Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
GGH.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GGH.exe
Resource
win10v2004-20231215-en
General
-
Target
GGH.exe
-
Size
92KB
-
MD5
187085f60a15d78358d268cf183367e6
-
SHA1
1e13b0fc5b939e8083963abffda959c33475d161
-
SHA256
d223d35d360566205c14a9175d5856a63adaf7464c728526b22baee6e9388018
-
SHA512
52d003c0c257646ae15341f740a4bb5aea2445f796957b8fd7abaa19b0ca612bf2f2fcdf34adc99bfb820e2d6569a0dbb7f7bf0842b6fc6ea534e72c0d816ed9
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AOHYncfbfTLY+7L+v7/Nthwydlfssi:Qw+asqN5aW/hL+YnGbLY+GzPqyd5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (495) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GGH.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation GGH.exe -
Drops startup file 5 IoCs
Processes:
GGH.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GGH.exe GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini GGH.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-0CAED21F.[[email protected]].z1n GGH.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta GGH.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
GGH.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GGH.exe = "C:\\Windows\\System32\\GGH.exe" GGH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" GGH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" GGH.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
GGH.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini GGH.exe File opened for modification C:\Users\Public\Music\desktop.ini GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini GGH.exe File opened for modification C:\Users\Public\Libraries\desktop.ini GGH.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-768304381-2824894965-3840216961-1000\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Links\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Music\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini GGH.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini GGH.exe File opened for modification C:\Users\Public\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Videos\desktop.ini GGH.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Documents\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini GGH.exe File opened for modification C:\Program Files\desktop.ini GGH.exe File opened for modification C:\Program Files (x86)\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini GGH.exe File opened for modification C:\Users\Public\Pictures\desktop.ini GGH.exe File opened for modification C:\Users\Public\Videos\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Searches\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini GGH.exe File opened for modification C:\Users\Public\Documents\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini GGH.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini GGH.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-768304381-2824894965-3840216961-1000\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini GGH.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini GGH.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini GGH.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini GGH.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini GGH.exe File opened for modification C:\Users\Public\Downloads\desktop.ini GGH.exe -
Drops file in System32 directory 2 IoCs
Processes:
GGH.exedescription ioc process File created C:\Windows\System32\GGH.exe GGH.exe File created C:\Windows\System32\Info.hta GGH.exe -
Drops file in Program Files directory 64 IoCs
Processes:
GGH.exedescription ioc process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\ui-strings.js.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icucnv58.dll GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sqlpdw.xsl.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STRTEDGE\PREVIEW.GIF GGH.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-140.png.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Microsoft.Xbox.NetworkTroubleshooter.dll GGH.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\STSLIST.CHM.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-white\MedTile.scale-200.png GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\LargeTile.scale-200.png GGH.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\thaidict.md.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSmallTile.scale-150.png GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-40_altform-colorize.png GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSmallTile.contrast-black_scale-100.png GGH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_organize_18.svg.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ru-ru\ui-strings.js GGH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\S_ThumbDownOutline_22_N1.svg.id-0CAED21F.[[email protected]].z1n GGH.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-white_scale-80.png.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupMedTile.scale-100.png GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\82.jpg GGH.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailBadge.scale-150.png GGH.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-core-file-l2-1-0.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BOOKOSBI.TTF.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_proxy\internal.identity_helper.exe.manifest.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fi-fi.dll GGH.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Collections.Concurrent.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ppd.xrm-ms.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_GB\excluded.txt.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7en.dll GGH.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\System.Drawing.Common.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\Wide310x150Logo.scale-400.png GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-16_altform-unplated_contrast-black.png GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-80_altform-lightunplated.png GGH.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\install.ins.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\ARROW.WAV GGH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\virgo_mycomputer_folder_icon.svg.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ppd.xrm-ms GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Trial-pl.xrm-ms.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\mfc140u.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\ImmersiveControl_Slider_Click_Sound.wma GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-60_altform-fullcolor.png GGH.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-environment-l1-1-0.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\root\ui-strings.js.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\libffi.md.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\powerview.x-none.msi.16.x-none.tree.dat.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\IRIS.ELM.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\THEMES.INF GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\MSOIDRES.DLL GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\en\DatabaseCompare_col.hxc GGH.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-memory-l1-1-0.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ja-jp\AppStore_icon.svg.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\MemMDL2.1.85.ttf GGH.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\ne.pak.DATA.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\mscorrc.dll GGH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\ui-strings.js GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-256_altform-lightunplated.png GGH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\sendforsignature.svg GGH.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.Threading.Thread.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\System.Resources.Extensions.dll.id-0CAED21F.[[email protected]].z1n GGH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Xml.Linq.dll GGH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-stdio-l1-1-0.dll GGH.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationClientsideProviders.resources.dll GGH.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Microsoft.Data.DataFeedClient.dll.id-0CAED21F.[[email protected]].z1n GGH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 3668 vssadmin.exe 9020 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GGH.exepid process 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe 4600 GGH.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 8136 vssvc.exe Token: SeRestorePrivilege 8136 vssvc.exe Token: SeAuditPrivilege 8136 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
GGH.execmd.execmd.exedescription pid process target process PID 4600 wrote to memory of 4580 4600 GGH.exe cmd.exe PID 4600 wrote to memory of 4580 4600 GGH.exe cmd.exe PID 4580 wrote to memory of 7508 4580 cmd.exe mode.com PID 4580 wrote to memory of 7508 4580 cmd.exe mode.com PID 4580 wrote to memory of 3668 4580 cmd.exe vssadmin.exe PID 4580 wrote to memory of 3668 4580 cmd.exe vssadmin.exe PID 4600 wrote to memory of 10024 4600 GGH.exe cmd.exe PID 4600 wrote to memory of 10024 4600 GGH.exe cmd.exe PID 10024 wrote to memory of 8844 10024 cmd.exe mode.com PID 10024 wrote to memory of 8844 10024 cmd.exe mode.com PID 10024 wrote to memory of 9020 10024 cmd.exe vssadmin.exe PID 10024 wrote to memory of 9020 10024 cmd.exe vssadmin.exe PID 4600 wrote to memory of 5204 4600 GGH.exe mshta.exe PID 4600 wrote to memory of 5204 4600 GGH.exe mshta.exe PID 4600 wrote to memory of 5844 4600 GGH.exe mshta.exe PID 4600 wrote to memory of 5844 4600 GGH.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\GGH.exe"C:\Users\Admin\AppData\Local\Temp\GGH.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:7508
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3668 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:10024 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:8844
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:9020 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:5204
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:5844
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:8136
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:8508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-0CAED21F.[[email protected]].z1n
Filesize2.9MB
MD5d26bea2327444c61bd74355a3f324b4d
SHA1e38551c0cf392a059b2a513d77edbd826936cf4e
SHA256feab3afc4b6188d8df957d08ff708b99d24bdb050485caa59a54638ae14a9812
SHA512af4e0c7eee371ef8162d2f39b24879553fec544c2961182fdc9729490d106e25d4c6f9450f06f449616284c55227a58a30bc947a792834157a9adf5b8c5fe7d8
-
Filesize
3KB
MD5203698c19a2503db8d4de2474c40f1b2
SHA12cd27ce3ee6a86e904f768e3dbb0f82eeebca54a
SHA25643d1b6a569b39b5513f16e0599e2823c058d83cdbcc9cd09b3fb6265e20a3bfb
SHA5126f22a27166e2850342ec54202acd286998d73d2b149908713d4027c56796c0ac72dbad590cd74833ade7a3692b1b8d5e3e4ac23d181e4c32606326f79088ffbd