Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe
Resource
win10v2004-20240221-en
General
-
Target
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe
-
Size
507KB
-
MD5
0ab47cd53a26a51152d973210faf75e6
-
SHA1
af3b11c1c9b28122514eb563be62842c0cee9dd8
-
SHA256
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1
-
SHA512
d692a9bb955bafbcda7f1f6021e6c43cd8a8a03a1136d3e213cda9cba7d97906ed799b114eb39f95fbb17b5721b83d38b65f30589370193f7a2636dfa4350d54
-
SSDEEP
12288:yRzQp4CmtvyFfdGSL33Q4FIb2fBGohp5h:ibPl3M33jfAon5
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
MerlinWebster@aol.com
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detects win.dharma. 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2600-16151-0x0000000000400000-0x0000000000419000-memory.dmp win_dharma_auto -
Identifies DHARMA ransomware 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2600-16151-0x0000000000400000-0x0000000000419000-memory.dmp Windows_Ransomware_Dharma_aa5eefed behavioral1/memory/2600-16151-0x0000000000400000-0x0000000000419000-memory.dmp Windows_Ransomware_Dharma_b31cac3f behavioral1/memory/2600-16151-0x0000000000400000-0x0000000000419000-memory.dmp Windows_Ransomware_Dharma_e9319e4a behavioral1/memory/2600-16151-0x0000000000400000-0x0000000000419000-memory.dmp Windows_Ransomware_Dharma_942142e3 -
Renames multiple (311) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 9 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Admin.lnk 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Admin.lnk 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Admin.lnk.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Admin.lnk.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe = "C:\\Windows\\System32\\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe" 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exedescription ioc process File opened for modification C:\Program Files\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Public\Music\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FA862KXF\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Music\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\F5ZW0CRZ\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\K03K2CA5\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P1KETFJO\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IF692Q5Y\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Public\Documents\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Public\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\P56GQFE8\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1MQ01HTG\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe -
Drops file in System32 directory 2 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exedescription ioc process File created C:\Windows\System32\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Windows\System32\Info.hta 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exedescription pid process target process PID 1280 set thread context of 2600 1280 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe -
Drops file in Program Files directory 64 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\MessageBoxIconImagesMask.bmp 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\MST.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Maceio.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RESEND.CFG 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libvdr_plugin.dll.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Ndjamena.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309705.JPG 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_notes-txt-background.png 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\JavaAccessBridge-64.dll 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\settings.js 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\MSOSEC.DLL 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\7-Zip\Lang\kk.txt.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf_3.4.0.v20140827-1444.jar.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\Wks9Pxy.cnv.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME52.CSS.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.IO.Log.Resources.dll 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.ServiceModel.Resources.dll 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Adjacency.thmx.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageAttachmentIconImages.jpg.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00118_.WMF 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04384_.WMF 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00965_.WMF 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jre7\bin\kcms.dll.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB_K_COL.HXK.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OrielReport.Dotx 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ta.pak.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_zh_CN.jar 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\de-DE\wordpad.exe.mui 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\gadget.xml 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Trek.thmx.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.IdentityModel.Resources.dll 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\Tulip.jpg 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\London.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00612_.WMF.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-options_ja.jar.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Baghdad.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE_COL.HXC.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_VelvetRose.gif.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SlateBlue.css.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14531_.GIF 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099184.WMF.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00768_.WMF.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287641.JPG.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196354.WMF.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\34.png 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabIpsps.dll 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Windows Sidebar\settings.ini 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector_1.0.200.v20131115-1210.jar 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00834_.WMF 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BS53BOXS.POC.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\BTOPENWORLD.COM.XML.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\init.js 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE01172_.WMF 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME22.CSS.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382960.JPG.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jre7\bin\tnameserv.exe.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\instrument.dll.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02055_.WMF.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01239_.GIF.id-DF960DD3.[MerlinWebster@aol.com].harma 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1536 vssadmin.exe 2584 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exepid process 1280 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2988 vssvc.exe Token: SeRestorePrivilege 2988 vssvc.exe Token: SeAuditPrivilege 2988 vssvc.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.execmd.execmd.exedescription pid process target process PID 1280 wrote to memory of 2600 1280 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe PID 1280 wrote to memory of 2600 1280 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe PID 1280 wrote to memory of 2600 1280 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe PID 1280 wrote to memory of 2600 1280 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe PID 1280 wrote to memory of 2600 1280 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe PID 2600 wrote to memory of 2572 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 2600 wrote to memory of 2572 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 2600 wrote to memory of 2572 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 2600 wrote to memory of 2572 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 2572 wrote to memory of 2468 2572 cmd.exe mode.com PID 2572 wrote to memory of 2468 2572 cmd.exe mode.com PID 2572 wrote to memory of 2468 2572 cmd.exe mode.com PID 2572 wrote to memory of 1536 2572 cmd.exe vssadmin.exe PID 2572 wrote to memory of 1536 2572 cmd.exe vssadmin.exe PID 2572 wrote to memory of 1536 2572 cmd.exe vssadmin.exe PID 2600 wrote to memory of 3000 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 2600 wrote to memory of 3000 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 2600 wrote to memory of 3000 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 2600 wrote to memory of 3000 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe cmd.exe PID 3000 wrote to memory of 3052 3000 cmd.exe mode.com PID 3000 wrote to memory of 3052 3000 cmd.exe mode.com PID 3000 wrote to memory of 3052 3000 cmd.exe mode.com PID 3000 wrote to memory of 2584 3000 cmd.exe vssadmin.exe PID 3000 wrote to memory of 2584 3000 cmd.exe vssadmin.exe PID 3000 wrote to memory of 2584 3000 cmd.exe vssadmin.exe PID 2600 wrote to memory of 1172 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe PID 2600 wrote to memory of 1172 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe PID 2600 wrote to memory of 1172 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe PID 2600 wrote to memory of 1172 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe PID 2600 wrote to memory of 2588 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe PID 2600 wrote to memory of 2588 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe PID 2600 wrote to memory of 2588 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe PID 2600 wrote to memory of 2588 2600 1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe"C:\Users\Admin\AppData\Local\Temp\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exeC:\Users\Admin\AppData\Local\Temp\1705aa5fa77ee0e563073c266fe570d324ba1adf6f9f26a8ed0e908773f046a1.exe2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12514⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12514⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"3⤵
- Modifies Internet Explorer settings
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"3⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-DF960DD3.[MerlinWebster@aol.com].harmaFilesize
554KB
MD561c4faa6e6cba69f5ba0700f11c923be
SHA1a5993c7191ed50d148f27f4bf105b21a68aa5a75
SHA25656bbdc2eee48b81c6755a9d957cb807e04626a769058af256f709b88383f0aa9
SHA5124e0401d412b4423876446647c7d58271ec2a88a5fa02f10437bfdad6ebfec4fb6d6db5510f4093ccdcac08710e88a90dfcb77ec09742a4b397bb52832ef5f550
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Admin.lnkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
13KB
MD558e02776e2c486dcf05fd8cd060fa7dd
SHA1e91e651b6fd0d2b42bfc93a0250a65df9018a0cc
SHA2566e770a84891fe593a6cddb28fe4c12390e078949219b2c59975d337dd47ac6cd
SHA512faa5ba9323987a24fc16a25cefcec84a61e1e38cacb39f331958a9fbb3828d9cc0945528afe2950436f8fdb4b54c458d89a12a0ccfd3c027f586ce2f11f23634
-
memory/1172-20201-0x000007FFFFF90000-0x000007FFFFFA0000-memory.dmpFilesize
64KB
-
memory/1280-0-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1280-2-0x0000000001E70000-0x0000000001E90000-memory.dmpFilesize
128KB
-
memory/1280-3-0x0000000001E70000-0x0000000001E90000-memory.dmpFilesize
128KB
-
memory/2600-16151-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB