Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 15:37
Static task
static1
Behavioral task
behavioral1
Sample
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe
Resource
win10v2004-20231215-en
General
-
Target
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe
-
Size
434KB
-
MD5
9eb1d5dbe3722be30545c9b63565d2eb
-
SHA1
78adabc1ac2c1cf58a30ac7bea53062a1e11c9b4
-
SHA256
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862
-
SHA512
2360ab53c10995daafdd118755b98439baba79232865d8daf10a97bfb9e136f16e49ab315ae804a768593d27f7dc86e8e1708385a13653fad4a850de7c56400b
-
SSDEEP
6144:ud8FpUeW9Xb7cE4luAoF6hS1g0cmpSZ/gdRKOMsaVGKMBaoU2x0jPX3lAa/ac:u39XbgE/AMLLSZId/adpr7/ac
Malware Config
Extracted
C:\Program Files (x86)\R3ADM3.txt
conti
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.info
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Renames multiple (7327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/2644-4-0x00000000021F0000-0x0000000002221000-memory.dmp dave -
Drops startup file 1 IoCs
Processes:
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
Processes:
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exedescription ioc Process File opened for modification C:\Users\Admin\Saved Games\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\Documents\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\Music\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\Videos\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Links\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\Music\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe -
Drops file in Program Files directory 64 IoCs
Processes:
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exedescription ioc Process File opened for modification C:\Program Files\FindCompare.vdw 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientPreview_eula.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\cs.pak 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\vlc.mo 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files\VideoLAN\VLC\locale\af\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\s_thumbnailview_18.svg 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\pt-br\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\minimalist.dotx 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-ma\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sk-sk\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\share_icons2x.png 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\AppStore_icon.svg 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Adobe\Products.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_Subscription-ppd.xrm-ms 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-tw\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\ms_get.svg 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\logo_retina.png 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTest-ppd.xrm-ms 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\cs.pak.DATA 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sqlpdw.xsl 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_KMS_Client_AE-ppd.xrm-ms 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_OEM_Perp-ul-oob.xrm-ms 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymxl.ttf 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\es-es\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\da-dk\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\FM20.CHM 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\hyph_en_GB.dic 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\files_icons2x.png 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\selector.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pt-br\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail2-ul-phn.xrm-ms 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\officeinventoryagentlogon.xml 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ca-es\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Trial-pl.xrm-ms 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMSL.TTF 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-140.png 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\checkmark-2x.png 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-white_scale-180.png 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\youtube.luac 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\BLENDS.INF 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\css\main.css 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-fr\ui-strings.js 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\classlist 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\desktop.ini 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\R3ADM3.txt 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Search.api 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exepid Process 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
vssvc.exeWMIC.exedescription pid Process Token: SeBackupPrivilege 3676 vssvc.exe Token: SeRestorePrivilege 3676 vssvc.exe Token: SeAuditPrivilege 3676 vssvc.exe Token: SeIncreaseQuotaPrivilege 756 WMIC.exe Token: SeSecurityPrivilege 756 WMIC.exe Token: SeTakeOwnershipPrivilege 756 WMIC.exe Token: SeLoadDriverPrivilege 756 WMIC.exe Token: SeSystemProfilePrivilege 756 WMIC.exe Token: SeSystemtimePrivilege 756 WMIC.exe Token: SeProfSingleProcessPrivilege 756 WMIC.exe Token: SeIncBasePriorityPrivilege 756 WMIC.exe Token: SeCreatePagefilePrivilege 756 WMIC.exe Token: SeBackupPrivilege 756 WMIC.exe Token: SeRestorePrivilege 756 WMIC.exe Token: SeShutdownPrivilege 756 WMIC.exe Token: SeDebugPrivilege 756 WMIC.exe Token: SeSystemEnvironmentPrivilege 756 WMIC.exe Token: SeRemoteShutdownPrivilege 756 WMIC.exe Token: SeUndockPrivilege 756 WMIC.exe Token: SeManageVolumePrivilege 756 WMIC.exe Token: 33 756 WMIC.exe Token: 34 756 WMIC.exe Token: 35 756 WMIC.exe Token: 36 756 WMIC.exe Token: SeIncreaseQuotaPrivilege 756 WMIC.exe Token: SeSecurityPrivilege 756 WMIC.exe Token: SeTakeOwnershipPrivilege 756 WMIC.exe Token: SeLoadDriverPrivilege 756 WMIC.exe Token: SeSystemProfilePrivilege 756 WMIC.exe Token: SeSystemtimePrivilege 756 WMIC.exe Token: SeProfSingleProcessPrivilege 756 WMIC.exe Token: SeIncBasePriorityPrivilege 756 WMIC.exe Token: SeCreatePagefilePrivilege 756 WMIC.exe Token: SeBackupPrivilege 756 WMIC.exe Token: SeRestorePrivilege 756 WMIC.exe Token: SeShutdownPrivilege 756 WMIC.exe Token: SeDebugPrivilege 756 WMIC.exe Token: SeSystemEnvironmentPrivilege 756 WMIC.exe Token: SeRemoteShutdownPrivilege 756 WMIC.exe Token: SeUndockPrivilege 756 WMIC.exe Token: SeManageVolumePrivilege 756 WMIC.exe Token: 33 756 WMIC.exe Token: 34 756 WMIC.exe Token: 35 756 WMIC.exe Token: 36 756 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exepid Process 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.execmd.exedescription pid Process procid_target PID 2644 wrote to memory of 4308 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 98 PID 2644 wrote to memory of 4308 2644 0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe 98 PID 4308 wrote to memory of 756 4308 cmd.exe 97 PID 4308 wrote to memory of 756 4308 cmd.exe 97 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe"C:\Users\Admin\AppData\Local\Temp\0951fde8a8ea9cd45d2be14d63e6e55c8e87af0da45cf3776b495871652aa862.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{69951EE3-4645-4FC8-B3EB-404D87562F68}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:4308
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{69951EE3-4645-4FC8-B3EB-404D87562F68}'" delete1⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846B
MD51faf49045a09c14d8540fb0d9d595de4
SHA1bbf25516d2d69d397f1eabcc0c128b29f0627cc6
SHA25690a3c5e5ecd61cfc66f58049ddeb5b6c13c4b9eee78443778c5e57ee59fb2252
SHA512e38301a45bbf5c04542a52c677d7be4c66d2d44a284788a102139e05920ba4cb164e13dc77ada3fb326032223b554da3421334ba53abb87b85e2869e71dcef1e