Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe
Resource
win10v2004-20240226-en
General
-
Target
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe
-
Size
92KB
-
MD5
32e3001eb783b182de6b45e5f729d3ba
-
SHA1
896a8963fb57c10d30c05b56465401babe48ff0b
-
SHA256
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d
-
SHA512
27572a35b5f21e5217012b93ebe03e59d5dfeea6bd2446316d2e74230b961e6378ae700cd4d78b0033e516adc9f494e8520c01170f74a401204cc84337a92e65
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4Ax5ALyqEIxS6CRxVcFuVWZp17i:Qw+asqN5aW/hLL5LqrxSbRYE
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 5 IoCs
Processes:
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe = "C:\\Windows\\System32\\2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe" 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exedescription ioc process File opened for modification C:\Users\Public\Videos\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JP38OXIN\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\266EQP1S\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1OEGTYQG\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\2Y0HPGOE\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Music\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AS4I30IR\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe -
Drops file in System32 directory 2 IoCs
Processes:
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exedescription ioc process File created C:\Windows\System32\Info.hta 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Windows\System32\2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exedescription ioc process File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_es-419.dll.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME35.CSS 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\currency.css 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0233070.WMF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105504.WMF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Efate 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckg.dll.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00052_.WMF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageHistoryIconImages.jpg.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\hprof-16.png.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187861.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0295241.GIF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD19695_.WMF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE01160_.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGPUNCT.XML.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msaddsr.dll.mui 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ONBttnWD.dll.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01238_.GIF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\settings.css 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0182946.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18229_.WMF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\Microsoft.Office.InfoPath.xml.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Port-au-Prince 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Metro.xml.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\liblibmpeg2_plugin.dll 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LTHD98SP.POC.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\PREVIEW.GIF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.dll.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB6.BDR.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18205_.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1STAR.DLL 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\ACTIVITY.CFG 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\feature.xml.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106208.WMF 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15022_.GIF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\LATIN1.SHP.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsPreviewTemplate.html 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01657_.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\PST8PDT.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01161_.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\acro20.lng.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.Speech.resources.dll 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Moscow.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02746U.BMP 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238333.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-crescent_partly-cloudy.png 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jre7\bin\sunmscapi.dll 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PG_INDEX.XML.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Start End Dates.accft.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\203x8subpicture.png 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\gadget.xml 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107450.WMF.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GR8GALRY.GRA.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvm.xml.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtospdif_plugin.dll.id-A9DF72FA.[[email protected]].2023 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ja.properties 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 612 vssadmin.exe 228 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exepid process 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2984 vssvc.exe Token: SeRestorePrivilege 2984 vssvc.exe Token: SeAuditPrivilege 2984 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.execmd.execmd.exedescription pid process target process PID 2892 wrote to memory of 2224 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 2892 wrote to memory of 2224 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 2892 wrote to memory of 2224 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 2892 wrote to memory of 2224 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 2224 wrote to memory of 2572 2224 cmd.exe mode.com PID 2224 wrote to memory of 2572 2224 cmd.exe mode.com PID 2224 wrote to memory of 2572 2224 cmd.exe mode.com PID 2224 wrote to memory of 612 2224 cmd.exe vssadmin.exe PID 2224 wrote to memory of 612 2224 cmd.exe vssadmin.exe PID 2224 wrote to memory of 612 2224 cmd.exe vssadmin.exe PID 2892 wrote to memory of 1596 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 2892 wrote to memory of 1596 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 2892 wrote to memory of 1596 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 2892 wrote to memory of 1596 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe cmd.exe PID 1596 wrote to memory of 2064 1596 cmd.exe mode.com PID 1596 wrote to memory of 2064 1596 cmd.exe mode.com PID 1596 wrote to memory of 2064 1596 cmd.exe mode.com PID 1596 wrote to memory of 228 1596 cmd.exe vssadmin.exe PID 1596 wrote to memory of 228 1596 cmd.exe vssadmin.exe PID 1596 wrote to memory of 228 1596 cmd.exe vssadmin.exe PID 2892 wrote to memory of 2632 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe PID 2892 wrote to memory of 2632 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe PID 2892 wrote to memory of 2632 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe PID 2892 wrote to memory of 2632 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe PID 2892 wrote to memory of 2012 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe PID 2892 wrote to memory of 2012 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe PID 2892 wrote to memory of 2012 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe PID 2892 wrote to memory of 2012 2892 2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe"C:\Users\Admin\AppData\Local\Temp\2210baa7b596879b413965c17f9f33dbf698ac183b2b82329d397c73dee5fc3d.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2572
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:612 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2064
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:228 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2632 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2012
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab.id-A9DF72FA.[[email protected]].2023
Filesize143.1MB
MD51307afe59f5e5ecc7ff694b8e3d841d8
SHA1b31211b9da84fec5470bf0637a249087acb61719
SHA256bb299952f1b9975f7d2fe2086811511622520f8c6e399661bd48109571286456
SHA5124d909c5ef1df4f67012329fa942fa4bb07c063b84ad0a960d3e1d571b2fb3442b599772176beff2a9b21b6edea6fe03aa86ef614e41fca4080ec1ee76682b9f6
-
Filesize
7KB
MD532072d7b3f0558c9abedd3aeb12befaf
SHA1c85cc819aef8c712947ccb5c46cfa05273604aeb
SHA256722c02e7547332213041a87b50ec127284ec1ac9669d4dfd6d499ebf1c5a666b
SHA5126cec84703427e1873603da96f2007b5e9664d2a579378435c2033a93a729b185e86f8747b6953b9a903cd68e5de7bcc5ae8a434142aecf6bb4b29fb221d7df1d