Resubmissions
07-04-2024 06:31
240407-haaj2sff32 1007-04-2024 06:31
240407-g95nssfb2w 1007-04-2024 06:31
240407-g911lsff26 1007-04-2024 06:30
240407-g9xcesfa9z 1001-02-2022 04:39
220201-e9zrfaggdq 10Analysis
-
max time kernel
1039s -
max time network
1041s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe
Resource
win7-20240220-en
General
-
Target
a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe
-
Size
1.5MB
-
MD5
7cdcc3f98b8ac064a1a0f0b978a125a1
-
SHA1
0403524c482fd0aaf166604d3d18cc80b308034b
-
SHA256
a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f
-
SHA512
b89a50371281474d1a1013acec4d7cd14445579b1c37b5efab17ebdb6a27bcf1f42457ad9f63fedd4dc5adeeadb59816ccaff27f3538e438a21149abb342dfc5
-
SSDEEP
24576:QpTUqxDuI7WRoIlt2dTsJ63hHjGGYWYwMqP:ETxD/WRoIlIdTskNGIMqP
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2932-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-6-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-7-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-11-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-13-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-16-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-38-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-39-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-40-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-42-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-41-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-37-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-43-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-44-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-46-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-45-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-47-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-48-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-50-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-49-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-51-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-52-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-53-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-56-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-59-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-60-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-61-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-62-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-58-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-64-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-63-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-65-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-66-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-67-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-57-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-68-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-55-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-69-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-70-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-72-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-74-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-73-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-71-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-54-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-75-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-76-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-77-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-78-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-79-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-80-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-81-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-82-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-83-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-84-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-87-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-88-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-90-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-89-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-86-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2932-91-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\6444905C6444905C.bmp" a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-previous-static.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_top_right.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-execution.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_title.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\currency.css a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_equalizer.html a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-crescent_partly-cloudy.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_rest.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-tools.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-dialogs.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_SelectionSubpicture.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_up.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_hov.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\timeZones.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\ConnectionManager.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\33.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-charts.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodbig.gif a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\LogoCanary.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\gadget.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\library.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-views.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\flyout.html a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\flyout.html a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-queries.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonInset_Alpha2.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-snaptracer.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIconSubpict.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Memories_buttonClear.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\44.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_snow.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\gadget.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.jpg a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_rainy.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\vignettemask25.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_thunderstorm.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\20.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\init.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\1047x576black.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_hov.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\slideShow.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\gadget.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-io-ui.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeulm.dat a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\info.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveDrop32x32.gif a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1928 vssadmin.exe 1912 vssadmin.exe 1440 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1132 vssvc.exe Token: SeRestorePrivilege 1132 vssvc.exe Token: SeAuditPrivilege 1132 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1912 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2932 wrote to memory of 1912 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2932 wrote to memory of 1912 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2932 wrote to memory of 1912 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2932 wrote to memory of 1440 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2932 wrote to memory of 1440 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2932 wrote to memory of 1440 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2932 wrote to memory of 1440 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2932 wrote to memory of 1928 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 PID 2932 wrote to memory of 1928 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 PID 2932 wrote to memory of 1928 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 PID 2932 wrote to memory of 1928 2932 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe"C:\Users\Admin\AppData\Local\Temp\a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1912
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1440
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1928
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5fc949b8bc1549e3ce14b4bebffb5b6f2
SHA188889979a57366157ba37902eecb7fb7f2bfe35f
SHA25650db4657ae18fbfbc794adb45d52133802a9d5e845c33a50ae0a255ba72773b3
SHA512c898ef816d9d0f79ad0ad899626d8aa33cff952614517cf3ff02a0927f37dfebc7182d8119c66eb38fbac7a4d074944d0bd1d94562d0017e3f4e6dd6bdc64d23