Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe
Resource
win10v2004-20240802-en
General
-
Target
a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe
-
Size
371KB
-
MD5
87d5535c6d94bef127f82f5fff6497bd
-
SHA1
a83ec32dfb1c590ebfd6e3233d81a0f3cbac0994
-
SHA256
a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0
-
SHA512
f37502876aaeaeb7b3e2e842485e7e00c6fcf5206824548970ec011a40f7303d8e48898069f36376dc92165f0652d4d890cc55cf46200af6191dc9598323bf65
-
SSDEEP
768:CU41Hv11ZX47nelShWFhdEod+QZnpLtx+:81HBoClShWFhdl+QdjQ
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (7584) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\Documents\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\Downloads\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\Videos\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Links\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\Pictures\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Music\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Documents\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Searches\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\Desktop\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Videos\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\Libraries\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Users\Public\Music\desktop.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_selectlist_checkmark_18.svg a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\ui-strings.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\ui-strings.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\ui-strings.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\mr.pak a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-140.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\vi.pak a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\cmm\CIEXYZ.pf a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\1033\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTest-ppd.xrm-ms a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\rhp_world_icon_hover_2x.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\sign-in-2x.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\example_icons.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\RHP_icons_2x.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nb-no\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\icudtl.dat a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ru-ru\ui-strings.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\dd_arrow_small.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sk-sk\ui-strings.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hr-hr\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sk-sk\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\uk-ua\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hr-hr\ui-strings.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-ae\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root.xrm-ms a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_MAK-ul-oob.xrm-ms a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\DRUMROLL.WAV a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\AddressBook.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_reminders_18.svg a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-ae\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files\VideoLAN\VLC\locale\da\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Grace-ul-oob.xrm-ms a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OneNote\prnSendToOneNote.cat a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ru-ru\ui-strings.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\manifest.json a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\THMBNAIL.PNG a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub_eula.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\hi.pak a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_Subscription-pl.xrm-ms a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\AddressBook2x.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sv-se\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ar-ae\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\de-de\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ja-jp\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\Excluded.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer2019_eula.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\Entities.DATA a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Grace-ppd.xrm-ms a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\vlc.mo a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\warning_2x.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\CONTI.txt a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\pa.pak a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\plugin.js a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-140.png a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3996 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 84 PID 3972 wrote to memory of 3996 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 84 PID 3972 wrote to memory of 3996 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 84 PID 3972 wrote to memory of 3808 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 86 PID 3972 wrote to memory of 3808 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 86 PID 3972 wrote to memory of 3808 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 86 PID 3972 wrote to memory of 3036 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 88 PID 3972 wrote to memory of 3036 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 88 PID 3972 wrote to memory of 3036 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 88 PID 3972 wrote to memory of 3160 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 90 PID 3972 wrote to memory of 3160 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 90 PID 3972 wrote to memory of 3160 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 90 PID 3972 wrote to memory of 3104 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 92 PID 3972 wrote to memory of 3104 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 92 PID 3972 wrote to memory of 3104 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 92 PID 3972 wrote to memory of 3512 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 95 PID 3972 wrote to memory of 3512 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 95 PID 3972 wrote to memory of 3512 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 95 PID 3972 wrote to memory of 336 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 97 PID 3972 wrote to memory of 336 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 97 PID 3972 wrote to memory of 336 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 97 PID 3972 wrote to memory of 4956 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 99 PID 3972 wrote to memory of 4956 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 99 PID 3972 wrote to memory of 4956 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 99 PID 3972 wrote to memory of 4404 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 101 PID 3972 wrote to memory of 4404 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 101 PID 3972 wrote to memory of 4404 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 101 PID 3972 wrote to memory of 5044 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 103 PID 3972 wrote to memory of 5044 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 103 PID 3972 wrote to memory of 5044 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 103 PID 3972 wrote to memory of 1748 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 106 PID 3972 wrote to memory of 1748 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 106 PID 3972 wrote to memory of 1748 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 106 PID 3972 wrote to memory of 4088 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 108 PID 3972 wrote to memory of 4088 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 108 PID 3972 wrote to memory of 4088 3972 a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe"C:\Users\Admin\AppData\Local\Temp\a345d470738a428a10bf15194748beaa5627c75692d66d1016a01d30bc1cd5c0.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=c: /on=c: /maxsize=1MB2⤵
- System Location Discovery: System Language Discovery
PID:3996
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded2⤵
- System Location Discovery: System Language Discovery
PID:3808
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=d: /on=d: /maxsize=1MB2⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded2⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=1MB2⤵
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded2⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=1MB2⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded2⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=1MB2⤵
- System Location Discovery: System Language Discovery
PID:4404
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded2⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=1MB2⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin Delete Shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
PID:4088
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5306995d320c5ecaac50548a5ecea7e93
SHA18e07180d87e8241ccc0a256c09c18a5268742664
SHA2565f048a86adfb08eb5edded7c8592cdc3aad8e50cdf3fe11d3790b5ab1311afee
SHA512f5055877ccda5e0f8dd6e58f39e3ad9aaff4555cab788d72e483e87324bee2985f3defb24fd8e1be8dbd9747be8792f2d8172e946755123b03a270e8d4ea028d