Analysis
-
max time kernel
180s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win11-20240412-en
General
-
Target
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
-
Size
185KB
-
MD5
fe788ba47f0a49329fd241a942bab938
-
SHA1
186e444c12d81a6c18e2f8eb66459a354c2ed25b
-
SHA256
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2
-
SHA512
673f9770ff7e7e1ac39b33513959f78298df4102e4322dddd2e745a313c0ecbab2ca732d14e6a916ba2165c40a5e6e48d1377618ff3a7d73085ac860be4340de
-
SSDEEP
3072:XqS7gtGIeq8KxrvRp1MImcZeuLaxugfCJsOlq8WkJK0BOog/Tt3onM9kHpOBae4/:aS7gtyuzFxm16axugfqlMw5g5BkOdSlr
Malware Config
Extracted
C:\ProgramData\R3ADM3.txt
conti
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.info
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Renames multiple (7348) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Admin\Saved Games\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Music\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Videos\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Links\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Documents\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Music\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-si\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\default_apps\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-140.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\avatar.jpg 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_KMS_Client_AE-ul.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nl-nl\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Franklin Gothic.xml 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-ul-oob.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.NETCore.App.runtimeconfig.json 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL108.XML 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fullscreen.svg 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\sql2000.xsl 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\AddressBook.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\css\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-pl.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Internet Explorer\de-DE\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTest-ul-oob.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\main-selector.css 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Common Files\System\msadc\de-DE\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\root\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_MAK_AE-ul-phn.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\he-il\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\SearchEmail.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-fr\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\js\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sv-se\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\adc_logo.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ca-es\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_close.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\applet\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial2-pl.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\pkeyconfig-office.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SKY\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\jopt-simple.md 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\natives_blob.bin 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-si\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\ui-strings.js 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\ml.pak.DATA 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_tr_135x40.svg 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Internet Explorer\SIGNUP\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightItalic.ttf 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-white_scale-140.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GOTHIC.TTF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 2160 vssvc.exe Token: SeRestorePrivilege 2160 vssvc.exe Token: SeAuditPrivilege 2160 vssvc.exe Token: SeIncreaseQuotaPrivilege 3036 WMIC.exe Token: SeSecurityPrivilege 3036 WMIC.exe Token: SeTakeOwnershipPrivilege 3036 WMIC.exe Token: SeLoadDriverPrivilege 3036 WMIC.exe Token: SeSystemProfilePrivilege 3036 WMIC.exe Token: SeSystemtimePrivilege 3036 WMIC.exe Token: SeProfSingleProcessPrivilege 3036 WMIC.exe Token: SeIncBasePriorityPrivilege 3036 WMIC.exe Token: SeCreatePagefilePrivilege 3036 WMIC.exe Token: SeBackupPrivilege 3036 WMIC.exe Token: SeRestorePrivilege 3036 WMIC.exe Token: SeShutdownPrivilege 3036 WMIC.exe Token: SeDebugPrivilege 3036 WMIC.exe Token: SeSystemEnvironmentPrivilege 3036 WMIC.exe Token: SeRemoteShutdownPrivilege 3036 WMIC.exe Token: SeUndockPrivilege 3036 WMIC.exe Token: SeManageVolumePrivilege 3036 WMIC.exe Token: 33 3036 WMIC.exe Token: 34 3036 WMIC.exe Token: 35 3036 WMIC.exe Token: 36 3036 WMIC.exe Token: SeIncreaseQuotaPrivilege 3036 WMIC.exe Token: SeSecurityPrivilege 3036 WMIC.exe Token: SeTakeOwnershipPrivilege 3036 WMIC.exe Token: SeLoadDriverPrivilege 3036 WMIC.exe Token: SeSystemProfilePrivilege 3036 WMIC.exe Token: SeSystemtimePrivilege 3036 WMIC.exe Token: SeProfSingleProcessPrivilege 3036 WMIC.exe Token: SeIncBasePriorityPrivilege 3036 WMIC.exe Token: SeCreatePagefilePrivilege 3036 WMIC.exe Token: SeBackupPrivilege 3036 WMIC.exe Token: SeRestorePrivilege 3036 WMIC.exe Token: SeShutdownPrivilege 3036 WMIC.exe Token: SeDebugPrivilege 3036 WMIC.exe Token: SeSystemEnvironmentPrivilege 3036 WMIC.exe Token: SeRemoteShutdownPrivilege 3036 WMIC.exe Token: SeUndockPrivilege 3036 WMIC.exe Token: SeManageVolumePrivilege 3036 WMIC.exe Token: 33 3036 WMIC.exe Token: 34 3036 WMIC.exe Token: 35 3036 WMIC.exe Token: 36 3036 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 4980 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 88 PID 2380 wrote to memory of 4980 2380 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 88 PID 4980 wrote to memory of 3036 4980 cmd.exe 90 PID 4980 wrote to memory of 3036 4980 cmd.exe 90 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe"C:\Users\Admin\AppData\Local\Temp\96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4EAE07DF-D3B8-4787-895E-21787D3014FE}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4EAE07DF-D3B8-4787-895E-21787D3014FE}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:6608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846B
MD51faf49045a09c14d8540fb0d9d595de4
SHA1bbf25516d2d69d397f1eabcc0c128b29f0627cc6
SHA25690a3c5e5ecd61cfc66f58049ddeb5b6c13c4b9eee78443778c5e57ee59fb2252
SHA512e38301a45bbf5c04542a52c677d7be4c66d2d44a284788a102139e05920ba4cb164e13dc77ada3fb326032223b554da3421334ba53abb87b85e2869e71dcef1e