Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
30-10-2023 07:26
Static task
static1
Behavioral task
behavioral1
Sample
fba616f5dc56b1cd9c463c0b9da86578.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
fba616f5dc56b1cd9c463c0b9da86578.exe
Resource
win10v2004-20231023-en
General
-
Target
fba616f5dc56b1cd9c463c0b9da86578.exe
-
Size
1.1MB
-
MD5
fba616f5dc56b1cd9c463c0b9da86578
-
SHA1
ac2b9c5c34af3894210852c7199a32dcd96c048c
-
SHA256
30e90f33067608e8e7f4d57fd6903adb5eccb91bf426c56569c16bf86f0d8971
-
SHA512
7e6c8b01308310a7f13bb3891a166eced2d15057ffa1d3b296058d9420ac46cb39abc272d4883bb2168b00d04a34fe674ef6085776b618a46913854421484cd5
-
SSDEEP
12288:6YFxm3mFshWQKt/kzc8MDz311UVZi/MBJ+z4YTwSPFOXXBumgKGYwhm0XPie4LnM:NrPFYW/x19/MGxPGAmQn/isFhXV
Malware Config
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
http://www.w3.org/TR/html4/strict.dtd'>
Extracted
C:\info.hta
Signatures
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 540 bcdedit.exe 2352 bcdedit.exe 1172 bcdedit.exe 2304 bcdedit.exe -
Renames multiple (318) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exewbadmin.exepid process 2384 wbadmin.exe 1564 wbadmin.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Drops startup file 3 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fba616f5dc56b1cd9c463c0b9da86578 = "C:\\Users\\Admin\\AppData\\Local\\fba616f5dc56b1cd9c463c0b9da86578.exe" fba616f5dc56b1cd9c463c0b9da86578.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\fba616f5dc56b1cd9c463c0b9da86578 = "C:\\Users\\Admin\\AppData\\Local\\fba616f5dc56b1cd9c463c0b9da86578.exe" fba616f5dc56b1cd9c463c0b9da86578.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Music\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Links\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Documents\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Downloads\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3618187007-3650799920-3290345941-1000\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ESV7R4E\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Videos\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Documents\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1HY7WIQC\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Pictures\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Videos\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\C6LU9VPK\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Desktop\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\Music\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Public\Libraries\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\P77JTQH8\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\A7ZEET3J\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini fba616f5dc56b1cd9c463c0b9da86578.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exefba616f5dc56b1cd9c463c0b9da86578.exedescription pid process target process PID 2228 set thread context of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 set thread context of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe -
Drops file in Program Files directory 64 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exedescription ioc process File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Oral.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\DVD Maker\SecretST.TTF fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Anchorage fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\PREVIEW.GIF fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\Informix.xsl.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01193_.WMF fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03451_.WMF fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14828_.GIF fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21295_.GIF fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\RTF_BOLD.GIF fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository.nl_ja_4.4.0.v20140623020002.jar fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-dialogs.jar.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Pushpin.xml fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\SettingsInternal.zip fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Catamarca.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VC\msdia90.dll.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01560_.WMF.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\PMAILEXT.ECF fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONTAB32.DLL fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.xml fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Eucla fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\CAGCAT10.MMW fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POSTCD11.POC fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-threaddump.jar.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Amsterdam fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\msdasqlr.dll.mui fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\UIAutomationClient.resources.dll fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\ReadOutLoud.api.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\SETUP.XML fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00902_.WMF.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02282_.WMF fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\GostTitle.XSL fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWRECS.DLL fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Perth fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\12.png fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\MANIFEST.MF.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jre7\bin\fontmanager.dll.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\SearchHide.vbs fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)grayStateIcon.png fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR1F.GIF.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\en-US.pak.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\pt-PT.pak fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\Eucla.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\MSOSV.DLL fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\es-ES\msdaprsr.dll.mui fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS_F_COL.HXK.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactLowMask.bmp fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\UnreadIcon.jpg fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\HEADER.GIF.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\wmplayer.exe.mui fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.nl_ja_4.4.0.v20140623020002.jar.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libjpeg_plugin.dll.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0301480.WMF.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\DEFAULT.XSL fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OCRHC.DAT fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105246.WMF fba616f5dc56b1cd9c463c0b9da86578.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02009_.WMF.id[CBEC25ED-3483].[[email protected]].8base fba616f5dc56b1cd9c463c0b9da86578.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tabskb.dll.mui fba616f5dc56b1cd9c463c0b9da86578.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2508 2736 WerFault.exe fba616f5dc56b1cd9c463c0b9da86578.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1804 vssadmin.exe 1536 vssadmin.exe -
Processes:
mshta.exemshta.exemshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exepid process 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe 2576 fba616f5dc56b1cd9c463c0b9da86578.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exefba616f5dc56b1cd9c463c0b9da86578.exefba616f5dc56b1cd9c463c0b9da86578.exevssvc.exeWMIC.exewbengine.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2228 fba616f5dc56b1cd9c463c0b9da86578.exe Token: SeDebugPrivilege 2696 fba616f5dc56b1cd9c463c0b9da86578.exe Token: SeDebugPrivilege 2576 fba616f5dc56b1cd9c463c0b9da86578.exe Token: SeBackupPrivilege 1872 vssvc.exe Token: SeRestorePrivilege 1872 vssvc.exe Token: SeAuditPrivilege 1872 vssvc.exe Token: SeIncreaseQuotaPrivilege 2720 WMIC.exe Token: SeSecurityPrivilege 2720 WMIC.exe Token: SeTakeOwnershipPrivilege 2720 WMIC.exe Token: SeLoadDriverPrivilege 2720 WMIC.exe Token: SeSystemProfilePrivilege 2720 WMIC.exe Token: SeSystemtimePrivilege 2720 WMIC.exe Token: SeProfSingleProcessPrivilege 2720 WMIC.exe Token: SeIncBasePriorityPrivilege 2720 WMIC.exe Token: SeCreatePagefilePrivilege 2720 WMIC.exe Token: SeBackupPrivilege 2720 WMIC.exe Token: SeRestorePrivilege 2720 WMIC.exe Token: SeShutdownPrivilege 2720 WMIC.exe Token: SeDebugPrivilege 2720 WMIC.exe Token: SeSystemEnvironmentPrivilege 2720 WMIC.exe Token: SeRemoteShutdownPrivilege 2720 WMIC.exe Token: SeUndockPrivilege 2720 WMIC.exe Token: SeManageVolumePrivilege 2720 WMIC.exe Token: 33 2720 WMIC.exe Token: 34 2720 WMIC.exe Token: 35 2720 WMIC.exe Token: SeIncreaseQuotaPrivilege 2720 WMIC.exe Token: SeSecurityPrivilege 2720 WMIC.exe Token: SeTakeOwnershipPrivilege 2720 WMIC.exe Token: SeLoadDriverPrivilege 2720 WMIC.exe Token: SeSystemProfilePrivilege 2720 WMIC.exe Token: SeSystemtimePrivilege 2720 WMIC.exe Token: SeProfSingleProcessPrivilege 2720 WMIC.exe Token: SeIncBasePriorityPrivilege 2720 WMIC.exe Token: SeCreatePagefilePrivilege 2720 WMIC.exe Token: SeBackupPrivilege 2720 WMIC.exe Token: SeRestorePrivilege 2720 WMIC.exe Token: SeShutdownPrivilege 2720 WMIC.exe Token: SeDebugPrivilege 2720 WMIC.exe Token: SeSystemEnvironmentPrivilege 2720 WMIC.exe Token: SeRemoteShutdownPrivilege 2720 WMIC.exe Token: SeUndockPrivilege 2720 WMIC.exe Token: SeManageVolumePrivilege 2720 WMIC.exe Token: 33 2720 WMIC.exe Token: 34 2720 WMIC.exe Token: 35 2720 WMIC.exe Token: SeBackupPrivilege 2436 wbengine.exe Token: SeRestorePrivilege 2436 wbengine.exe Token: SeSecurityPrivilege 2436 wbengine.exe Token: SeIncreaseQuotaPrivilege 2356 WMIC.exe Token: SeSecurityPrivilege 2356 WMIC.exe Token: SeTakeOwnershipPrivilege 2356 WMIC.exe Token: SeLoadDriverPrivilege 2356 WMIC.exe Token: SeSystemProfilePrivilege 2356 WMIC.exe Token: SeSystemtimePrivilege 2356 WMIC.exe Token: SeProfSingleProcessPrivilege 2356 WMIC.exe Token: SeIncBasePriorityPrivilege 2356 WMIC.exe Token: SeCreatePagefilePrivilege 2356 WMIC.exe Token: SeBackupPrivilege 2356 WMIC.exe Token: SeRestorePrivilege 2356 WMIC.exe Token: SeShutdownPrivilege 2356 WMIC.exe Token: SeDebugPrivilege 2356 WMIC.exe Token: SeSystemEnvironmentPrivilege 2356 WMIC.exe Token: SeRemoteShutdownPrivilege 2356 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fba616f5dc56b1cd9c463c0b9da86578.exefba616f5dc56b1cd9c463c0b9da86578.exefba616f5dc56b1cd9c463c0b9da86578.exefba616f5dc56b1cd9c463c0b9da86578.execmd.execmd.exedescription pid process target process PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2228 wrote to memory of 2576 2228 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2696 wrote to memory of 2736 2696 fba616f5dc56b1cd9c463c0b9da86578.exe fba616f5dc56b1cd9c463c0b9da86578.exe PID 2736 wrote to memory of 2508 2736 fba616f5dc56b1cd9c463c0b9da86578.exe WerFault.exe PID 2736 wrote to memory of 2508 2736 fba616f5dc56b1cd9c463c0b9da86578.exe WerFault.exe PID 2736 wrote to memory of 2508 2736 fba616f5dc56b1cd9c463c0b9da86578.exe WerFault.exe PID 2736 wrote to memory of 2508 2736 fba616f5dc56b1cd9c463c0b9da86578.exe WerFault.exe PID 2576 wrote to memory of 2500 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2576 wrote to memory of 2500 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2576 wrote to memory of 2500 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2576 wrote to memory of 2500 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2576 wrote to memory of 2532 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2576 wrote to memory of 2532 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2576 wrote to memory of 2532 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2576 wrote to memory of 2532 2576 fba616f5dc56b1cd9c463c0b9da86578.exe cmd.exe PID 2532 wrote to memory of 1804 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1804 2532 cmd.exe vssadmin.exe PID 2532 wrote to memory of 1804 2532 cmd.exe vssadmin.exe PID 2500 wrote to memory of 1408 2500 cmd.exe netsh.exe PID 2500 wrote to memory of 1408 2500 cmd.exe netsh.exe PID 2500 wrote to memory of 1408 2500 cmd.exe netsh.exe PID 2500 wrote to memory of 1560 2500 cmd.exe netsh.exe PID 2500 wrote to memory of 1560 2500 cmd.exe netsh.exe PID 2500 wrote to memory of 1560 2500 cmd.exe netsh.exe PID 2532 wrote to memory of 2720 2532 cmd.exe WMIC.exe PID 2532 wrote to memory of 2720 2532 cmd.exe WMIC.exe PID 2532 wrote to memory of 2720 2532 cmd.exe WMIC.exe PID 2532 wrote to memory of 540 2532 cmd.exe bcdedit.exe PID 2532 wrote to memory of 540 2532 cmd.exe bcdedit.exe PID 2532 wrote to memory of 540 2532 cmd.exe bcdedit.exe PID 2532 wrote to memory of 2352 2532 cmd.exe bcdedit.exe PID 2532 wrote to memory of 2352 2532 cmd.exe bcdedit.exe PID 2532 wrote to memory of 2352 2532 cmd.exe bcdedit.exe PID 2532 wrote to memory of 2384 2532 cmd.exe wbadmin.exe PID 2532 wrote to memory of 2384 2532 cmd.exe wbadmin.exe PID 2532 wrote to memory of 2384 2532 cmd.exe wbadmin.exe PID 2576 wrote to memory of 2388 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 2388 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 2388 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 2388 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 1744 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 1744 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 1744 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 1744 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe PID 2576 wrote to memory of 2932 2576 fba616f5dc56b1cd9c463c0b9da86578.exe mshta.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exe"C:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exeC:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exe2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exe"C:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exeC:\Users\Admin\AppData\Local\Temp\fba616f5dc56b1cd9c463c0b9da86578.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 1645⤵
- Program crash
PID:2508 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1804 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:540 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2352 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:2384 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off4⤵
- Modifies Windows Firewall
PID:1408 -
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable4⤵
- Modifies Windows Firewall
PID:1560 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"3⤵
- Modifies Internet Explorer settings
PID:2388 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"3⤵
- Modifies Internet Explorer settings
PID:1744 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"3⤵
- Modifies Internet Explorer settings
PID:2932 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"3⤵
- Modifies Internet Explorer settings
PID:2952 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:888
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1536 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1172 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2304 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1564
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:308
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab.id[CBEC25ED-3483].[[email protected]].8baseFilesize
143.1MB
MD5dd084944d579c8ff8f96ff1919fae081
SHA198d7c2622fd593fe08c0e567cb0df4f7b687ddc5
SHA25635e94de5a712366925f4cfa8025b5c215ff6c9f2a336da5a7869ca590a176255
SHA512b82e238bae0cb07f923a0c955531856082fb66555d21ed8085bbbd9631a83c37a90d344b5727cfe24549d2351789469de583f2e01380a29c1125b95c1b840487
-
C:\Users\Admin\Desktop\info.htaFilesize
5KB
MD5b4bf73ea713f6b0bcef5b86877a2c886
SHA1ebef45fbf95ea32cee5f4bd7e48f6f260d8d160f
SHA256c40518712cfd76918493f75aa181c5c99d1835ff38298271f58c29333cb6ec27
SHA512cf7e7bfb83ea1d155ff2f81956bde514c43cb0572a346e3d42889695b5bc2b6034d152544f8a71212fab219cdd503699e586c85c6d4190479e8205c3b920ef98
-
C:\info.htaFilesize
5KB
MD5b4bf73ea713f6b0bcef5b86877a2c886
SHA1ebef45fbf95ea32cee5f4bd7e48f6f260d8d160f
SHA256c40518712cfd76918493f75aa181c5c99d1835ff38298271f58c29333cb6ec27
SHA512cf7e7bfb83ea1d155ff2f81956bde514c43cb0572a346e3d42889695b5bc2b6034d152544f8a71212fab219cdd503699e586c85c6d4190479e8205c3b920ef98
-
C:\info.htaFilesize
5KB
MD5b4bf73ea713f6b0bcef5b86877a2c886
SHA1ebef45fbf95ea32cee5f4bd7e48f6f260d8d160f
SHA256c40518712cfd76918493f75aa181c5c99d1835ff38298271f58c29333cb6ec27
SHA512cf7e7bfb83ea1d155ff2f81956bde514c43cb0572a346e3d42889695b5bc2b6034d152544f8a71212fab219cdd503699e586c85c6d4190479e8205c3b920ef98
-
C:\users\public\desktop\info.htaFilesize
5KB
MD5b4bf73ea713f6b0bcef5b86877a2c886
SHA1ebef45fbf95ea32cee5f4bd7e48f6f260d8d160f
SHA256c40518712cfd76918493f75aa181c5c99d1835ff38298271f58c29333cb6ec27
SHA512cf7e7bfb83ea1d155ff2f81956bde514c43cb0572a346e3d42889695b5bc2b6034d152544f8a71212fab219cdd503699e586c85c6d4190479e8205c3b920ef98
-
F:\info.htaFilesize
5KB
MD5b4bf73ea713f6b0bcef5b86877a2c886
SHA1ebef45fbf95ea32cee5f4bd7e48f6f260d8d160f
SHA256c40518712cfd76918493f75aa181c5c99d1835ff38298271f58c29333cb6ec27
SHA512cf7e7bfb83ea1d155ff2f81956bde514c43cb0572a346e3d42889695b5bc2b6034d152544f8a71212fab219cdd503699e586c85c6d4190479e8205c3b920ef98
-
memory/2228-3-0x00000000006C0000-0x000000000070E000-memory.dmpFilesize
312KB
-
memory/2228-6-0x00000000049B0000-0x00000000049FC000-memory.dmpFilesize
304KB
-
memory/2228-5-0x0000000000710000-0x0000000000744000-memory.dmpFilesize
208KB
-
memory/2228-4-0x00000000004B0000-0x00000000004E6000-memory.dmpFilesize
216KB
-
memory/2228-17-0x00000000746C0000-0x0000000074DAE000-memory.dmpFilesize
6.9MB
-
memory/2228-2-0x0000000004970000-0x00000000049B0000-memory.dmpFilesize
256KB
-
memory/2228-1-0x00000000746C0000-0x0000000074DAE000-memory.dmpFilesize
6.9MB
-
memory/2228-0-0x0000000000DB0000-0x0000000000EDA000-memory.dmpFilesize
1.2MB
-
memory/2576-49-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-61-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-18-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-19-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-7-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-8-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-9-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-10-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-11-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-45-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2576-47-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-48-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-50-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-51-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-56-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-60-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-15-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-12-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-80-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-81-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-105-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-99-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-94-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-131-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-272-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-296-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-3704-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2576-4160-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2696-34-0x00000000735D0000-0x0000000073CBE000-memory.dmpFilesize
6.9MB
-
memory/2696-22-0x00000000049A0000-0x00000000049E0000-memory.dmpFilesize
256KB
-
memory/2696-21-0x00000000735D0000-0x0000000073CBE000-memory.dmpFilesize
6.9MB
-
memory/2696-20-0x0000000000DB0000-0x0000000000EDA000-memory.dmpFilesize
1.2MB
-
memory/2736-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB