Analysis
-
max time kernel
130s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe
-
Size
604KB
-
MD5
6f7abbc706baecf6e86cde729475dc7d
-
SHA1
00a55e2ae828f928770fdd1c59da361198fba382
-
SHA256
85e3772d5502b9f5251843b3884788ab6c4d44af761900c787d36e1d5586244c
-
SHA512
70b80ff7efeac45dc3cbaeb5b5a3b4f774dd3f61c08801fe43c5a086e8372ba199ea9f676ab3ceb9dd4d5332ebd5db79616460496632da831a51b21753f61092
-
SSDEEP
12288:PsEXei41jA1WnzVSxq5p1qHVXACWOEogk3pmIc5A1WnzVSxq5p1qH:PsEX341jA1wBSggHlpp3r0A1wBSggH
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+riuhr.txt
http://ert54nfh6hdshbw4f.nursespelk.com/263CE93022E9487
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/263CE93022E9487
http://akdfrefdkm45tf33fsdfsdf.yamenswash.com/263CE93022E9487
http://fwgrhsao3aoml7ej.onion/263CE93022E9487
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (429) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2380 cmd.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+riuhr.html lsmhjikas.exe -
Executes dropped EXE 4 IoCs
pid Process 2360 lsmhjikas.exe 852 lsmhjikas.exe 2308 esaco.exe 332 yldgg.exe -
Loads dropped DLL 2 IoCs
pid Process 852 lsmhjikas.exe 852 lsmhjikas.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\qwer-sadkfgsa = "C:\\Windows\\lsmhjikas.exe" lsmhjikas.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1972 set thread context of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 2360 set thread context of 852 2360 lsmhjikas.exe 34 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_SelectionSubpicture.png lsmhjikas.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_rest.png lsmhjikas.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground.wmv lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_pressed.png lsmhjikas.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\settings.js lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\settings.js lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\settings.js lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_down_BIDI.png lsmhjikas.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer.png lsmhjikas.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_settings.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\RSSFeeds.js lsmhjikas.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-imageMask.png lsmhjikas.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_win7.css lsmhjikas.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png lsmhjikas.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_m.png lsmhjikas.exe File opened for modification C:\Program Files\7-Zip\Lang\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-over-select.png lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty_settings.png lsmhjikas.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ko.pak lsmhjikas.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\glass_lrg.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\tile_drop_shadow.png lsmhjikas.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogoDev.png lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\Recovery+riuhr.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt lsmhjikas.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\Recovery+riuhr.html lsmhjikas.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color120.jpg lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\Recovery+riuhr.txt lsmhjikas.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_SelectionSubpicture.png lsmhjikas.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\Recovery+riuhr.txt lsmhjikas.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\lsmhjikas.exe VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe File opened for modification C:\Windows\lsmhjikas.exe VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 348 vssadmin.exe 912 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4012b2fc2abbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2835DF01-271E-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000037c6e9b69348af428bc6cae5d409a88200000000020000000000106600000001000020000000f223e84405fb2b2bd11ecbe64bd136608c212ba27609f5811e97f0c93919747d000000000e8000000002000020000000c62d529dfbfdf0919feaaefaba63c85158d126cbe032401e9eba6b8442256e9d200000008de863ace6cd9c3a24ec453f3f276f97221c6996081874917ab049c854821e864000000069144c27feb48a1467fbe96579da7999b8740af3d0d5afc3b6036b38199bd3e9b25dba741ce4680277c00b16d3353fab8af3fdfeee652a1ceb75d4844e764b23 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1420 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe 852 lsmhjikas.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe Token: SeDebugPrivilege 852 lsmhjikas.exe Token: SeBackupPrivilege 1412 vssvc.exe Token: SeRestorePrivilege 1412 vssvc.exe Token: SeAuditPrivilege 1412 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 692 iexplore.exe 2228 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 2360 lsmhjikas.exe 692 iexplore.exe 692 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 1972 wrote to memory of 2488 1972 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 28 PID 2488 wrote to memory of 2360 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 29 PID 2488 wrote to memory of 2360 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 29 PID 2488 wrote to memory of 2360 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 29 PID 2488 wrote to memory of 2360 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 29 PID 2488 wrote to memory of 2380 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 30 PID 2488 wrote to memory of 2380 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 30 PID 2488 wrote to memory of 2380 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 30 PID 2488 wrote to memory of 2380 2488 VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe 30 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 2360 wrote to memory of 852 2360 lsmhjikas.exe 34 PID 852 wrote to memory of 2308 852 lsmhjikas.exe 35 PID 852 wrote to memory of 2308 852 lsmhjikas.exe 35 PID 852 wrote to memory of 2308 852 lsmhjikas.exe 35 PID 852 wrote to memory of 2308 852 lsmhjikas.exe 35 PID 2308 wrote to memory of 348 2308 esaco.exe 36 PID 2308 wrote to memory of 348 2308 esaco.exe 36 PID 2308 wrote to memory of 348 2308 esaco.exe 36 PID 2308 wrote to memory of 348 2308 esaco.exe 36 PID 852 wrote to memory of 1420 852 lsmhjikas.exe 43 PID 852 wrote to memory of 1420 852 lsmhjikas.exe 43 PID 852 wrote to memory of 1420 852 lsmhjikas.exe 43 PID 852 wrote to memory of 1420 852 lsmhjikas.exe 43 PID 852 wrote to memory of 692 852 lsmhjikas.exe 44 PID 852 wrote to memory of 692 852 lsmhjikas.exe 44 PID 852 wrote to memory of 692 852 lsmhjikas.exe 44 PID 852 wrote to memory of 692 852 lsmhjikas.exe 44 PID 692 wrote to memory of 2856 692 iexplore.exe 46 PID 692 wrote to memory of 2856 692 iexplore.exe 46 PID 692 wrote to memory of 2856 692 iexplore.exe 46 PID 692 wrote to memory of 2856 692 iexplore.exe 46 PID 852 wrote to memory of 332 852 lsmhjikas.exe 47 PID 852 wrote to memory of 332 852 lsmhjikas.exe 47 PID 852 wrote to memory of 332 852 lsmhjikas.exe 47 PID 852 wrote to memory of 332 852 lsmhjikas.exe 47 PID 332 wrote to memory of 912 332 yldgg.exe 48 PID 332 wrote to memory of 912 332 yldgg.exe 48 PID 332 wrote to memory of 912 332 yldgg.exe 48 PID 332 wrote to memory of 912 332 yldgg.exe 48 PID 852 wrote to memory of 2356 852 lsmhjikas.exe 51 PID 852 wrote to memory of 2356 852 lsmhjikas.exe 51 PID 852 wrote to memory of 2356 852 lsmhjikas.exe 51 PID 852 wrote to memory of 2356 852 lsmhjikas.exe 51 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_6f7abbc706baecf6e86cde729475dc7d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\lsmhjikas.exeC:\Windows\lsmhjikas.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\lsmhjikas.exeC:\Windows\lsmhjikas.exe4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\Documents\esaco.exeC:\Users\Admin\Documents\esaco.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
PID:348
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- Opens file in notepad (likely ransom note)
PID:1420
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:692 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
-
C:\Users\Admin\Documents\yldgg.exeC:\Users\Admin\Documents\yldgg.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LSMHJI~1.EXE5⤵PID:2356
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE3⤵
- Deletes itself
PID:2380
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d98a738f0b85a38718da88d5de95ba4d
SHA1a86cb9590ceb6845c936a73efa0a8b26e1859a9d
SHA2561095473e4d938be4c07d79ee48b539c2cf3979d383ea0a7503e4f31253373223
SHA512d73de77a3859ad7cd68ccca0f62346bbe28bc35883da2cf89e66a0d93917906c613382f15706804115b644871d42620c66a64161fa182e1e486216ff7113d22a
-
Filesize
66KB
MD5e9218f99390d05f03d29b442f9ac7a22
SHA1a6bc181ec2fe6a87a403418b77c5a17bce712a40
SHA256e37764dd80d9302f4ee0acd05eb943d2b40c8b50b4f95d229ec128d39a470061
SHA51293606fc16a08cbca70a95e0e395bdf651641caabda3e22670dfb9f2642e5ccad1003696593c912c183b5f19d2f98498014457164af59ac8830d9588ea5c3e725
-
Filesize
2KB
MD529c0b40260061f2bb6d3c12a2684be3e
SHA1ea4c0584476f45c8d1a65b62165f7db4816c75c1
SHA2566421fc5aaf90ca66d0297979e1439bfb4d5dbd1f34f99d0b6507b0d45e3509fd
SHA5126c3d25595896aba7c90001f41a336263ba16314b64db7e8edc72e05193d382d439657fb26bcf9190d40c8a9fa956c151c702e3d9466074b2de66d0e4021efffb
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD5aa8e5d8646a8afa35ea07a5916305844
SHA1605bdedd2bf63f93d3b9c7b87aa2c6f6ec7606b6
SHA256f178ba03a639241ff01d729e17c224fd9d6b59c1069260da4f2eadf1bc9850db
SHA51216bc806ce26730c7765551b37ae1b7ca7004dbdb04e66527d1e6f0cac218dd2d93fa581d7c979125ad887386a8cb523327d00425844e2e74fe07a3c3705f77ab
-
Filesize
109KB
MD5020ccea365d9728d7fa28ee5cc50884a
SHA10d547b173a3720ff48d0accbfb448fb2f5fc76b5
SHA2561d62aaeccec1e40a34bf100115582fb2b40de3049e76a7a27b90720a56abc170
SHA512905e91d7b33745d0e82c4ecf3185439e28b2c1524740e8634e772e23881365b0dbdcf87185d63e1a10c2ed23c31b5f36f580d09036abe08d32a5232d1767f730
-
Filesize
173KB
MD526ad827a2bae913115bec47f093cc258
SHA1b63689a976cd01abcc5f06455999c3867ac53ef0
SHA2565dfeaac5b98c78c3347c565ed3df073e63f8f301b5577f676e2ea1d55792607f
SHA512c060d60243ce7632c8242f9a96bb27cfca470062576479052656986ef14bd896f7e1302becc76f4c6602359d665bbf399efca2677b9abb48afcc24979890c7ab
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53206f70268201c3aea7c5cbac99efdca
SHA14b1945f7a09089202e61165d970f52d0be53df4d
SHA2562f1b79484a5c5ba9a88f83a247b6ccf9fe306f14a1bc2bc01f7d6a5316418324
SHA5121fa35153ab249801790eca371e189e1911ed2459cfbc5e613cb3954ab274a77f8fb42c817a6485e7603155ef2a67ca4a4d8b1b0ce32ce50de4eec7bdadcff05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b4b019d839e9d9abbeb6ad9d988190
SHA1077fe8d1e3828809ad592b3eff6589215124e977
SHA256542e1393cd9a7887f527738a2bed46068aa23d929292eb8e95c10d797726c66d
SHA512eb9819624a64994e8166d62c8bc36e267c417d042c7c7cb1ea86099b70eaab98a712defb1976e988292e313861baf431531580cb1c1c4e61f367f0f2f9e8f579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc32294b88645d4b96384d33e86eeb6b
SHA193b698292a2fc19fc61d39d949c8a12cccd1f005
SHA256a4df1750c04f474338efbd2691e75b489fb7c1f67a133dec29b41fd70108f9d2
SHA512a2d0bfc3ec6fae1a2c362895fa4795aa1ff2cbc3253ae9f53d884c9376a582b964074913d42fdde6039cd1042f849accdd145afb19a4d58df1ae0efc319fd19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54710f7add25fd7750b88bdebdda030f5
SHA18db2c323c5a4813bab18c966d119e5768c23f437
SHA256423083238431b3b0e9b9199312d5d8467184000b9b31ab66e1fa5a6735dacb2e
SHA51231eec0b1e3883e1ce4cee6e8e8926c57ee13dbeaabb50789f73b2c8209371d30e7833c8353d53d7eb0f3ca94a3729ec1660f221d7f29fe46d55a7e5b35c41154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4002c4c091d111bbe35db106b3f6b1
SHA19ef9d65a42ee25b369c2822dd81e2ab599666fae
SHA2562af9d5f943cb597b63a63deb55dc9887f7a4ad3fc3bcb082291ac73ae53189cf
SHA512a0daa9f39f82beab7423627cfc862cf156a88b789736fd798fe8509ba7de62d95d7adec44ace2544b923d94b8f7c949babbab33b29bfbb34f3eb2484530b19e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca34cfa8c744fea0cecf9e9255f8e285
SHA157cdc2cdafac67c0e13047fb27a5615d9d6de2e6
SHA2563a0cb4012f1d0c7378ec725df5f1514c0b2f125be026f703c0f28e3e276a4d05
SHA5125c91ec67f318fb081d99db77e2dd7be42b6631d17f2c0891372b15e9d03535fc0402058953dd145cb3a440582f7c467ff8d0e8058785b07452f300b755ed8f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c459a57d9f9dbea16f58af9767b987
SHA18dacf9f48a14fef0247416d3c045ae6d15a44546
SHA2569fbb2eeb3876cda86cadaa9cd268f190d8fe347cd93c63b3ff9f475767ea458a
SHA51271eee4b03dde1e99db111f7f94828c0fbab43c1a7940cc68ad9dc1824be0a1b492d9f1949a6ca372b1dbd50fa098cf0c5e4ca88c3ff5e4741fd3db9d96b73f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9796e28e45465f47642c703a61c97b5
SHA129258fdc073b4f6176174c0d40c3e00ba2f5b613
SHA2565f7be9ec2ca305ea148ea57174fdd351edcc843223f6d4189f2cbd0e4a8767b1
SHA5129ee58bb9c6c9fe58d58140762750faf6e966da6132c10ebb302f460aa7d62ac935d819c724b5b01668fef10568eb8285a0638ef5ad39ae0984a23416287d2f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb7fc80382af431f4f5d6233ebfe328
SHA1c480a412360fe7f9422adb9ea7cd7e8415935f28
SHA25646543b7d5b30c318a0a32d984b014f8edc4ed186b16f558943ee24bdc9a702ba
SHA512b0ac94083ea1ba9f7d4565e36b2fd8778bad43cfb11674ea67ece6a0d249a09dd0a4eb09710bc59a0fca91bdd914b9973f3debf4cd388efdcb8a5484bb0334fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d57532df416d14adf2e51d26aee97a2
SHA1f2288a19ede2e9ed73933f7d97b6f18bf23f24d4
SHA256643db07cf3b73f6fe7e774a19057810c69cbbd5a62fe5efbd0b95e3d6d40855e
SHA512192a23948895eb1ea726a54d948e2af9b0ecfe59329bcbd4a1ee07b8197f6b9f97cdbf0cb9ccd4f197f186fc3e7167de6998de6f10ce1fb31f1b8b3cf7caaf26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b315566c2a43f1c9a115a5332503c48
SHA15a1385f48f16dea69a13740e518f96fe5db81cf8
SHA25655482c80f77e95b8838acb6a139b5095873509c2655490badfbf730598ac61a0
SHA512dbe2c98b369abef0a48dadadbcf5a090809d6705462e9f2862eb455b8b6f2333da330565ab0080ffbf8abd6fe40af99485437534e612f2f4b7c6d05a1d2d02b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD528bce964c7dd816a4f4b4316a39a1b70
SHA1237fadc92fac0d5d2d41d2779022c8505e986a0d
SHA2568374f59595f9f6ce958f7e9a287bf666f2c2ba705476c43bb53d0c4763e77f09
SHA5125f8511ccc2b65bc37af031e3fe2ce10e3d80a9a7bfab1d49df17472768578ba3237e43d08270bb43c4f8bc120cce59c33f3821c518523c262a4c5642d40d5a39
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
604KB
MD56f7abbc706baecf6e86cde729475dc7d
SHA100a55e2ae828f928770fdd1c59da361198fba382
SHA25685e3772d5502b9f5251843b3884788ab6c4d44af761900c787d36e1d5586244c
SHA51270b80ff7efeac45dc3cbaeb5b5a3b4f774dd3f61c08801fe43c5a086e8372ba199ea9f676ab3ceb9dd4d5332ebd5db79616460496632da831a51b21753f61092
-
Filesize
4KB
MD5307074acffa41e69ae7449338accbac4
SHA1d880915f78361db3b15ff18b0d3239a5d2a6a997
SHA256a5d3ed693c85298bd8f1c116bb16f78e032364143c76da2e22b3d0de29182380
SHA512aba5ffe7ec7342ba381927d3ff995f339b1837faab30e0fe48ed38b2da636b4e38b969a23c1c87271e54862522098775cb2f695c22a42b7a81d7f4e88fefa426