Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware.CoronaVirus.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Ransomware.CoronaVirus.exe
Resource
win10v2004-20240508-en
General
-
Target
Ransomware.CoronaVirus.exe
-
Size
1.0MB
-
MD5
055d1462f66a350d9886542d4d79bc2b
-
SHA1
f1086d2f667d807dbb1aa362a7a809ea119f2565
-
SHA256
dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
-
SHA512
2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
SSDEEP
24576:FRYz/ERA0eMuWfHvgPw/83JI8CorP9qY0:FE/yADMuYvgP93JIc2
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (316) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ransomware.CoronaVirus.exe Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Ransomware.CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Ransomware.CoronaVirus.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ransomware.CoronaVirus.exe = "C:\\Windows\\System32\\Ransomware.CoronaVirus.exe" Ransomware.CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Ransomware.CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Ransomware.CoronaVirus.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1MQ01HTG\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Documents\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\P56GQFE8\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FA862KXF\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P1KETFJO\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Links\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\F5ZW0CRZ\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Videos\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\EY0DVRIO\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\K03K2CA5\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Public\Music\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Ransomware.CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Ransomware.CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Ransomware.CoronaVirus.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Ransomware.CoronaVirus.exe Ransomware.CoronaVirus.exe File created C:\Windows\System32\Info.hta Ransomware.CoronaVirus.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\zi\Europe\Kaliningrad.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\OFFICE10.DLL.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Module.xml Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DVDHM.POC.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME20.CSS.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_ja.jar.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0295069.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00299_.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS01638_.WMF Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\PAWPRINT.GIF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0148757.JPG.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215710.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\arrow.png.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jre7\lib\management\jmxremote.access.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\Office14\ONBttnIE.dll Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\libfreetype_plugin.dll.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Eirunepe Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\ended_review_or_form.gif.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00172_.GIF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_hu.jar.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\jawt.lib.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099204.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\es-ES\msdaorar.dll.mui Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RCLRPT.CFG Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR36F.GIF Ransomware.CoronaVirus.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Lisbon.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153093.WMF Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUNGLE.HTM.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\license.html.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\PREVIEW.GIF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-process-l1-1-0.dll.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ClassicPhotoAlbum.potx.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Mozilla Firefox\libEGL.dll Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00726_.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_VelvetRose.gif.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\adodb.dll.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME20.CSS.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\VS_ComponentSigningIntermediate.cer Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\settings.ini.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187863.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\msader15.dll.mui Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.xml Ransomware.CoronaVirus.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Pitcairn.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00165_.GIF Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152690.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libwall_plugin.dll.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PULQOT98.POC Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232795.WMF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files\Java\jre7\lib\zi\America\Thunder_Bay.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21348_.GIF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\README.TXT.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\WMPMediaSharing.dll.mui Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.LIC.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02503U.BMP.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.jobs_3.6.0.v20140424-0053.jar.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_chromaprint_plugin.dll.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0216724.WMF Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME46.CSS.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\THMBNAIL.PNG.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwingdi_plugin.dll.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\TAB_ON.GIF.id-6EC0D7B8.[[email protected]].ncov Ransomware.CoronaVirus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2668 vssadmin.exe 820 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe 2832 Ransomware.CoronaVirus.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2672 vssvc.exe Token: SeRestorePrivilege 2672 vssvc.exe Token: SeAuditPrivilege 2672 vssvc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2804 mshta.exe 2804 mshta.exe 2804 mshta.exe 2804 mshta.exe 2804 mshta.exe 2804 mshta.exe 2804 mshta.exe 2804 mshta.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1384 2832 Ransomware.CoronaVirus.exe 28 PID 2832 wrote to memory of 1384 2832 Ransomware.CoronaVirus.exe 28 PID 2832 wrote to memory of 1384 2832 Ransomware.CoronaVirus.exe 28 PID 2832 wrote to memory of 1384 2832 Ransomware.CoronaVirus.exe 28 PID 1384 wrote to memory of 2556 1384 cmd.exe 30 PID 1384 wrote to memory of 2556 1384 cmd.exe 30 PID 1384 wrote to memory of 2556 1384 cmd.exe 30 PID 1384 wrote to memory of 2668 1384 cmd.exe 31 PID 1384 wrote to memory of 2668 1384 cmd.exe 31 PID 1384 wrote to memory of 2668 1384 cmd.exe 31 PID 2832 wrote to memory of 5012 2832 Ransomware.CoronaVirus.exe 35 PID 2832 wrote to memory of 5012 2832 Ransomware.CoronaVirus.exe 35 PID 2832 wrote to memory of 5012 2832 Ransomware.CoronaVirus.exe 35 PID 2832 wrote to memory of 5012 2832 Ransomware.CoronaVirus.exe 35 PID 5012 wrote to memory of 1868 5012 cmd.exe 37 PID 5012 wrote to memory of 1868 5012 cmd.exe 37 PID 5012 wrote to memory of 1868 5012 cmd.exe 37 PID 5012 wrote to memory of 820 5012 cmd.exe 38 PID 5012 wrote to memory of 820 5012 cmd.exe 38 PID 5012 wrote to memory of 820 5012 cmd.exe 38 PID 2832 wrote to memory of 2488 2832 Ransomware.CoronaVirus.exe 39 PID 2832 wrote to memory of 2488 2832 Ransomware.CoronaVirus.exe 39 PID 2832 wrote to memory of 2488 2832 Ransomware.CoronaVirus.exe 39 PID 2832 wrote to memory of 2488 2832 Ransomware.CoronaVirus.exe 39 PID 2832 wrote to memory of 2804 2832 Ransomware.CoronaVirus.exe 40 PID 2832 wrote to memory of 2804 2832 Ransomware.CoronaVirus.exe 40 PID 2832 wrote to memory of 2804 2832 Ransomware.CoronaVirus.exe 40 PID 2832 wrote to memory of 2804 2832 Ransomware.CoronaVirus.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransomware.CoronaVirus.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware.CoronaVirus.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2556
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2668
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1868
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:820
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2488
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-6EC0D7B8.[[email protected]].ncov
Filesize23.5MB
MD5d317670b626bf20bf772ffe9c9e282b1
SHA18407b137c83a851c7f0759a3612f8f6b3f571442
SHA256f51688ed32a5f0b17dd2bcce09bcd0cc85cfcb251ca138e1e5eafeddd391e2ad
SHA512ce667669bff6a8f51cf126e8e816892c27ed157d217b6493432073b8593c666bd11b12c1c307c31a89ff141fcfa9aa63ee3c6af762f06f9d67baf2ddecb8adfe
-
Filesize
13KB
MD5cbfd3857078fd5f11284e8bd9801ec94
SHA1d32a19becc769ab736d68edeeb02596f2136bc31
SHA25603d9f7c8d6278983a1865749481de1c7cd9e7514e38a09b84e87fc298d5a7bee
SHA5122a7b999f48592736779123543cdfd87876e3a8e0f83a4d1169148b8a0c99642695b5cefc2962b02350b4b39dfd9c05d2ae7146a664bc1bdec7dae585a5e046c5