Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 20:00
Behavioral task
behavioral1
Sample
Lecture13.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Lecture13.exe
Resource
win10v2004-20240412-en
General
-
Target
Lecture13.exe
-
Size
581KB
-
MD5
ef5a79a25dba6d0326cfd3649733997f
-
SHA1
028c9978bf83c92fbeabde7385fc72e9dcdf3687
-
SHA256
3f05a04c0f8fe2afb55e3c56034587edfa8fa6edd6c44725fed4c4bd8bd03135
-
SHA512
ec542d405c1490f6f715ac1d49de9ba7f4cf3d0a9b9cba5f0512af8068e57b5bbb07e474b307cd39e137cd6a8565f9fd16fdcbbebef06b6e2ab73b167585d13a
-
SSDEEP
12288:iLCMgX/tPAyOWyRanlo0/MQorIQQ4ijZX7EIHaIIan64Gn0PkQ9cqDbNV763o+RR:iRgPtPfZ9loCpQQvjh7EIHaOt/PkQyuy
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (319) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lecture13.exe Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Lecture13.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Lecture13.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2752-0-0x0000000000400000-0x0000000000580000-memory.dmp upx behavioral1/memory/2752-1-0x0000000000400000-0x0000000000580000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lecture13.exe = "C:\\Windows\\System32\\Lecture13.exe" Lecture13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Lecture13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Lecture13.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6UZVS19T\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Lecture13.exe File opened for modification C:\Program Files (x86)\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HUNEJ1HU\desktop.ini Lecture13.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Links\desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Documents\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Videos\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Lecture13.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Lecture13.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Lecture13.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Lecture13.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Lecture13.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\2RM92H5V\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\EQ2PZD61\desktop.ini Lecture13.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Lecture13.exe File opened for modification C:\Program Files\desktop.ini Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Lecture13.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Lecture13.exe Lecture13.exe File created C:\Windows\System32\Info.hta Lecture13.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\MENUS.JS Lecture13.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\THMBNAIL.PNG.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00242_.WMF Lecture13.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\PICTIM32.FLT.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR46B.GIF Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR7B.GIF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR16F.GIF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR19F.GIF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR51B.GIF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.ds_1.4.200.v20131126-2331.jar.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Campo_Grande.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.Speech.resources.dll Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLSLICER.DLL Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\ModifiedTelespace.ico.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\TEAROFF.POC.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\arrow.png Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\localizedStrings.js Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Tegucigalpa.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_zh_4.4.0.v20140623020002.jar.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis.css.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\TAB_ON.GIF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\TextFile.zip.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB_COL.HXC.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\OliveGreen.css Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveReport.dotx Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\masterix.gif.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OFFRHD.DLL Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01299_.GIF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME52.CSS Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090027.WMF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\PresentationFramework.resources.dll Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-swing-outline.jar.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Ulaanbaatar.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Midway Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME51.CSS Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs.xml.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04225_.WMF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107514.WMF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\wmlaunch.exe.mui Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21505_.GIF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-uihandler.xml.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01084_.WMF Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\ACCDDSUI.DLL.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\WhiteboxMask.bmp.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01357_.WMF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsHomePageScript.js.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jre7\lib\alt-rt.jar.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl.css Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\MSB1ESEN.ITS.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\localizedStrings.js Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0183168.WMF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.servlet.jsp_2.2.0.v201112011158.jar.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04332_.WMF Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7ES.DLL Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LABEL.DPV Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\ViewHeaderPreview.jpg.id-2CBC0290.[[email protected]].ncov Lecture13.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02161_.WMF.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files\VideoLAN\VLC\plugins\keystore\libfile_keystore_plugin.dll.id-2CBC0290.[[email protected]].ncov Lecture13.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\THROAT.WAV.id-2CBC0290.[[email protected]].ncov Lecture13.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1992 vssadmin.exe 1164 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe 2752 Lecture13.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2760 vssvc.exe Token: SeRestorePrivilege 2760 vssvc.exe Token: SeAuditPrivilege 2760 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2712 2752 Lecture13.exe 28 PID 2752 wrote to memory of 2712 2752 Lecture13.exe 28 PID 2752 wrote to memory of 2712 2752 Lecture13.exe 28 PID 2752 wrote to memory of 2712 2752 Lecture13.exe 28 PID 2712 wrote to memory of 2056 2712 cmd.exe 30 PID 2712 wrote to memory of 2056 2712 cmd.exe 30 PID 2712 wrote to memory of 2056 2712 cmd.exe 30 PID 2712 wrote to memory of 1992 2712 cmd.exe 31 PID 2712 wrote to memory of 1992 2712 cmd.exe 31 PID 2712 wrote to memory of 1992 2712 cmd.exe 31 PID 2752 wrote to memory of 2872 2752 Lecture13.exe 37 PID 2752 wrote to memory of 2872 2752 Lecture13.exe 37 PID 2752 wrote to memory of 2872 2752 Lecture13.exe 37 PID 2752 wrote to memory of 2872 2752 Lecture13.exe 37 PID 2872 wrote to memory of 564 2872 cmd.exe 39 PID 2872 wrote to memory of 564 2872 cmd.exe 39 PID 2872 wrote to memory of 564 2872 cmd.exe 39 PID 2872 wrote to memory of 1164 2872 cmd.exe 40 PID 2872 wrote to memory of 1164 2872 cmd.exe 40 PID 2872 wrote to memory of 1164 2872 cmd.exe 40 PID 2752 wrote to memory of 3232 2752 Lecture13.exe 41 PID 2752 wrote to memory of 3232 2752 Lecture13.exe 41 PID 2752 wrote to memory of 3232 2752 Lecture13.exe 41 PID 2752 wrote to memory of 3232 2752 Lecture13.exe 41 PID 2752 wrote to memory of 2932 2752 Lecture13.exe 42 PID 2752 wrote to memory of 2932 2752 Lecture13.exe 42 PID 2752 wrote to memory of 2932 2752 Lecture13.exe 42 PID 2752 wrote to memory of 2932 2752 Lecture13.exe 42 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lecture13.exe"C:\Users\Admin\AppData\Local\Temp\Lecture13.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2056
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1992
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:564
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1164
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:3232
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2932
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-2CBC0290.[[email protected]].ncov
Filesize23.5MB
MD541999750dd434cdee369df1c7bf928ef
SHA1221fac18abc5d132f58aa6f51494efa3f4faa5b0
SHA256169bdd86921119cc9b872a24f5058104553a057202224fce86c736433d956c11
SHA512b33bfb7ab8d45f46951a111b147ce602fb8229cf68501d328b3c56fdd5af44894ec94ff6f229924a9d7af3c3e12245e7f106a2bd002788c55c6a94e4f4d36d20
-
Filesize
13KB
MD5b99e42a2a508cc6ecbc64c2ecdc3d076
SHA1c5240abe7c3a51733953b27e3f37e434ccac5163
SHA256cf1a7ab43977dfc51f4cdfe4362e2fef2f768eb4fb4f1c89c0c7f629b9bebe4d
SHA512ff9ffaaa761a55e4a78985931d68c80dffeecf1d4e445827f3f8afc9461087da18c50ef0dfdb7caf23583c2afedcd905127c2c442bf6027b7489b0bc1a09327b