Resubmissions
06-04-2024 15:14
240406-smhrasdf93 1006-04-2024 15:14
240406-smb9hsda31 1006-04-2024 15:13
240406-sl7n2ada3y 1006-04-2024 15:13
240406-sl1wgsdf85 1028-09-2021 10:15
210928-magetabef7 10Analysis
-
max time kernel
846s -
max time network
836s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe
Resource
win7-20240221-en
General
-
Target
32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe
-
Size
1.1MB
-
MD5
168557f53a1ffa882cabb043578b2216
-
SHA1
3ad007c50fb13801f252233862dc6d8e1ecfcc5c
-
SHA256
32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc
-
SHA512
50f3c9b987ba5e8502b263018d88bd00b9f46a07b624b8bcd5cb626945a2000d316fe67f66876e835ed912f07309aec03c24383c5ba605c349b008d402cfb0bc
-
SSDEEP
24576:0HtrdKYVVSrqGDohJ3STZG8vIn/sCBGnWsY03+8:0HtV7GwBSTc8An/4YJ8
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1728-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-6-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-9-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-11-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-13-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-16-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-38-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-37-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-39-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-42-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-44-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-45-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-46-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-47-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-48-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-49-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-50-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-51-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-52-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-53-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-54-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-55-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-56-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-57-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-58-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-62-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-63-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-64-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-65-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-66-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-67-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-68-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-69-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-71-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-70-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-72-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-73-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-74-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-75-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-76-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-77-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-78-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-79-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-80-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-81-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-82-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-84-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-85-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-83-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-86-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-87-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-88-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-89-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-90-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-91-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-92-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-93-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-94-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-95-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1728-96-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\320797F5320797F5.bmp" 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\slideShow.css 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-masterfs-nio2.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_bottom.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winClassicTSFrame.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\weather.html 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_right.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\VideoLAN\VLC\README.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\readme.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\8.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_hover.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\gadget.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-common.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-templates.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_ring_docked.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-spi-quicksearch.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_ButtonGraphic.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_windy.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_down.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\3.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\calendar.css 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_photo_Thumbnail.bmp 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\36.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\logo.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Star_Half.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\PreviousMenuButtonIcon.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-io-ui.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\RSSFeeds.html 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrusalm.dat 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\9.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_settings.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\RSSFeeds.js 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_PreComp_MATTE_PAL.wmv 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\VideoLAN\VLC\THANKS.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-coredump.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\feature.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_notes.wmv 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\720x480blacksquare.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\203x8subpicture.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-3.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_pressed.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\contbig.gif 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\WhiteDot.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\settings.css 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\FrameworkList.xml 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2836 vssadmin.exe 1568 vssadmin.exe 1220 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1176 vssvc.exe Token: SeRestorePrivilege 1176 vssvc.exe Token: SeAuditPrivilege 1176 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1568 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 30 PID 1728 wrote to memory of 1568 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 30 PID 1728 wrote to memory of 1568 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 30 PID 1728 wrote to memory of 1568 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 30 PID 1728 wrote to memory of 1220 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 34 PID 1728 wrote to memory of 1220 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 34 PID 1728 wrote to memory of 1220 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 34 PID 1728 wrote to memory of 1220 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 34 PID 1728 wrote to memory of 2836 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 PID 1728 wrote to memory of 2836 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 PID 1728 wrote to memory of 2836 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 PID 1728 wrote to memory of 2836 1728 32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe"C:\Users\Admin\AppData\Local\Temp\32c3fc22cab918195b3590ae17a424b5f79c145f6ee8c7d4aff376ce070248fc.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1568
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1220
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:2836
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5dcac32dcbd89efefa872881ad8c68df8
SHA1bc15179546c53d382ba14540871e90cdffb03f9c
SHA2569de61cb1ac64b6a03d00dae446330f1ea013a7045ba2050e68812bdaf0e3a802
SHA512cf19ff0336dbc04280da471ec212564402792522b2b18a68c599654c0f8aa1ac156fe17664dcd3d7430cc1ee49c8905b1974e3a61cdc74cf1c1f8a896cf4600c