Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
Resource
win10v2004-20240508-en
General
-
Target
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
-
Size
92KB
-
MD5
609d2e4eb7d20b36325a7802f271dc01
-
SHA1
469a568005cfafb8938cc7b16f365ab8f225978b
-
SHA256
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23
-
SHA512
26bf39e82253ee0511b3498efb320785ea39b6904d8fea73aa8fe81bd218774192f484c4b8e05e69b4c55176d566afca70d187c270347a8a13a0b0c9a019e72f
-
SSDEEP
1536:GBwl+KXpsqN5vlwWYyhZ9S4AB8Dsx7Zoygwff/WDb4hkUwqS06ky597:ww+asqN5aW/hS1Z2bDbCkUK0
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (515) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe = "C:\\Windows\\System32\\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe" 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Music\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Documents\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Videos\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Music\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Admin\Links\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Windows\System32\Info.hta 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\ui-strings.js.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.187.37\msedgeupdateres_iw.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\Microsoft.stdformat.dll 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Office16\ONENOTE.VisualElementsManifest.xml.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSmallTile.scale-150.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_KMS_ClientC2R-ul.xrm-ms 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-pl.xrm-ms 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeAppList.targetsize-16_altform-unplated.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\EnsoUI\id_arrow_black.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\LargeLogo.scale-100_contrast-black.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-125.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Exchange.scale-125.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\organize.svg 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\msvcr120.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Infragistics2.Win.UltraWinEditors.v11.1.dll 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-100.png.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Scientific.targetsize-20_contrast-white.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ul-oob.xrm-ms.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\apple-touch-icon-114x114-precomposed.png.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_cancel_18.svg.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-pl.xrm-ms.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.Excel.Extensions.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcroppadd_plugin.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\freebxml.md.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\COMPASS\THMBNAIL.PNG.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\complete.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\1033\VSTOInstallerUI.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\api-ms-win-crt-environment-l1-1-0.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNotePageMedTile.scale-100.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_sv.properties.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-40_altform-unplated.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\System.Windows.Controls.Ribbon.resources.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_zh_CN.properties.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\PingStop.emf.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeTile.scale-200_contrast-white.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-125_contrast-white.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-140.png.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Buffers.dll.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\IC_WelcomeBanner.scale-100.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ul-oob.xrm-ms.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\anevia_streams.luac.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-fr\ui-strings.js 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\wxpr.dll 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\ShapeCollector.exe.mui 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-32_altform-unplated.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeBadge.scale-150.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\custom.lua 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-pl.xrm-ms 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD.HXS 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GARABD.TTF 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\LiveTiles\avatar310x150.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\AppIcon.scale-125.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\osf\dropdownarrow_16x16x32.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-30_contrast-white.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_KMS_Client-ul-oob.xrm-ms.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Error_Box.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\8080_20x20x32.png 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Trial-ul-oob.xrm-ms.id-136CDBA5.[[email protected]].bip 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 748 vssadmin.exe 8056 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 5220 vssvc.exe Token: SeRestorePrivilege 5220 vssvc.exe Token: SeAuditPrivilege 5220 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4716 wrote to memory of 1928 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 82 PID 4716 wrote to memory of 1928 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 82 PID 1928 wrote to memory of 1652 1928 cmd.exe 84 PID 1928 wrote to memory of 1652 1928 cmd.exe 84 PID 1928 wrote to memory of 748 1928 cmd.exe 85 PID 1928 wrote to memory of 748 1928 cmd.exe 85 PID 4716 wrote to memory of 2644 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 92 PID 4716 wrote to memory of 2644 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 92 PID 4716 wrote to memory of 8224 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 94 PID 4716 wrote to memory of 8224 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 94 PID 2644 wrote to memory of 4468 2644 cmd.exe 95 PID 2644 wrote to memory of 4468 2644 cmd.exe 95 PID 4716 wrote to memory of 3268 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 96 PID 4716 wrote to memory of 3268 4716 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe 96 PID 2644 wrote to memory of 8056 2644 cmd.exe 97 PID 2644 wrote to memory of 8056 2644 cmd.exe 97 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe"C:\Users\Admin\AppData\Local\Temp\256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1652
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:748
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:4468
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:8056
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:8224
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:3268
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-136CDBA5.[[email protected]].bip
Filesize2.7MB
MD587a4b2905647abc1197537284e5b379a
SHA18b5671147dfaf7b32c6541a1c41f0078f9fe2509
SHA256e9a6d1dba798cf15b182bd84a977a6905160b81a20cbb86a2464f265090e4e81
SHA5124033c043beb56821328bb1c4e1391481c5d64e943de7aeceed346cdb092f109a76c519cf99b1dfb004f0f354175eb6b3ad6687d3da09a3e22c4ef77e9f9ee38a
-
Filesize
13KB
MD56e265871d2ca69547cb5d79dfcabf620
SHA10af6fb8065ed740d422f950cb544df852ab199b9
SHA2567bce3b6470db4f63b8c6a6d97bf035c26061567b5d285e862a4b208f3798d8bd
SHA512366755451e4243095696e34547a748b918144e4a95bd4a89ed26de9733b5f6bc8c698933047fdd7919252175bb587a88a30eaeb6d49dad9ffb52e5cf2a7d824c