Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
GGH.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GGH.exe
Resource
win10v2004-20231215-en
General
-
Target
GGH.exe
-
Size
92KB
-
MD5
187085f60a15d78358d268cf183367e6
-
SHA1
1e13b0fc5b939e8083963abffda959c33475d161
-
SHA256
d223d35d360566205c14a9175d5856a63adaf7464c728526b22baee6e9388018
-
SHA512
52d003c0c257646ae15341f740a4bb5aea2445f796957b8fd7abaa19b0ca612bf2f2fcdf34adc99bfb820e2d6569a0dbb7f7bf0842b6fc6ea534e72c0d816ed9
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AOHYncfbfTLY+7L+v7/Nthwydlfssi:Qw+asqN5aW/hL+YnGbLY+GzPqyd5
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 5 IoCs
Processes:
GGH.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GGH.exe GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini GGH.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta GGH.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
GGH.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GGH.exe = "C:\\Windows\\System32\\GGH.exe" GGH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" GGH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" GGH.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
GGH.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Videos\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini GGH.exe File opened for modification C:\Users\Public\desktop.ini GGH.exe File opened for modification C:\Program Files (x86)\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini GGH.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini GGH.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini GGH.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini GGH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini GGH.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini GGH.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\FW0P2MZH\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini GGH.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini GGH.exe File opened for modification C:\Users\Public\Music\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMDLW4SJ\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\27PKR52P\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4XCMPANZ\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Links\desktop.ini GGH.exe File opened for modification C:\Users\Public\Desktop\desktop.ini GGH.exe File opened for modification C:\Program Files\desktop.ini GGH.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini GGH.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini GGH.exe File opened for modification C:\Users\Public\Downloads\desktop.ini GGH.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\0U93YK0N\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini GGH.exe File opened for modification C:\Users\Public\Libraries\desktop.ini GGH.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini GGH.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2GIU3NG8\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\Documents\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini GGH.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\BP3UABCB\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini GGH.exe -
Drops file in System32 directory 2 IoCs
Processes:
GGH.exedescription ioc process File created C:\Windows\System32\GGH.exe GGH.exe File created C:\Windows\System32\Info.hta GGH.exe -
Drops file in Program Files directory 64 IoCs
Processes:
GGH.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\SY______.PFM GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00403_.WMF GGH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.ui.ja_5.5.0.165303.jar.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1CORE.DLL.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21413_.GIF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME55.CSS.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\config.ini GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153095.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00217_.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\BLENDS.INF GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECURL.ICO GGH.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt GGH.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08808_.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\vlc.mo.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00482_.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0211949.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR3F.GIF.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\hprof-16.png.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099204.WMF GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0233018.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\SketchIconImages.bmp.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\settings.html GGH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.sat4j.pb_2.3.5.v201404071733.jar.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libuleaddvaudio_plugin.dll.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0234131.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\OPTINPS.DLL.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\BUTTON.GIF.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00252_.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02280_.WMF GGH.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\shvlzm.exe.mui.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187859.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\BLUECALM.ELM GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPIRM.XML GGH.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE.HXS.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Oriel.xml.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01356_.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\vlc.mo.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\vlc.mo.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18236_.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL108.XML.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_zh_CN.jar.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\libyuv_plugin.dll.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Waveform.eftx.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SAEXT.DLL GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00468_.WMF GGH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Common Files\System\en-US\wab32res.dll.mui GGH.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\httprequests.luac.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOLoader.dll.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower.png GGH.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\vlc.mo GGH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.xml.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01361_.WMF GGH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\MSB1ESEN.ITS.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00186_.WMF.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02296_.WMF GGH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsPreviewTemplate.html GGH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-uihandler.xml.id-D9F786B8.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FORM.ICO.id-D9F786B8.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\sbdrop.dll.mui GGH.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\cloud_Thumbnail.bmp GGH.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_cloudy.png GGH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2580 vssadmin.exe 3960 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GGH.exepid process 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe 948 GGH.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2680 vssvc.exe Token: SeRestorePrivilege 2680 vssvc.exe Token: SeAuditPrivilege 2680 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
mshta.exepid process 3284 mshta.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
GGH.execmd.execmd.exedescription pid process target process PID 948 wrote to memory of 1900 948 GGH.exe cmd.exe PID 948 wrote to memory of 1900 948 GGH.exe cmd.exe PID 948 wrote to memory of 1900 948 GGH.exe cmd.exe PID 948 wrote to memory of 1900 948 GGH.exe cmd.exe PID 1900 wrote to memory of 2600 1900 cmd.exe mode.com PID 1900 wrote to memory of 2600 1900 cmd.exe mode.com PID 1900 wrote to memory of 2600 1900 cmd.exe mode.com PID 1900 wrote to memory of 2580 1900 cmd.exe vssadmin.exe PID 1900 wrote to memory of 2580 1900 cmd.exe vssadmin.exe PID 1900 wrote to memory of 2580 1900 cmd.exe vssadmin.exe PID 948 wrote to memory of 2412 948 GGH.exe cmd.exe PID 948 wrote to memory of 2412 948 GGH.exe cmd.exe PID 948 wrote to memory of 2412 948 GGH.exe cmd.exe PID 948 wrote to memory of 2412 948 GGH.exe cmd.exe PID 2412 wrote to memory of 3628 2412 cmd.exe mode.com PID 2412 wrote to memory of 3628 2412 cmd.exe mode.com PID 2412 wrote to memory of 3628 2412 cmd.exe mode.com PID 2412 wrote to memory of 3960 2412 cmd.exe vssadmin.exe PID 2412 wrote to memory of 3960 2412 cmd.exe vssadmin.exe PID 2412 wrote to memory of 3960 2412 cmd.exe vssadmin.exe PID 948 wrote to memory of 3284 948 GGH.exe mshta.exe PID 948 wrote to memory of 3284 948 GGH.exe mshta.exe PID 948 wrote to memory of 3284 948 GGH.exe mshta.exe PID 948 wrote to memory of 3284 948 GGH.exe mshta.exe PID 948 wrote to memory of 1784 948 GGH.exe mshta.exe PID 948 wrote to memory of 1784 948 GGH.exe mshta.exe PID 948 wrote to memory of 1784 948 GGH.exe mshta.exe PID 948 wrote to memory of 1784 948 GGH.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\GGH.exe"C:\Users\Admin\AppData\Local\Temp\GGH.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2600
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2580 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:3628
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3960 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:3284 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:1784
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-D9F786B8.[[email protected]].z1n
Filesize3.1MB
MD54fc00be4c86cbe6c40f2c9b182812e05
SHA13571e423a0653342c1ca9722fc04c8b6fb872e70
SHA2562096ad770f0b287675e493918a81638975c129d228d53e6fcc48b5262c12dd76
SHA512cb7a5c9ae11cf2a1382f53061c6b0a3b8375cae5b0407c5dae05ba1e5a4db1e5b0e67e16d1795292d622e0e96976c98c55d87d88b219e7fa19fd5b4fa039ee30
-
Filesize
3KB
MD5a0c58ab8cf75e6d261dd720aa06c9fd1
SHA142c1cdd4c8d9f63ba0c3c8ea45bf7b16e5259aea
SHA256f9a55130563dcc2d60d4645db06884f630927b5e79c8d88b0d4a7006d19c064b
SHA512c874deb1bfde84a3c5b7d078b9a9fcee8775ab46350529309c65da418ce65a8b22385462339f722e7c45bb9e020cc928feca320155bf812362a9e6437f688ac3