Overview
overview
10Static
static
7BitchTits ...P].exe
windows7-x64
7WannaFartCry.exe
windows7-x64
3Wannashiturself.exe
windows7-x64
10big FAT ti...RE.exe
windows7-x64
10big fat se...re.exe
windows7-x64
1bitch man ...re.exe
windows7-x64
8bro what t...at.dll
windows7-x64
7cocksucker...L].exe
windows7-x64
7fart poopy...re.exe
windows7-x64
7fart weewe...re.exe
windows7-x64
10farting po...re.exe
windows7-x64
10farty poo ...re.exe
windows7-x64
10fuck you.exe
windows7-x64
7large peni...24.exe
windows7-x64
niggaware ...29.exe
windows7-x64
10pee poo pi...re.exe
windows7-x64
10retard ransomware.exe
windows7-x64
1Analysis
-
max time kernel
1800s -
max time network
1559s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 14:23
Behavioral task
behavioral1
Sample
BitchTits Ransomware [VIP].exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WannaFartCry.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
Wannashiturself.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
big FAT tits RANSOMWARE.exe
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
big fat sexy dildo poop ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
bitch man ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
bro what the fuckkk ur seriously beliving that.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
cocksucker ransomware [COOL].exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
fart poopy ransowmare.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
fart weewee ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
farting poop sex ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
farty poo poo ransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
fuck you.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
large penis ransomware 2024.exe
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
niggaware ransomware in 2029.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
pee poo piss piss ransomware rare.exe
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
retard ransomware.exe
Resource
win7-20240705-en
General
-
Target
farty poo poo ransomware.exe
-
Size
218KB
-
MD5
9b20e48b731d1a78ffce07e1b4dfb7c0
-
SHA1
031e4932fc6da1cabde7735280b09b897719ba29
-
SHA256
f4b60e17e83f037c811ee111e21964cd772a817186324987fe5033420233ec43
-
SHA512
e59ecaf97a277aa46af7f027a5f9806b2c42a8b9555eb2db1475c25bccc50fb46621727ee2ba98590da3c2cff424557e0dd0803551a6dc8a399470cae5b56b8c
-
SSDEEP
3072:knUdM17tCgrmcEwBnJWJ9IHfYCeNpD/cgjj9w7BT0cfWjE39mbo:kl9tCMmFGJWgHfYpDkgjeJWjuIb
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (319) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 5 IoCs
Processes:
farty poo poo ransomware.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta farty poo poo ransomware.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\farty poo poo ransomware.exe farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini farty poo poo ransomware.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
farty poo poo ransomware.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\farty poo poo ransomware.exe = "C:\\Windows\\System32\\farty poo poo ransomware.exe" farty poo poo ransomware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" farty poo poo ransomware.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" farty poo poo ransomware.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
farty poo poo ransomware.exedescription ioc process File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini farty poo poo ransomware.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3WOHY2HJ\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4QLC8FPK\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Links\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini farty poo poo ransomware.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Desktop\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AWH2H80Y\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Videos\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Libraries\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Videos\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6089GTH\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Documents\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Documents\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\G2KVEH0D\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Downloads\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\72EHROQQ\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\7JXML4U5\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files\desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Music\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Music\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Public\Pictures\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini farty poo poo ransomware.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini farty poo poo ransomware.exe -
Drops file in System32 directory 2 IoCs
Processes:
farty poo poo ransomware.exedescription ioc process File created C:\Windows\System32\farty poo poo ransomware.exe farty poo poo ransomware.exe File created C:\Windows\System32\Info.hta farty poo poo ransomware.exe -
Drops file in Program Files directory 64 IoCs
Processes:
farty poo poo ransomware.exedescription ioc process File created C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.ja_5.5.0.165303.jar farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21340_.GIF farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENV11.POC.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Port-au-Prince.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files\Java\jre7\lib\zi\WET.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\libfreetype_plugin.dll.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSTORYVERT.XML farty poo poo ransomware.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.lnk farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART4.BDR farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveResume.dotx.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\QuizShow.potx.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00382_.WMF farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.INF farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14870_.GIF farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14997_.GIF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_win7.css.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckg.dll.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\BG_ADOBE.GIF farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Taipei farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00603_.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\msdfmap.dll farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0336075.WMF farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21480_.GIF farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01875_.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0098497.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240157.WMF farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01701_.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\zh-CN.pak.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\RMNSQUE.ELM.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_ON.GIF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238927.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe farty poo poo ransomware.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Fortaleza.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\MediaReceiverRegistrar.xml farty poo poo ransomware.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\gadget.xml farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench3_0.12.0.v20140227-2118.jar.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105348.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Karachi.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Xml.Linq.Resources.dll farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Details.accdt.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\startNetworkServer.bat farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0205466.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\COUPON.POC farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.TH.XML.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR15F.GIF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.p2.ui.overridden_5.5.0.165303.jar.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_zh_4.4.0.v20140623020002.jar.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02291U.BMP.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.GIF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00629_.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\15.png farty poo poo ransomware.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libedummy_plugin.dll.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libts_plugin.dll.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0222021.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CSS7DATA000C.DLL farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00306_.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jre7\lib\management\management.properties.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+2.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0301432.WMF.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKREQS.ICO.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_en.dll farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7ES.DLL.id-3F60CAD0.[[email protected]].bot farty poo poo ransomware.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_rest.png farty poo poo ransomware.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2552 vssadmin.exe 4880 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
farty poo poo ransomware.exepid process 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe 2152 farty poo poo ransomware.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2620 vssvc.exe Token: SeRestorePrivilege 2620 vssvc.exe Token: SeAuditPrivilege 2620 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
farty poo poo ransomware.execmd.execmd.exedescription pid process target process PID 2152 wrote to memory of 2752 2152 farty poo poo ransomware.exe cmd.exe PID 2152 wrote to memory of 2752 2152 farty poo poo ransomware.exe cmd.exe PID 2152 wrote to memory of 2752 2152 farty poo poo ransomware.exe cmd.exe PID 2152 wrote to memory of 2752 2152 farty poo poo ransomware.exe cmd.exe PID 2752 wrote to memory of 2800 2752 cmd.exe mode.com PID 2752 wrote to memory of 2800 2752 cmd.exe mode.com PID 2752 wrote to memory of 2800 2752 cmd.exe mode.com PID 2752 wrote to memory of 2552 2752 cmd.exe vssadmin.exe PID 2752 wrote to memory of 2552 2752 cmd.exe vssadmin.exe PID 2752 wrote to memory of 2552 2752 cmd.exe vssadmin.exe PID 2152 wrote to memory of 2128 2152 farty poo poo ransomware.exe cmd.exe PID 2152 wrote to memory of 2128 2152 farty poo poo ransomware.exe cmd.exe PID 2152 wrote to memory of 2128 2152 farty poo poo ransomware.exe cmd.exe PID 2152 wrote to memory of 2128 2152 farty poo poo ransomware.exe cmd.exe PID 2128 wrote to memory of 4852 2128 cmd.exe mode.com PID 2128 wrote to memory of 4852 2128 cmd.exe mode.com PID 2128 wrote to memory of 4852 2128 cmd.exe mode.com PID 2128 wrote to memory of 4880 2128 cmd.exe vssadmin.exe PID 2128 wrote to memory of 4880 2128 cmd.exe vssadmin.exe PID 2128 wrote to memory of 4880 2128 cmd.exe vssadmin.exe PID 2152 wrote to memory of 1044 2152 farty poo poo ransomware.exe mshta.exe PID 2152 wrote to memory of 1044 2152 farty poo poo ransomware.exe mshta.exe PID 2152 wrote to memory of 1044 2152 farty poo poo ransomware.exe mshta.exe PID 2152 wrote to memory of 1044 2152 farty poo poo ransomware.exe mshta.exe PID 2152 wrote to memory of 2420 2152 farty poo poo ransomware.exe mshta.exe PID 2152 wrote to memory of 2420 2152 farty poo poo ransomware.exe mshta.exe PID 2152 wrote to memory of 2420 2152 farty poo poo ransomware.exe mshta.exe PID 2152 wrote to memory of 2420 2152 farty poo poo ransomware.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\farty poo poo ransomware.exe"C:\Users\Admin\AppData\Local\Temp\farty poo poo ransomware.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2800
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2552
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:4852
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4880
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:1044
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:2420
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\osetup.dll.id-3F60CAD0.[[email protected]].bot
Filesize6.3MB
MD5772255f9dd93002dba0057ee54e24f50
SHA182b42c5b4c603ed3d38625cb669cd697235034b3
SHA256d2f924b27142a68ee49877c9d69c70b3dbe2a8a08a707fe91d25d4bc569f7370
SHA51281ed6c8de17d07a35596214a82c9402f740cc27d6098c22f6f2d31793be613120b551be4e95848a5f7e00c71e9fd3a16c05a7f650cd4ed21dc29d92eaa21ce2c
-
Filesize
13KB
MD5fafbc9ba20cd58e3a6a42d1679bddb98
SHA1dd8715bf4bf961f3b253342c596aa3259879b983
SHA256e43f49ad91586cfc213d455269cab608fb8e48bf54d2639038a634240d1088c6
SHA5123dd32dd222796dccb0709cd26768e8422763d5531c86332d7b83b4c7f5bcea267ac6ac7f38639252f85d6ea4f950ba4215d5b989937ff09131aff20a58a72ffe