Resubmissions
07-04-2024 06:20
240407-g37jtaeh8z 1007-04-2024 06:20
240407-g3294aeh8w 1007-04-2024 06:20
240407-g3wsbafd64 1007-04-2024 06:19
240407-g3pzrseh7w 1025-07-2022 19:25
220725-x41ewsbfh9 10Analysis
-
max time kernel
1563s -
max time network
1567s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
Resource
win7-20240221-en
General
-
Target
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe
-
Size
1.3MB
-
MD5
029121f4c1fc507eee2da7ef0f81c52f
-
SHA1
5bdfc541991da167e6fb256a64e05e05f92fc5db
-
SHA256
5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1
-
SHA512
94e38cc00fcbc431da0300eba6683f251e0b4c4ca71cc88d941acf998207d3df14b59322d9d59d5522649c80f26689fa1a44ad59371eeafcd4107c9dd42d3e2f
-
SSDEEP
24576:GP2e+mt0BUefY1OOz6KgoHPLVGdbiCu4SMZ4QU:89EfG3s28vuWg
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1444-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-6-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-9-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-12-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-13-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-16-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-37-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-38-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-39-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-40-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-41-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-42-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-43-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-44-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-45-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-46-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-47-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-48-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-49-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-50-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-51-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-53-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-52-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-54-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-55-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-56-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-57-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-58-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-59-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-60-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-61-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-62-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-63-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-64-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-65-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-66-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-67-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-68-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-69-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-70-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-71-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-72-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-73-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-74-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-75-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-76-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-77-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-78-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-79-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-80-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-81-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-82-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-83-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-84-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-85-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-86-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-87-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-88-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-89-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1444-90-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\B6606E10B6606E10.bmp" 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_ButtonGraphic.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\scenesscroll.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationRight_SelectionSubpicture.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\settings.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\calendar.js 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\slideShow.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rssBackBlue_docked.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_settings.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_ButtonGraphic.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-modules-options-api.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_bottom.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-output2.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.cpu.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_foggy.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\flyoutBack.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\NextMenuButtonIcon.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIcon.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back_lrg.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-io.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\jawt_md.h 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_up.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\artifacts.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\larrow.gif 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-background.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\settings.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\gadget.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_disabled.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rarrow.gif 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\weather.js 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\RSSFeeds.css 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_m.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.jpg 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground.wmv 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)redStateIcon.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_m.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-nodes.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-nodes.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_snow.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\FrameworkList.xml 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\heart_glass_Thumbnail.bmp 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\22.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\timeZones.js 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_SelectionSubpicture.png 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\settings.html 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1720 vssadmin.exe 560 vssadmin.exe 1912 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 916 vssvc.exe Token: SeRestorePrivilege 916 vssvc.exe Token: SeAuditPrivilege 916 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1720 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1444 wrote to memory of 1720 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1444 wrote to memory of 1720 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1444 wrote to memory of 1720 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 30 PID 1444 wrote to memory of 560 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1444 wrote to memory of 560 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1444 wrote to memory of 560 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1444 wrote to memory of 560 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 34 PID 1444 wrote to memory of 1912 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 PID 1444 wrote to memory of 1912 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 PID 1444 wrote to memory of 1912 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 PID 1444 wrote to memory of 1912 1444 5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe"C:\Users\Admin\AppData\Local\Temp\5466ba20f94b4a5f28a7dd9b2ee00b611104da3267e71d976dd6dc88ff6e83c1.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1720
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:560
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1912
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD50bb6f8e62c574baa3e5de2b46a95f1a1
SHA1797304b9c8cad6f1685f39c0a0cf0828ec54ac91
SHA25664d8a52a8e6c827b9cec14b9886e1908887035b1c71e679958843e912f91500a
SHA512ee2ac9a94642a71961d9a7aa083a8a537d342b9d3e3c4bd7a6835a15e56fd69c4914d23f779431cc5941597dd606b06af89d3b3d3d72c00cfc1b6fa1e37dda28