Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe
Resource
win10v2004-20240802-en
General
-
Target
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe
-
Size
490KB
-
MD5
d79d62b3a46352658a50a1cda9232e5c
-
SHA1
3e4fbc8d507212adb853db29b9568312984b9dec
-
SHA256
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d
-
SHA512
9bd94b48885de0e8f33a1cbc7bc6342cc29cca311c55accffbc5007a93797f4581d7d8ce13487a3b7859cac9e66ab89ff6cfd03a24dfdf720be995b31a9aeda5
-
SSDEEP
3072:0jdKwyQ5akrwYqt3zJHfzypOH+xzVXpVHkK4jzeTCxaB:2dKwy76Jqt3zJWPzTBOzeOa
Malware Config
Extracted
C:\ProgramData\readme.txt
conti
http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/CRYw7aW6XKQVmbX2DmsLsHyLJJifiT4XLWmSv3Eo5V4pwDkcy6JhL2Y6T2pWXY5g
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (7249) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
Processes:
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
Processes:
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exedescription ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\Music\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Links\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\Downloads\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\Pictures\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\Libraries\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\Videos\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Music\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Searches\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Videos\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Documents\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Public\Documents\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe -
Drops file in Program Files directory 64 IoCs
Processes:
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exedescription ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\tr.pak.DATA aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sk-sk\ui-strings.js aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-fr\ui-strings.js aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\circle_2x.png aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTrial-pl.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TEXTCONV\WPFT632.CNV aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\manifest.json.DATA aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-pl.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MyriadPro-Regular.otf aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons_retina.png aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\root\ui-strings.js aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\dd_arrow_small2x.png aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-ul-oob.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-pl.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\buttons.png aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\PlayStore_icon.svg aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\bun.png aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ul.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_organize_18.svg aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\en_get.svg aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ca-es\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\en-gb\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Retail-ul-phn.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\bwclassic.dotx aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\es-419.pak aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\js\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\pl_get.svg aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Trial-ul-oob.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\thaidict.md aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\IRIS\IRIS.INF aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessDemoR_BypassTrial365-ul-oob.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial-ul-oob.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\ui-strings.js aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\pt-br\ui-strings.js aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\rhp_world_icon_hover.png aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-ppd.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-oob.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPackEula.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-fr\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\reflow.api aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\css\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\de-de\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sv-se\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\readme.txt aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_KMS_ClientC2R-ppd.xrm-ms aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_200_percent.pak aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_download_18.svg aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\ui-strings.js aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\example_icons2x.png aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exepid Process 1028 aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe 1028 aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
vssvc.exeWMIC.exedescription pid Process Token: SeBackupPrivilege 4848 vssvc.exe Token: SeRestorePrivilege 4848 vssvc.exe Token: SeAuditPrivilege 4848 vssvc.exe Token: SeIncreaseQuotaPrivilege 4880 WMIC.exe Token: SeSecurityPrivilege 4880 WMIC.exe Token: SeTakeOwnershipPrivilege 4880 WMIC.exe Token: SeLoadDriverPrivilege 4880 WMIC.exe Token: SeSystemProfilePrivilege 4880 WMIC.exe Token: SeSystemtimePrivilege 4880 WMIC.exe Token: SeProfSingleProcessPrivilege 4880 WMIC.exe Token: SeIncBasePriorityPrivilege 4880 WMIC.exe Token: SeCreatePagefilePrivilege 4880 WMIC.exe Token: SeBackupPrivilege 4880 WMIC.exe Token: SeRestorePrivilege 4880 WMIC.exe Token: SeShutdownPrivilege 4880 WMIC.exe Token: SeDebugPrivilege 4880 WMIC.exe Token: SeSystemEnvironmentPrivilege 4880 WMIC.exe Token: SeRemoteShutdownPrivilege 4880 WMIC.exe Token: SeUndockPrivilege 4880 WMIC.exe Token: SeManageVolumePrivilege 4880 WMIC.exe Token: 33 4880 WMIC.exe Token: 34 4880 WMIC.exe Token: 35 4880 WMIC.exe Token: 36 4880 WMIC.exe Token: SeIncreaseQuotaPrivilege 4880 WMIC.exe Token: SeSecurityPrivilege 4880 WMIC.exe Token: SeTakeOwnershipPrivilege 4880 WMIC.exe Token: SeLoadDriverPrivilege 4880 WMIC.exe Token: SeSystemProfilePrivilege 4880 WMIC.exe Token: SeSystemtimePrivilege 4880 WMIC.exe Token: SeProfSingleProcessPrivilege 4880 WMIC.exe Token: SeIncBasePriorityPrivilege 4880 WMIC.exe Token: SeCreatePagefilePrivilege 4880 WMIC.exe Token: SeBackupPrivilege 4880 WMIC.exe Token: SeRestorePrivilege 4880 WMIC.exe Token: SeShutdownPrivilege 4880 WMIC.exe Token: SeDebugPrivilege 4880 WMIC.exe Token: SeSystemEnvironmentPrivilege 4880 WMIC.exe Token: SeRemoteShutdownPrivilege 4880 WMIC.exe Token: SeUndockPrivilege 4880 WMIC.exe Token: SeManageVolumePrivilege 4880 WMIC.exe Token: 33 4880 WMIC.exe Token: 34 4880 WMIC.exe Token: 35 4880 WMIC.exe Token: 36 4880 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.execmd.exedescription pid Process procid_target PID 1028 wrote to memory of 1008 1028 aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe 86 PID 1028 wrote to memory of 1008 1028 aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe 86 PID 1008 wrote to memory of 4880 1008 cmd.exe 88 PID 1008 wrote to memory of 4880 1008 cmd.exe 88 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe"C:\Users\Admin\AppData\Local\Temp\aaf5c46e16d86bf91a5d733721c29ab69d8c53a1a38ae1038e8aedfc4d91f65d.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D82A54A3-E752-454E-9AEA-6788381260A1}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D82A54A3-E752-454E-9AEA-6788381260A1}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4848
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cd5bd2556f45ff81cdd6bb80c603254f
SHA16619f302809bb04d9b587bd6868a50485b6eb98b
SHA2565587545c8e5bf66f3c4b45bfd127a1f5487d93038233d86ffab2a4542cce66d7
SHA51214a972981d08cacef6aab37c766272f3ca24a3628046f7a18bc685264a7ec55d875f3b5494ebd49a2f50b8c14d1d230cc60003fac5e35fd13b5a6eb60a8ec050