Overview
overview
10Static
static
3samples4.zip
windows7-x64
1samples4.zip
windows10-2004-x64
10e60d49a96...01.exe
windows7-x64
0e60d49a96...01.exe
windows10-2004-x64
1ce5dd21fb...1e.exe
windows7-x64
101ce5dd21fb...1e.exe
windows10-2004-x64
103c73425d02...e6.exe
windows7-x64
63c73425d02...e6.exe
windows10-2004-x64
65df6314b5c...5b.exe
windows7-x64
105df6314b5c...5b.exe
windows10-2004-x64
105ee5166c02...93.exe
windows7-x64
105ee5166c02...93.exe
windows10-2004-x64
105f7cdd8c28...02.exe
windows7-x64
75f7cdd8c28...02.exe
windows10-2004-x64
7Analysis
-
max time kernel
7s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
samples4.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
samples4.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win10v2004-20231215-en
General
-
Target
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
-
Size
4.5MB
-
MD5
407ba61bab1c10cabf0b5a7c40d43041
-
SHA1
82d180dc50763c6a71f8449ef44e467afbc09e74
-
SHA256
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3
-
SHA512
73bd51f5885587ec5c930d4ab0cd543b9b0479304c4a3c03d73abdd7b064a2ec4e8b01af45f7517072ce12daa2cfb679589603060438bfafa331a0b66b926f4a
-
SSDEEP
98304:BD9WybBsIt6XW7JD9ENTPZsz3yilw5OLEvvybN/aBDPsfut6e:BxWaBhP719CCzC2EO4vvyb5a1mu0e
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5df6314b5c6f6bd151a5fda104d32655c5b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5df6314b5c6f6bd151a5fda104d32655c5b.exe 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Wine 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5df6314b5c6f6bd151a5fda104d32655c5b.exe = "C:\\Windows\\System32\\5df6314b5c6f6bd151a5fda104d32655c5b.exe" 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3803511929-1339359695-2191195476-1000\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3803511929-1339359695-2191195476-1000\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\5df6314b5c6f6bd151a5fda104d32655c5b.exe 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\netstandard.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.IO.FileSystem.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Net.NetworkInformation.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\libxml2.md.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\relaxngdatatype.md.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_MoveNoDrop32x32.gif.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\SubsystemController.man 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Linq.Expressions.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.shared.Office.x-none.msi.16.x-none.xml.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Threading.Tasks.Parallel.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer2019_eula.txt.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogo.png 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\vcruntime140.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\System\ado\msadomd28.tlb 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\api-ms-win-core-fibers-l1-1-0.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\api-ms-win-core-util-l1-1-0.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Diagnostics.TextWriterTraceListener.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Runtime.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\LICENSE.txt.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\icu_web.md 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\dbgshim.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Globalization.Extensions.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sql2000.xsl.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-multibyte-l1-1-0.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hr-hr.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jni.h 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOLoader.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\api-ms-win-crt-filesystem-l1-1-0.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\Microsoft.VisualBasic.Core.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\Microsoft.Win32.Primitives.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.tr-tr.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\manifest.json 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\mesa3d.md.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\Microsoft.Win32.Registry.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red.xml 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.office32mui.msi.16.en-us.xml.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcor.dll.mui 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcer.dll.mui 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\api-ms-win-crt-conio-l1-1-0.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\Microsoft.CSharp.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\7-Zip\Lang\ne.txt.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Data.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Diagnostics.TraceSource.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.IO.Pipes.AccessControl.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\hive.xsl.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\public_suffix.md.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Violet II.xml 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.IO.Compression.FileSystem.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\CHICAGO.XSL.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\api-ms-win-core-localization-l1-2-0.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Reflection.TypeExtensions.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PSRCHLTS.DAT.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Threading.ThreadPool.dll.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt.id-9754C293.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5836 vssadmin.exe 1432 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3156 wrote to memory of 1752 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 91 PID 3156 wrote to memory of 1752 3156 5df6314b5c6f6bd151a5fda104d32655c5b.exe 91 PID 1752 wrote to memory of 1060 1752 cmd.exe 92 PID 1752 wrote to memory of 1060 1752 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3\5df6314b5c6f6bd151a5fda104d32655c5b.exe"C:\Users\Admin\AppData\Local\Temp\5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3\5df6314b5c6f6bd151a5fda104d32655c5b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1060
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5836
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:6628
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:6660
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:6096
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6104
-
C:\Windows\system32\mode.commode con cp select=12511⤵PID:5624
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1432
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-9754C293.[[email protected]].bip
Filesize1.4MB
MD5e946756aa0c3512ec9ed4674abac2df4
SHA17b2a252f444241adf7969849076bc923835940b1
SHA2562a626fd6307c2294c019c677c577a797d16118f58505258c5c84db9a04353dd5
SHA5121cfebf8ecc444409860035ffab878333f6883479c8acc0068dbe6368805b0889857ad466cbf19102806165c0942ef9efaaa2ef84ab538685fc27cb049fd0b325
-
Filesize
13KB
MD53ea272f7d7ed3f33c7df670c7af9b6ec
SHA18d70e9f53305d0dede46b783a5d4147875d5d10f
SHA25609f1ffe1bc924e1ed2881324a2e7fd822c25fcea88faadd34ecf8e825f158008
SHA512b512ea135069ad381ecacbde3b04d34f0a0a7d884711ac3919cc765b05b620f372acfecef4f6637e04dc77d6c934c4706616b5cb513bc932e2c6af577e9843e2