Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-10-2023 00:28
Static task
static1
Behavioral task
behavioral1
Sample
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe
Resource
win10v2004-20230915-en
General
-
Target
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe
-
Size
744KB
-
MD5
8b3ebf83ef13fc6fb805a60851635751
-
SHA1
72a285b0b7ddd02a269dcdd8a77e93e32d475344
-
SHA256
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c
-
SHA512
d04197080a6124cddd8ce2b8e7c2cd53ff6adf623379aa80f1206ebc3d2bac169a01c18a9eeeef9d71eb37e7a0e2232eecbf130fe577c2089aea05a7542caccf
-
SSDEEP
12288:MQwyiloPKmAGzrdm+blQnjL0U0ESJ2caaE17hrCyvMzu6FRAbKSXut0wGc0U6xbP:syilG1AGzrdm+ajoU82caaEDWyvMW+lM
Malware Config
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
Signatures
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 2044 bcdedit.exe 812 bcdedit.exe 1908 bcdedit.exe 2088 bcdedit.exe -
Renames multiple (313) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exewbadmin.exepid process 2844 wbadmin.exe 1820 wbadmin.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Drops startup file 3 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c = "C:\\Users\\Admin\\AppData\\Local\\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe" eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c = "C:\\Users\\Admin\\AppData\\Local\\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe" eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OW945HRI\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Searches\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Music\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3185155662-718608226-894467740-1000\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Music\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RNNGBMMH\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\21HTV0YV\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\MTONL7NE\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Documents\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\KGR8FNXC\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Pictures\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Links\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TAZDKRER\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Documents\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\801M4P4S\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\Videos\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Desktop\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Public\Videos\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exedescription pid process target process PID 2204 set thread context of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exedescription ioc process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-loaders_zh_CN.jar.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01301_.GIF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageSmall.jpg eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\calendar.html eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NextMenuButtonIcon.png eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme_0.9.300.v20140424-2042.jar eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-keyring.jar eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02407_.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14532_.GIF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipRes.dll.mui eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrenalm.dat eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.xml.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18193_.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Trek.thmx eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\RTF_BOLD.GIF.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGMARQ.DPV.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_over.png eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\topnav.gif.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Godthab eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libclone_plugin.dll.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106146.WMF.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107154.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107264.WMF.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00183_.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00483_.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services.nl_zh_4.4.0.v20140623020002.jar.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Tunis eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Maldives eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Port_Moresby eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe.config eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\macroprogress.gif eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\library.js eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Ushuaia eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115843.GIF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XMLSDK5.CHM.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.AR.XML eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\notConnectedStateIcon.png eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\Java\jre7\lib\deploy\messages_zh_HK.properties.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\SPRING.INF.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086424.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0102762.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\Built-In Building Blocks.dotx.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\BriefcaseIcon.jpg eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\DRUMROLL.WAV eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SplashScreen.bmp.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\METCONV.TXT eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\COMPASS.ELM eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.DEV.HXS.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\Java\jre7\lib\zi\EST.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Chatham.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmpc_plugin.dll eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00270_.WMF.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0240719.WMF eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files\7-Zip\Lang\da.txt.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sv.pak eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Monrovia eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\EEINTL.DLL.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Sts.css.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WORDREP.XML.id[BA1458D1-3483].[[email protected]].8base eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libsftp_plugin.dll eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2512 vssadmin.exe 2600 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exepid process 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exeeb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exeeb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exevssvc.exeWMIC.exewbengine.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe Token: SeDebugPrivilege 1532 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe Token: SeDebugPrivilege 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe Token: SeBackupPrivilege 2436 vssvc.exe Token: SeRestorePrivilege 2436 vssvc.exe Token: SeAuditPrivilege 2436 vssvc.exe Token: SeIncreaseQuotaPrivilege 2560 WMIC.exe Token: SeSecurityPrivilege 2560 WMIC.exe Token: SeTakeOwnershipPrivilege 2560 WMIC.exe Token: SeLoadDriverPrivilege 2560 WMIC.exe Token: SeSystemProfilePrivilege 2560 WMIC.exe Token: SeSystemtimePrivilege 2560 WMIC.exe Token: SeProfSingleProcessPrivilege 2560 WMIC.exe Token: SeIncBasePriorityPrivilege 2560 WMIC.exe Token: SeCreatePagefilePrivilege 2560 WMIC.exe Token: SeBackupPrivilege 2560 WMIC.exe Token: SeRestorePrivilege 2560 WMIC.exe Token: SeShutdownPrivilege 2560 WMIC.exe Token: SeDebugPrivilege 2560 WMIC.exe Token: SeSystemEnvironmentPrivilege 2560 WMIC.exe Token: SeRemoteShutdownPrivilege 2560 WMIC.exe Token: SeUndockPrivilege 2560 WMIC.exe Token: SeManageVolumePrivilege 2560 WMIC.exe Token: 33 2560 WMIC.exe Token: 34 2560 WMIC.exe Token: 35 2560 WMIC.exe Token: SeIncreaseQuotaPrivilege 2560 WMIC.exe Token: SeSecurityPrivilege 2560 WMIC.exe Token: SeTakeOwnershipPrivilege 2560 WMIC.exe Token: SeLoadDriverPrivilege 2560 WMIC.exe Token: SeSystemProfilePrivilege 2560 WMIC.exe Token: SeSystemtimePrivilege 2560 WMIC.exe Token: SeProfSingleProcessPrivilege 2560 WMIC.exe Token: SeIncBasePriorityPrivilege 2560 WMIC.exe Token: SeCreatePagefilePrivilege 2560 WMIC.exe Token: SeBackupPrivilege 2560 WMIC.exe Token: SeRestorePrivilege 2560 WMIC.exe Token: SeShutdownPrivilege 2560 WMIC.exe Token: SeDebugPrivilege 2560 WMIC.exe Token: SeSystemEnvironmentPrivilege 2560 WMIC.exe Token: SeRemoteShutdownPrivilege 2560 WMIC.exe Token: SeUndockPrivilege 2560 WMIC.exe Token: SeManageVolumePrivilege 2560 WMIC.exe Token: 33 2560 WMIC.exe Token: 34 2560 WMIC.exe Token: 35 2560 WMIC.exe Token: SeBackupPrivilege 212 wbengine.exe Token: SeRestorePrivilege 212 wbengine.exe Token: SeSecurityPrivilege 212 wbengine.exe Token: SeIncreaseQuotaPrivilege 2588 WMIC.exe Token: SeSecurityPrivilege 2588 WMIC.exe Token: SeTakeOwnershipPrivilege 2588 WMIC.exe Token: SeLoadDriverPrivilege 2588 WMIC.exe Token: SeSystemProfilePrivilege 2588 WMIC.exe Token: SeSystemtimePrivilege 2588 WMIC.exe Token: SeProfSingleProcessPrivilege 2588 WMIC.exe Token: SeIncBasePriorityPrivilege 2588 WMIC.exe Token: SeCreatePagefilePrivilege 2588 WMIC.exe Token: SeBackupPrivilege 2588 WMIC.exe Token: SeRestorePrivilege 2588 WMIC.exe Token: SeShutdownPrivilege 2588 WMIC.exe Token: SeDebugPrivilege 2588 WMIC.exe Token: SeSystemEnvironmentPrivilege 2588 WMIC.exe Token: SeRemoteShutdownPrivilege 2588 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exeeb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.execmd.execmd.execmd.exedescription pid process target process PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 2204 wrote to memory of 436 2204 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe PID 436 wrote to memory of 2712 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 2712 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 2712 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 2712 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 2644 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 2644 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 2644 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 2644 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 2712 wrote to memory of 2512 2712 cmd.exe vssadmin.exe PID 2712 wrote to memory of 2512 2712 cmd.exe vssadmin.exe PID 2712 wrote to memory of 2512 2712 cmd.exe vssadmin.exe PID 2644 wrote to memory of 2676 2644 cmd.exe netsh.exe PID 2644 wrote to memory of 2676 2644 cmd.exe netsh.exe PID 2644 wrote to memory of 2676 2644 cmd.exe netsh.exe PID 2644 wrote to memory of 888 2644 cmd.exe netsh.exe PID 2644 wrote to memory of 888 2644 cmd.exe netsh.exe PID 2644 wrote to memory of 888 2644 cmd.exe netsh.exe PID 2712 wrote to memory of 2560 2712 cmd.exe WMIC.exe PID 2712 wrote to memory of 2560 2712 cmd.exe WMIC.exe PID 2712 wrote to memory of 2560 2712 cmd.exe WMIC.exe PID 2712 wrote to memory of 2044 2712 cmd.exe bcdedit.exe PID 2712 wrote to memory of 2044 2712 cmd.exe bcdedit.exe PID 2712 wrote to memory of 2044 2712 cmd.exe bcdedit.exe PID 2712 wrote to memory of 812 2712 cmd.exe bcdedit.exe PID 2712 wrote to memory of 812 2712 cmd.exe bcdedit.exe PID 2712 wrote to memory of 812 2712 cmd.exe bcdedit.exe PID 2712 wrote to memory of 2844 2712 cmd.exe wbadmin.exe PID 2712 wrote to memory of 2844 2712 cmd.exe wbadmin.exe PID 2712 wrote to memory of 2844 2712 cmd.exe wbadmin.exe PID 436 wrote to memory of 564 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 564 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 564 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 564 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1172 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1172 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1172 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1172 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 2280 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 2280 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 2280 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 2280 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1540 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1540 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1540 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 1540 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe mshta.exe PID 436 wrote to memory of 900 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 900 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 900 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 436 wrote to memory of 900 436 eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe cmd.exe PID 900 wrote to memory of 2600 900 cmd.exe vssadmin.exe PID 900 wrote to memory of 2600 900 cmd.exe vssadmin.exe PID 900 wrote to memory of 2600 900 cmd.exe vssadmin.exe PID 900 wrote to memory of 2588 900 cmd.exe WMIC.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe"C:\Users\Admin\AppData\Local\Temp\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exeC:\Users\Admin\AppData\Local\Temp\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe"C:\Users\Admin\AppData\Local\Temp\eb24adb38f36113fe71f942596c355afd59a2e83a0663daf32ae9bb30059732c.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2512 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:2044 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:812 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:2844 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off4⤵
- Modifies Windows Firewall
PID:2676 -
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable4⤵
- Modifies Windows Firewall
PID:888 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"3⤵PID:564
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"3⤵PID:1172
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"3⤵PID:2280
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"3⤵PID:1540
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2600 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1908 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2088 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1820
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:212
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab.id[BA1458D1-3483].[[email protected]].8base
Filesize143.1MB
MD5a67b87cf533efd56230cec6a5e865ca2
SHA1bae87ce5ab29c2bd7de1171f4cd1522b48b12e7a
SHA256bcd79295521b3bdc311f8b9a798c4662f8ec86c84c38d866bc2d562e9f1c6144
SHA512e7305ff09b40b3eae5d460c0c1a5a4100a807bfadc1855e098584974bcd1d4c979bd4c5b069126e2b7e739eae5027d0e97b4891fe9f1a7968d612afe93281e2a
-
Filesize
5KB
MD52856453a6e243668acb2980bbcf146c7
SHA19ee60da079ef2fa80a11389a25b21eac66b72b0c
SHA2566b0d86944297334961c9a247d6097bd006443be7b22179c771b88e0f00b1fa3a
SHA512a30480857f52f22dc0fa81e90e4d36aa28fbf39c3815aec8a93a31445d196b3a069cac26f0b9848e21f1aac2d9294c1a68b9b3ce246c1a575cd90644fb1115a5
-
Filesize
5KB
MD52856453a6e243668acb2980bbcf146c7
SHA19ee60da079ef2fa80a11389a25b21eac66b72b0c
SHA2566b0d86944297334961c9a247d6097bd006443be7b22179c771b88e0f00b1fa3a
SHA512a30480857f52f22dc0fa81e90e4d36aa28fbf39c3815aec8a93a31445d196b3a069cac26f0b9848e21f1aac2d9294c1a68b9b3ce246c1a575cd90644fb1115a5
-
Filesize
5KB
MD52856453a6e243668acb2980bbcf146c7
SHA19ee60da079ef2fa80a11389a25b21eac66b72b0c
SHA2566b0d86944297334961c9a247d6097bd006443be7b22179c771b88e0f00b1fa3a
SHA512a30480857f52f22dc0fa81e90e4d36aa28fbf39c3815aec8a93a31445d196b3a069cac26f0b9848e21f1aac2d9294c1a68b9b3ce246c1a575cd90644fb1115a5
-
Filesize
5KB
MD52856453a6e243668acb2980bbcf146c7
SHA19ee60da079ef2fa80a11389a25b21eac66b72b0c
SHA2566b0d86944297334961c9a247d6097bd006443be7b22179c771b88e0f00b1fa3a
SHA512a30480857f52f22dc0fa81e90e4d36aa28fbf39c3815aec8a93a31445d196b3a069cac26f0b9848e21f1aac2d9294c1a68b9b3ce246c1a575cd90644fb1115a5
-
Filesize
5KB
MD52856453a6e243668acb2980bbcf146c7
SHA19ee60da079ef2fa80a11389a25b21eac66b72b0c
SHA2566b0d86944297334961c9a247d6097bd006443be7b22179c771b88e0f00b1fa3a
SHA512a30480857f52f22dc0fa81e90e4d36aa28fbf39c3815aec8a93a31445d196b3a069cac26f0b9848e21f1aac2d9294c1a68b9b3ce246c1a575cd90644fb1115a5