Overview
overview
10Static
static
3samples4.zip
windows7-x64
1samples4.zip
windows10-2004-x64
10e60d49a96...01.exe
windows7-x64
0e60d49a96...01.exe
windows10-2004-x64
1ce5dd21fb...1e.exe
windows7-x64
101ce5dd21fb...1e.exe
windows10-2004-x64
103c73425d02...e6.exe
windows7-x64
63c73425d02...e6.exe
windows10-2004-x64
65df6314b5c...5b.exe
windows7-x64
105df6314b5c...5b.exe
windows10-2004-x64
105ee5166c02...93.exe
windows7-x64
105ee5166c02...93.exe
windows10-2004-x64
105f7cdd8c28...02.exe
windows7-x64
75f7cdd8c28...02.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
samples4.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
samples4.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win10v2004-20231215-en
General
-
Target
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
-
Size
4.5MB
-
MD5
407ba61bab1c10cabf0b5a7c40d43041
-
SHA1
82d180dc50763c6a71f8449ef44e467afbc09e74
-
SHA256
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3
-
SHA512
73bd51f5885587ec5c930d4ab0cd543b9b0479304c4a3c03d73abdd7b064a2ec4e8b01af45f7517072ce12daa2cfb679589603060438bfafa331a0b66b926f4a
-
SSDEEP
98304:BD9WybBsIt6XW7JD9ENTPZsz3yilw5OLEvvybN/aBDPsfut6e:BxWaBhP719CCzC2EO4vvyb5a1mu0e
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Renames multiple (314) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5df6314b5c6f6bd151a5fda104d32655c5b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5df6314b5c6f6bd151a5fda104d32655c5b.exe 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Wine 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5df6314b5c6f6bd151a5fda104d32655c5b.exe = "C:\\Windows\\System32\\5df6314b5c6f6bd151a5fda104d32655c5b.exe" 5df6314b5c6f6bd151a5fda104d32655c5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 5df6314b5c6f6bd151a5fda104d32655c5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\2WD6IYSB\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TQO7542V\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OZ66ZEGB\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Music\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\MAOUTFV0\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Music\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3601492379-692465709-652514833-1000\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Videos\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\52FOIFWV\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Links\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\5df6314b5c6f6bd151a5fda104d32655c5b.exe 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Windows\System32\Info.hta 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106208.WMF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Auto.jpg 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\slideshow_glass_frame.png 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kuala_Lumpur.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0183328.WMF 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\WMPDMC.exe.mui 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\fr-FR\FreeCell.exe.mui 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14883_.GIF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\libarchive_plugin.dll.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-first-quarter.png 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185774.WMF 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.win32.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14866_.GIF 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL086.XML.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\RM.DLL.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\11.png 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Mozilla Firefox\application.ini 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00306_.WMF 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director_2.3.100.v20140224-1921.jar 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libtransform_plugin.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Maroon.css.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\PST8PDT.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01292_.GIF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\EXITEMS.ICO 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\gadget.xml 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\MCABOUT.HTM 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\jmxremote.access.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297269.WMF 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02263_.WMF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR8F.GIF 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\RenameSkip.pcx.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Marquesas.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\rtf_choosefont.gif 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-bullet.png 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-snaptracer.xml.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107456.WMF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR51B.GIF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_COL.HXC.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0213243.WMF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02106_.GIF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\soundcloud.luac 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\background.gif.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR32B.GIF.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSClientManifest.man 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_plain_Thumbnail.bmp 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Bucharest.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_zh_4.4.0.v20140623020002.jar 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341653.JPG 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libbluescreen_plugin.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECURE.CFG 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN054.XML 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_over.png 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145373.JPG 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_zh_4.4.0.v20140623020002.jar 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Petersburg 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-3 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099155.JPG.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21535_.GIF 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1254.TXT.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libadpcm_plugin.dll 5df6314b5c6f6bd151a5fda104d32655c5b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\WHITEBOX.JPG 5df6314b5c6f6bd151a5fda104d32655c5b.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS.HXS.id-CE303D24.[[email protected]].bip 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2796 vssadmin.exe 2680 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2600 vssvc.exe Token: SeRestorePrivilege 2600 vssvc.exe Token: SeAuditPrivilege 2600 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2480 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 33 PID 1792 wrote to memory of 2480 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 33 PID 1792 wrote to memory of 2480 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 33 PID 1792 wrote to memory of 2480 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 33 PID 2480 wrote to memory of 1812 2480 cmd.exe 28 PID 2480 wrote to memory of 1812 2480 cmd.exe 28 PID 2480 wrote to memory of 1812 2480 cmd.exe 28 PID 2480 wrote to memory of 2796 2480 cmd.exe 31 PID 2480 wrote to memory of 2796 2480 cmd.exe 31 PID 2480 wrote to memory of 2796 2480 cmd.exe 31 PID 1792 wrote to memory of 1652 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 38 PID 1792 wrote to memory of 1652 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 38 PID 1792 wrote to memory of 1652 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 38 PID 1792 wrote to memory of 1652 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 38 PID 1652 wrote to memory of 3888 1652 cmd.exe 35 PID 1652 wrote to memory of 3888 1652 cmd.exe 35 PID 1652 wrote to memory of 3888 1652 cmd.exe 35 PID 1652 wrote to memory of 2680 1652 cmd.exe 36 PID 1652 wrote to memory of 2680 1652 cmd.exe 36 PID 1652 wrote to memory of 2680 1652 cmd.exe 36 PID 1792 wrote to memory of 3256 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 39 PID 1792 wrote to memory of 3256 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 39 PID 1792 wrote to memory of 3256 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 39 PID 1792 wrote to memory of 3256 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 39 PID 1792 wrote to memory of 3372 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 40 PID 1792 wrote to memory of 3372 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 40 PID 1792 wrote to memory of 3372 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 40 PID 1792 wrote to memory of 3372 1792 5df6314b5c6f6bd151a5fda104d32655c5b.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3\5df6314b5c6f6bd151a5fda104d32655c5b.exe"C:\Users\Admin\AppData\Local\Temp\5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3\5df6314b5c6f6bd151a5fda104d32655c5b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2480
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1652
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:3256
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:3372
-
-
C:\Windows\system32\mode.commode con cp select=12511⤵PID:1812
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet1⤵
- Interacts with shadow copies
PID:2796
-
C:\Windows\system32\mode.commode con cp select=12511⤵PID:3888
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet1⤵
- Interacts with shadow copies
PID:2680
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-CE303D24.[[email protected]].bip
Filesize2.0MB
MD5035787671e2bb43ea8b4e442717a829c
SHA14bc73e2d2f2eac14a29ce2f9623c5e29cadb40b2
SHA256e187e1448ba2d84150dfbde0d9a474814b6fbb5f29562c49aea2501293cff3b4
SHA512df5baee054747cafeec9a01ae51abcf3c7af2a78f73e2903deff05062dd7a26e04a4e8b0ff04473c77e0c944c3dc2128b610c13bbc70184e918e4105e1d56162
-
Filesize
13KB
MD538864ff9c022b74cbd17765b791a967a
SHA1ab54266251358643d4a99937e50f9dee8555a67f
SHA256ac4b10173ce3d701b7f17f9171f2322a9b6d2915edd5ee00130042961ebc5c5a
SHA512dba43b08b9db1267dc033635290edb0e970403f546198d8a22b75cfb6d7c6bd9ab8facd1f852a17922867b723e5c8c9a28827b2405a416a31f1039668579bede