Resubmissions
07-04-2024 06:31
240407-haaj2sff32 1007-04-2024 06:31
240407-g95nssfb2w 1007-04-2024 06:31
240407-g911lsff26 1007-04-2024 06:30
240407-g9xcesfa9z 1001-02-2022 04:39
220201-e9zrfaggdq 10Analysis
-
max time kernel
1561s -
max time network
1565s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe
Resource
win7-20240221-en
General
-
Target
a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe
-
Size
1.5MB
-
MD5
7cdcc3f98b8ac064a1a0f0b978a125a1
-
SHA1
0403524c482fd0aaf166604d3d18cc80b308034b
-
SHA256
a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f
-
SHA512
b89a50371281474d1a1013acec4d7cd14445579b1c37b5efab17ebdb6a27bcf1f42457ad9f63fedd4dc5adeeadb59816ccaff27f3538e438a21149abb342dfc5
-
SSDEEP
24576:QpTUqxDuI7WRoIlt2dTsJ63hHjGGYWYwMqP:ETxD/WRoIlIdTskNGIMqP
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2292-1-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-2-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-4-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-3-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-7-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-6-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-5-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-12-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-13-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-16-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-37-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-38-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-39-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-41-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-40-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-42-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-43-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-44-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-45-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-46-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-47-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-48-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-49-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-50-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-51-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-53-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-52-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-55-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-56-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-57-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-58-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-59-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-54-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-60-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-61-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-62-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-63-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-64-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-65-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-66-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-67-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-68-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-69-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-70-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-73-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-72-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-74-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-77-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-79-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-80-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-78-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-81-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-76-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-75-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-71-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-83-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-84-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-85-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-86-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-82-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-87-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-88-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-89-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2292-92-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\A93C83B1A93C83B1.bmp" a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_over_BIDI.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\1047x576black.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Mso Example Intl Setup File A.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_foggy.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\weather.css a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\1047x576black.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Memories_buttonClear.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-remote.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\clock.css a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev-disable.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\license.html a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\slideShow.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\RSSFeeds.css a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\conticon.gif a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\6.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\settings.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeulm.dat a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\8.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfralm.dat a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\slideShow.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\config.ini a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\selection_subpicture.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\7-Zip\License.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Mozilla Firefox\update-settings.ini a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\about.html a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\init.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_s.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\topnav.gif a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.xml a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\alertIcon.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask_PAL.wmv a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_SelectionSubpicture.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_dot.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\LogoCanary.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_content-background.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\navBack.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_bottom_right.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\library.js a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\calendar.html a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\title_stripe.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\travel.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\OutInitialize.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_thunderstorm.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2424 vssadmin.exe 1596 vssadmin.exe 1624 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1724 vssvc.exe Token: SeRestorePrivilege 1724 vssvc.exe Token: SeAuditPrivilege 1724 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1596 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2292 wrote to memory of 1596 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2292 wrote to memory of 1596 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2292 wrote to memory of 1596 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 30 PID 2292 wrote to memory of 1624 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2292 wrote to memory of 1624 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2292 wrote to memory of 1624 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2292 wrote to memory of 1624 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 34 PID 2292 wrote to memory of 2424 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 PID 2292 wrote to memory of 2424 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 PID 2292 wrote to memory of 2424 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 PID 2292 wrote to memory of 2424 2292 a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe"C:\Users\Admin\AppData\Local\Temp\a8c452946e291216b7bba41b8e7f9a3eb5ee9178c9559e4b5017ed832d90b94f.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1596
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1624
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:2424
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD50f1f8cce027ff5cac971cdb3a161a508
SHA1cda5339ad5ec2305f6cb973474d8894c095bf058
SHA256aabf3996f692a5e72423a039790bbb9608d43e0e5fe612dd10bb746c9a551e6c
SHA5120724ad3c68c0bb29b672e0e808e32e2072277653b336327b1eb359a1a630b672be273af7a7871124ad6b216d17251d6112fa27ae046d3f0dfda09aaeec4b16d7