Resubmissions
07-04-2024 06:20
240407-g37jtaeh8z 1007-04-2024 06:20
240407-g3294aeh8w 1007-04-2024 06:20
240407-g3wsbafd64 1007-04-2024 06:19
240407-g3pzrseh7w 1025-07-2022 19:25
220725-x41ewsbfh9 10Analysis
-
max time kernel
1160s -
max time network
1165s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
Resource
win7-20240221-en
General
-
Target
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
-
Size
1.3MB
-
MD5
029121f4c1fc507eee2da7ef0f81c52f
-
SHA1
5bdfc541991da167e6fb256a64e05e05f92fc5db
-
SHA256
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1
-
SHA512
94e38cc00fcbc431da0300eba6683f251e0b4c4ca71cc88d941acf998207d3df14b59322d9d59d5522649c80f26689fa1a44ad59371eeafcd4107c9dd42d3e2f
-
SSDEEP
24576:GP2e+mt0BUefY1OOz6KgoHPLVGdbiCu4SMZ4QU:89EfG3s28vuWg
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1244-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-8-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-11-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-13-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-16-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-37-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-38-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-42-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-44-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-45-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-46-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-47-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-48-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-49-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-50-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-51-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-52-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-53-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-54-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-55-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-56-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-58-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-57-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-62-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-63-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-64-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-65-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-68-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-69-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-70-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-67-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-66-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-72-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-75-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-76-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-74-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-77-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-78-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-73-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-71-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-79-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-81-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-82-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-80-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-84-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-85-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-87-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-86-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-83-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-88-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-89-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-90-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-91-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-92-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-93-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-96-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-95-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-94-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-97-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1244-98-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\891DCEBC891DCEBC.bmp" 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl-hot.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Other-48.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_blu.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\classfile_constants.h 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\settings.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_few-showers.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-3.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.bmp 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwruklm.dat 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-gibbous_partly-cloudy.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_ring_docked.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application-views.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-windows.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_disabled.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-charts.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rarrow.gif 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotsdarkoverlay.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter_partly-cloudy.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-new_partly-cloudy.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\settings.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\currency.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_dot.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\ui.js 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\settings.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\navBack.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\daisies.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\settings.js 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\settings.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_bottom.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\drag.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\slideshow_glass_frame.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\cpu.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\32.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\clock.js 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\45.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\skin.dtd 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref_PAL.wmv 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\blackbars80.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\cpu.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonInset_Alpha2.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\localizedSettings.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\picturePuzzle.js 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\icon.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\MediaReceiverRegistrar.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Mozilla Firefox\update-settings.ini 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\2.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\currency.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1960 vssadmin.exe 1388 vssadmin.exe 2708 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2856 vssvc.exe Token: SeRestorePrivilege 2856 vssvc.exe Token: SeAuditPrivilege 2856 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2708 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1244 wrote to memory of 2708 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1244 wrote to memory of 2708 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1244 wrote to memory of 2708 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1244 wrote to memory of 1960 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1244 wrote to memory of 1960 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1244 wrote to memory of 1960 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1244 wrote to memory of 1960 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1244 wrote to memory of 1388 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 PID 1244 wrote to memory of 1388 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 PID 1244 wrote to memory of 1388 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 PID 1244 wrote to memory of 1388 1244 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe"C:\Users\Admin\AppData\Local\Temp\5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:2708
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1960
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1388
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5f811d3e60220828b0f34001d2c2483f1
SHA122ac6346a5a0e5c60bd8151248b31febbe0af900
SHA256e511b512fabe98eef405ad8301edd703aed719f70078e62d9d31ceecd476c074
SHA5125e156678992a8803899a2947e70e4d89b6d7482735e749895c1cccac2ffc470696810fadef9fff34d52e6051164eba00875991968723bc7ad372ce6c89cb770f