Analysis
-
max time kernel
190s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 19:55
Behavioral task
behavioral1
Sample
Lecture13.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Lecture13.exe
Resource
win10v2004-20240412-en
General
-
Target
Lecture13.exe
-
Size
581KB
-
MD5
ef5a79a25dba6d0326cfd3649733997f
-
SHA1
028c9978bf83c92fbeabde7385fc72e9dcdf3687
-
SHA256
3f05a04c0f8fe2afb55e3c56034587edfa8fa6edd6c44725fed4c4bd8bd03135
-
SHA512
ec542d405c1490f6f715ac1d49de9ba7f4cf3d0a9b9cba5f0512af8068e57b5bbb07e474b307cd39e137cd6a8565f9fd16fdcbbebef06b6e2ab73b167585d13a
-
SSDEEP
12288:iLCMgX/tPAyOWyRanlo0/MQorIQQ4ijZX7EIHaIIan64Gn0PkQ9cqDbNV763o+RR:iRgPtPfZ9loCpQQvjh7EIHaOt/PkQyuy
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lecture13.exe Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Lecture13.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Lecture13.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2804-0-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral1/memory/2804-1-0x0000000000400000-0x0000000000580000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Lecture13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Lecture13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lecture13.exe = "C:\\Windows\\System32\\Lecture13.exe" Lecture13.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Videos\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BB0Z8TKM\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Lecture13.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\266EQP1S\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Documents\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini Lecture13.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JP38OXIN\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LS99WIMF\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Lecture13.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AS4I30IR\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\2Y0HPGOE\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Music\desktop.ini Lecture13.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Music\desktop.ini Lecture13.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Lecture13.exe Lecture13.exe File created C:\Windows\System32\Info.hta Lecture13.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\external_extensions.json.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_windy.png Lecture13.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\MSB1FREN.ITS Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Newsprint.eftx.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\gadget.xml Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00882_.WMF Lecture13.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Maldives.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Fakaofo Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101980.WMF.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files\Java\jre7\lib\zi\America\Miquelon.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Web.Entity.Design.Resources.dll Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01130_.WMF.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\library.js Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099158.WMF Lecture13.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\hxdsui.dll.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18236_.WMF.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14565_.GIF Lecture13.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libpva_plugin.dll Lecture13.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Updater.api.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\POSTL.ICO Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Form.zip Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7MDT.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-crescent.png Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187849.WMF.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.Xml.xml.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.base.nl_zh_4.4.0.v20140623020002.jar.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02022_.WMF Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.OPG Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\deployJava1.dll.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Midway.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libaudio_format_plugin.dll.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME04.CSS.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\jsprofilerui.dll.mui Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\MMHMM.WAV.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierDownArrow.jpg Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_bullets.gif Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\flavormap.properties Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-favorites.jar Lecture13.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\vlc.mo Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0384900.JPG Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01852_.WMF Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Aqtau Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\dsn.jar Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR3B.GIF.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXEV.DLL.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Thawte Root Certificate.cer.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\logo.png Lecture13.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sr.pak.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_228ef1_256x240.png Lecture13.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\InfoPathMUI.XML.id-638FD19E.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_en.dub.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\WinMail.exe.mui Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_ja.jar Lecture13.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libexport_plugin.dll.id-638FD19E.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcolorthres_plugin.dll Lecture13.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_F_COL.HXK Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer.png Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\imap.jar Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar.id-638FD19E.[[email protected]].ncov Lecture13.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1480 vssadmin.exe 2096 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe 2804 Lecture13.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1708 vssvc.exe Token: SeRestorePrivilege 1708 vssvc.exe Token: SeAuditPrivilege 1708 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2804 wrote to memory of 3064 2804 Lecture13.exe 28 PID 2804 wrote to memory of 3064 2804 Lecture13.exe 28 PID 2804 wrote to memory of 3064 2804 Lecture13.exe 28 PID 2804 wrote to memory of 3064 2804 Lecture13.exe 28 PID 3064 wrote to memory of 2336 3064 cmd.exe 30 PID 3064 wrote to memory of 2336 3064 cmd.exe 30 PID 3064 wrote to memory of 2336 3064 cmd.exe 30 PID 3064 wrote to memory of 1480 3064 cmd.exe 32 PID 3064 wrote to memory of 1480 3064 cmd.exe 32 PID 3064 wrote to memory of 1480 3064 cmd.exe 32 PID 2804 wrote to memory of 216 2804 Lecture13.exe 37 PID 2804 wrote to memory of 216 2804 Lecture13.exe 37 PID 2804 wrote to memory of 216 2804 Lecture13.exe 37 PID 2804 wrote to memory of 216 2804 Lecture13.exe 37 PID 216 wrote to memory of 232 216 cmd.exe 39 PID 216 wrote to memory of 232 216 cmd.exe 39 PID 216 wrote to memory of 232 216 cmd.exe 39 PID 216 wrote to memory of 2096 216 cmd.exe 40 PID 216 wrote to memory of 2096 216 cmd.exe 40 PID 216 wrote to memory of 2096 216 cmd.exe 40 PID 2804 wrote to memory of 2928 2804 Lecture13.exe 41 PID 2804 wrote to memory of 2928 2804 Lecture13.exe 41 PID 2804 wrote to memory of 2928 2804 Lecture13.exe 41 PID 2804 wrote to memory of 2928 2804 Lecture13.exe 41 PID 2804 wrote to memory of 696 2804 Lecture13.exe 42 PID 2804 wrote to memory of 696 2804 Lecture13.exe 42 PID 2804 wrote to memory of 696 2804 Lecture13.exe 42 PID 2804 wrote to memory of 696 2804 Lecture13.exe 42 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lecture13.exe"C:\Users\Admin\AppData\Local\Temp\Lecture13.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2336
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1480
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:232
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2096
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2928
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:696
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.id-638FD19E.[[email protected]].ncov
Filesize3.6MB
MD5273766d3172971eb2ac840addb80cbc8
SHA138415b6c6c9a69f96104db8f9c60140f5a3780d8
SHA25614fe53c3ccf57a82ff8e2363c1dd1bce99f4ee6acaebbcffa74ec25a9a1d251d
SHA512471bfd0f32b02723934599f1cadb2618e058b34100f253ae833f4f948070bb113079804fd867ab1a192c9ea71aa06adc682af4d3f351156053cd99e8b5b6aac5
-
Filesize
13KB
MD5be2bac93b7a3d5975204033a5c022557
SHA18a01afb435dfe1238fac9fbc4ca50597cd4f2a03
SHA25612c71ec9d53937bdf61e7d75eba16f890b0c71ee779ee5fb897a49ce289b3e47
SHA5123e9e0b47dfd585567c6f42422b6ce119c10c4d8455a950ae2c435768c804454bfce499ba2aa527128236c4b3abd699b0caafafd9315e044b42a3ae8a9e8ebfd4