Resubmissions
06-04-2024 15:09
240406-sjns5sdf36 1006-04-2024 15:08
240406-sh7vmach6y 1006-04-2024 15:08
240406-shzh9ach6v 1006-04-2024 15:07
240406-shpdaade97 1015-06-2022 13:16
220615-qh9ccabae7 10Analysis
-
max time kernel
1060s -
max time network
1060s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe
Resource
win7-20240215-en
General
-
Target
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe
-
Size
1.4MB
-
MD5
a71294ac29535734df8d7ea8e30bef3b
-
SHA1
4d24ee41c7d2aecfebd5500adc3dc308ebf8e029
-
SHA256
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552
-
SHA512
978cf084bf6ecaf1df46e54645c6a87a9b1ca48d641405a7cdf2a411f2619455c66875e8de0f4fcaaaa4f96f81c5d6261511198f03d61f73211dc8cebeb148bb
-
SSDEEP
24576:9JSlxEJLbyy1BEEmuOdScyLmYBSnMVJKg3WtDI7h0:9JSlR8OdSPL4n6Isq072
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1288-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-6-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-10-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-11-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-13-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-16-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-38-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-40-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-37-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-42-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-43-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-45-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-46-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-44-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-47-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-41-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-48-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-49-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-50-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-51-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-52-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-54-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-53-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-55-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-56-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-57-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-58-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-60-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-59-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-61-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-62-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-63-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-64-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-65-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-67-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-68-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-66-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-69-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-70-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-71-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-72-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-73-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-74-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-79-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-78-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-77-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-80-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-81-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-76-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-82-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-75-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-84-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-83-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-86-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-85-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-87-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-88-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-89-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-90-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1288-91-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exedescription ioc Process File opened (read-only) \??\F: 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\37ED3C7137ED3C71.bmp" 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe -
Drops file in Program Files directory 64 IoCs
Processes:
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exedescription ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winClassicTSFrame.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_SelectionSubpicture.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter_partly-cloudy.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\calendar.html 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-favorites.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\RevokeSuspend.crw 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_over.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\timeZones.js 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_ButtonGraphic.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_SelectionSubpicture.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-api.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Memo.emf 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\ShowUnprotect.jpeg 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\gadget.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceDaYi.txt 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-execution.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\send-email-16.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\README.TXT 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_top.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_notes.wmv 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\9.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\5.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\settings.html 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Mozilla Firefox\platform.ini 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_1.emf 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked-loading.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\gadget.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jvmti.h 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\weather.js 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\blank.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedZhengMa.txt 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-execution.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\settings.js 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\masterix.gif 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\highDpiImageSwap.js 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\info.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_docked.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_m.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\1047x576black.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeslm.dat 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_foggy.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_m.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\settings.html 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsNotesBackground.wmv 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rssBackBlue_docked.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back.png 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-snaptracer.xml 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid Process 2088 vssadmin.exe 1836 vssadmin.exe 2072 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exepid Process 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid Process Token: SeBackupPrivilege 1052 vssvc.exe Token: SeRestorePrivilege 1052 vssvc.exe Token: SeAuditPrivilege 1052 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exepid Process 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exedescription pid Process procid_target PID 1288 wrote to memory of 2088 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 30 PID 1288 wrote to memory of 2088 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 30 PID 1288 wrote to memory of 2088 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 30 PID 1288 wrote to memory of 2088 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 30 PID 1288 wrote to memory of 1836 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 34 PID 1288 wrote to memory of 1836 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 34 PID 1288 wrote to memory of 1836 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 34 PID 1288 wrote to memory of 1836 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 34 PID 1288 wrote to memory of 2072 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 36 PID 1288 wrote to memory of 2072 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 36 PID 1288 wrote to memory of 2072 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 36 PID 1288 wrote to memory of 2072 1288 29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe"C:\Users\Admin\AppData\Local\Temp\29c3039267fdb2758c8325b26069d94b3edd79c1c4c828bda0450b965422f552.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:2088
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1836
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:2072
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5a0434d511da0d36edf344f86a93f18e9
SHA132ad79da98cc0d213de32c84fc2e1cf39af62aaf
SHA2569e50ea910f4968a3618c43e2dfeb0fe78fd2ef9f6da66c0bee22930f1893d8f5
SHA512f61f0f0b731b02be21ce865cec93d4f8802f40a9cb4519dd6fa2c45677a03e0642cb679a98dccf98d03ec19377d2defae159c4bdbe73c5b99ed4ae78ca5cfffb