.XML.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105244.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234001.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions_Generic.css.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Sts2.css.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR20F.GIF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Windows Media Player\en-US\wmpnssci.dll.mui 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00538_.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageAttachmentIconImages.jpg.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\currency.js 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\PREVIEW.GIF 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02039U.BMP.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01295_.GIF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\msadcfr.dll 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ust-Nera 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107512.WMF 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\OliveGreen.css.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Couture.thmx.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.hsp.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\Hierarchy.js 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Sales Pipeline.accdt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIDEBARVERTBB.POC.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04206_.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SHARING.CFG.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\RSSFeeds.js 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNoteSyncPC.dll.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\WindowsBase.resources.dll 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-startup.xml.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\WordMUI.XML 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-api_ja.jar 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libtransform_plugin.dll.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\PROCDB.XLAM.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jre7\lib\security\javaws.policy 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files\Java\jre7\lib\zi\America\Antigua.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00932_.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\GrooveFormsMetaData.xml.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_config_window.html.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292278.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Web.Entity.Design.Resources.dll 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libcache_block_plugin.dll.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\settings.html 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WPULQT98.POC 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fi.pak 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107090.WMF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_alignright.gif 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01180_.WMF 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.http.jetty_3.0.200.v20131021-1843.jar 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21304_.GIF 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR48F.GIF.id-0AE29B63.[mr.hacker@nerdmail.co].crYpt 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGPUNCT.XML 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1040 vssadmin.exe 1144 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exepid process 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1252 vssvc.exe Token: SeRestorePrivilege 1252 vssvc.exe Token: SeAuditPrivilege 1252 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.execmd.execmd.exedescription pid process target process PID 908 wrote to memory of 1716 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 908 wrote to memory of 1716 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 908 wrote to memory of 1716 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 908 wrote to memory of 1716 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 1716 wrote to memory of 1084 1716 cmd.exe mode.com PID 1716 wrote to memory of 1084 1716 cmd.exe mode.com PID 1716 wrote to memory of 1084 1716 cmd.exe mode.com PID 1716 wrote to memory of 1040 1716 cmd.exe vssadmin.exe PID 1716 wrote to memory of 1040 1716 cmd.exe vssadmin.exe PID 1716 wrote to memory of 1040 1716 cmd.exe vssadmin.exe PID 908 wrote to memory of 3912 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 908 wrote to memory of 3912 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 908 wrote to memory of 3912 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 908 wrote to memory of 3912 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe cmd.exe PID 3912 wrote to memory of 3832 3912 cmd.exe mode.com PID 3912 wrote to memory of 3832 3912 cmd.exe mode.com PID 3912 wrote to memory of 3832 3912 cmd.exe mode.com PID 3912 wrote to memory of 1144 3912 cmd.exe vssadmin.exe PID 3912 wrote to memory of 1144 3912 cmd.exe vssadmin.exe PID 3912 wrote to memory of 1144 3912 cmd.exe vssadmin.exe PID 908 wrote to memory of 1616 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe PID 908 wrote to memory of 1616 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe PID 908 wrote to memory of 1616 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe PID 908 wrote to memory of 1616 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe PID 908 wrote to memory of 2324 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe PID 908 wrote to memory of 2324 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe PID 908 wrote to memory of 2324 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe PID 908 wrote to memory of 2324 908 2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe"C:\Users\Admin\AppData\Local\Temp\2023-05-08_d3a5c66e319bd71259570ed86f0a1bce_crysis.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-0AE29B63.[mr.hacker@nerdmail.co].crYptFilesize
23.5MB
MD53d9974bbca3cbb9f1b06fb842a9327c5
SHA19ca00f3e696f40a1401b7679692d24065cbf371d
SHA2562692369a0292a42de4b645f21270f74620312b07dde4e2bf5264d3ac7e280407
SHA512fab2ed5de6811c1078c629f0e0dd2b48f3ae4717b1a669ff1276a8d75386e7cfd49710cf5236bec0ffb9590eeea6a233771945a64066aa45b77bc6199fe91e61
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
4KB
MD5b1da645b004bd6605c0a54073f5d7d5a
SHA1249c6b60dce3f7da6a48662641ba2e663f42581d
SHA256459cf96e4d907f8500060a09fcfa64cd46af9cb1c3fdb7a2c6f44698560f4fad
SHA51293a0fd58abdff6eaf0c34bebee0bbab005768d17f823d97fe86c2e53db185879017e047d5481556f6aba322f004c0f1a616c58b0868a6bcbf14fa1e0d42a7653
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
4KB
MD5b1da645b004bd6605c0a54073f5d7d5a
SHA1249c6b60dce3f7da6a48662641ba2e663f42581d
SHA256459cf96e4d907f8500060a09fcfa64cd46af9cb1c3fdb7a2c6f44698560f4fad
SHA51293a0fd58abdff6eaf0c34bebee0bbab005768d17f823d97fe86c2e53db185879017e047d5481556f6aba322f004c0f1a616c58b0868a6bcbf14fa1e0d42a7653
-
memory/2324-20136-0x000007FFFFF90000-0x000007FFFFFA0000-memory.dmpFilesize
64KB