Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 01:40
Behavioral task
behavioral1
Sample
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe
Resource
win10v2004-20240611-en
General
-
Target
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe
-
Size
70KB
-
MD5
bdf4fc15d73d750fb764b52da65d6ab4
-
SHA1
51aa0638430b6341498b65a877d1e0940064f1fc
-
SHA256
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674
-
SHA512
74b3c5f641b289236189bb38871c1e3962f70a172d1e52dedcf020fe8b843ca9f7ec3591726869fafa12745b61349c8b4807c46c3e6c00b26d9596efbf0d7a29
-
SSDEEP
1536:eclu3E0ty5RM6Esc4m6cq1ZebmaL4UnpCdsfV1YADir+6S:ju3NURAscOx7wpCKznz
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detects win.dharma. 2 IoCs
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x000000000041D000-memory.dmp win_dharma_auto behavioral1/memory/2872-14975-0x0000000000400000-0x000000000041D000-memory.dmp win_dharma_auto -
Identifies DHARMA ransomware 7 IoCs
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x000000000041D000-memory.dmp Windows_Ransomware_Dharma_aa5eefed behavioral1/memory/2872-0-0x0000000000400000-0x000000000041D000-memory.dmp Windows_Ransomware_Dharma_e9319e4a behavioral1/memory/2872-0-0x0000000000400000-0x000000000041D000-memory.dmp Windows_Ransomware_Dharma_942142e3 behavioral1/memory/2872-14975-0x0000000000400000-0x000000000041D000-memory.dmp Windows_Ransomware_Dharma_aa5eefed behavioral1/memory/2872-14975-0x0000000000400000-0x000000000041D000-memory.dmp Windows_Ransomware_Dharma_b31cac3f behavioral1/memory/2872-14975-0x0000000000400000-0x000000000041D000-memory.dmp Windows_Ransomware_Dharma_e9319e4a behavioral1/memory/2872-14975-0x0000000000400000-0x000000000041D000-memory.dmp Windows_Ransomware_Dharma_942142e3 -
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/2872-14975-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2872-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2872-14975-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe = "C:\\Windows\\System32\\b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe" b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EV5BZRHD\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Searches\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8IDPN71V\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\44A7T1ZV\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JS013387\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TWZ7D8HC\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Documents\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Links\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QUME4WCA\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Desktop\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Libraries\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Videos\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Documents\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Pictures\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\7SR48CNP\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\Music\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ETDEICXK\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Downloads\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Windows\System32\Info.hta b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\OFFRHD.DLL.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCDRESPS.ICO.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341742.JPG b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_pitch_plugin.dll.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.net_1.2.200.v20120807-0927.jar.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00392_.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.INF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GRAPH_COL.HXC.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Auto.jpg b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0195812.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\slideShow.css b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\epl-v10.html b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.dll.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ja_5.5.0.165303.jar.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\CircleIcons.jpg.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgradfun_plugin.dll b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_tr.dll.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0233070.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00965_.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\OutSelect.ico b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232795.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\Sidebar.exe.mui b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN02122_.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\WinFXList.xml b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.properties.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.util_1.7.0.v201011041433.jar b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\settings.html b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01146_.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Krasnoyarsk.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SHARING.CFG.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_it.properties.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-dialogs.xml b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.nl_ja_4.4.0.v20140623020002.jar b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\San_Juan.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0183174.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01164_.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.webapp.nl_ja_4.4.0.v20140623020002.jar.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105912.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Belem.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01839_.GIF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_thunderstorm.png b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\WSS_DocLib.ico b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01875_.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libaudio_format_plugin.dll b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GIFT98.POC.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-profiling_zh_CN.jar.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages.properties b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\bckgRes.dll.mui.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\tipresx.dll.mui b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\currency.html b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.docs_5.5.0.165303.jar.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287643.JPG b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00305_.WMF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.dll b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSRTEDIT.DLL.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR24F.GIF b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR3B.GIF.id-FEDCC67F.[[email protected]].boost b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2552 vssadmin.exe 3924 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2448 vssvc.exe Token: SeRestorePrivilege 2448 vssvc.exe Token: SeAuditPrivilege 2448 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2976 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 28 PID 2872 wrote to memory of 2976 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 28 PID 2872 wrote to memory of 2976 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 28 PID 2872 wrote to memory of 2976 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 28 PID 2976 wrote to memory of 2676 2976 cmd.exe 30 PID 2976 wrote to memory of 2676 2976 cmd.exe 30 PID 2976 wrote to memory of 2676 2976 cmd.exe 30 PID 2976 wrote to memory of 2552 2976 cmd.exe 31 PID 2976 wrote to memory of 2552 2976 cmd.exe 31 PID 2976 wrote to memory of 2552 2976 cmd.exe 31 PID 2872 wrote to memory of 3624 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 35 PID 2872 wrote to memory of 3624 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 35 PID 2872 wrote to memory of 3624 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 35 PID 2872 wrote to memory of 3624 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 35 PID 3624 wrote to memory of 2104 3624 cmd.exe 37 PID 3624 wrote to memory of 2104 3624 cmd.exe 37 PID 3624 wrote to memory of 2104 3624 cmd.exe 37 PID 3624 wrote to memory of 3924 3624 cmd.exe 38 PID 3624 wrote to memory of 3924 3624 cmd.exe 38 PID 3624 wrote to memory of 3924 3624 cmd.exe 38 PID 2872 wrote to memory of 3304 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 39 PID 2872 wrote to memory of 3304 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 39 PID 2872 wrote to memory of 3304 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 39 PID 2872 wrote to memory of 3304 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 39 PID 2872 wrote to memory of 1688 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 40 PID 2872 wrote to memory of 1688 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 40 PID 2872 wrote to memory of 1688 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 40 PID 2872 wrote to memory of 1688 2872 b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe"C:\Users\Admin\AppData\Local\Temp\b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2676
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2552
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2104
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3924
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:3304
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:1688
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.id-FEDCC67F.[[email protected]].boost
Filesize24.4MB
MD5e646f05e4a4863cc708e60c049abfaee
SHA1d92ef473ad9af40132001e70799ca63cd34b0309
SHA256106a11e628639fc5dc16bca18dfdda198044db6e488361a651cb57f94f1360f4
SHA512d959923695fef798ebf3219942b6beb91583af5fbb38d2d17aaa65e0b04491c8385beac8a99ddc02f2a0cbf294618d25649ffb59355c2029e40e0f3fdf38eb95
-
Filesize
13KB
MD51ed8283ad707650d29ddf4541dcd19b6
SHA17be409ad6a3a090c77dae369a79bb55bf69507b9
SHA25606c039b6a5c54d2b5bfc89d187f89f31b8d1119000d79727dd714b226cefa937
SHA5123743823508766396a0904fb07b92d19ac7a054280f5f47cc27f9f781232b8f7050c7a308ad9978d43d338201d4853d16ebd9223c89cb1e5971fd24180519fd8f