Overview
overview
10Static
static
7066d06ca00...81.exe
windows7-x64
1006d6f22d02...bc.exe
windows7-x64
809f1d49065...d1.exe
windows7-x64
10208cca124d...45.exe
windows7-x64
10241f67ece2...79.exe
windows7-x64
130616f6c48...60.exe
windows7-x64
1044f28cd6ea...7e.exe
windows7-x64
34b190a407b...5f.exe
windows7-x64
1072ddceebe7...6b.exe
windows7-x64
97b53a00b3a...b2.exe
windows7-x64
77cf39ebb44...57.exe
windows7-x64
108c42a08427...51.exe
windows7-x64
79d081b734c...91.exe
windows7-x64
4b25cc31472...15.exe
windows7-x64
10b2ec72de35...8f.exe
windows7-x64
6b4c2ffccfe...dd.exe
windows7-x64
5bab7af3306...be.exe
windows7-x64
9c531015ec0...86.exe
windows7-x64
8dc7ab2e7ed...60.exe
windows7-x64
8debfd1fb34...d8.exe
windows7-x64
8df36e2aaae...37.exe
windows7-x64
9df99316e57...27.exe
windows7-x64
4e60fc4473a...60.exe
windows7-x64
10Analysis
-
max time kernel
837s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 19:27
Behavioral task
behavioral1
Sample
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06d6f22d02443afd6d6880ead6648ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
09f1d49065108a595578ff86ff63a514d47d5496ab5c23f38cda1f0d57dd6cd1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
208cca124ddafe35a122f6bdd36191151a2730b4e1051804d5f68d0cb4b44145.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
241f67ece26c9e6047bb1a9fc60bf7c45a23ea1a2bb08a1617a385c71d008d79.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
30616f6c488fa16ccdcbfd6273e7ac8604c82bc1468fc1a70b2a43661b674760.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b190a407bca89dd4778afa551bdc58dddff26fc5fe7622453e836ecdfaf565f.exe
Resource
win7-20240729-en
Behavioral task
behavioral9
Sample
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7b53a00b3a8859755f6144cb2149673fa17fdd6e439cbfdee21a7a513e6395b2.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
8c42a084278ff8e25f7ee765c37da84da02780da725505108f9eb39cfb05c051.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
9d081b734c595a1ae38e254369c0060c5870ee119c9f7853989c23ebc204a291.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
b2ec72de3543060f0f3af322c4f1caf2d65fa8ff56b5a93a5e8fa59c191d178f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
c531015ec09adf346131a375df9b9d04c90657fac9b80f2b1e269dae6186de86.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
dc7ab2e7ed26554a11da51a184e95b01e685b1a2f99c7fc77d54d5966530bf60.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
df36e2aaae85f07851810a829e38a82827252fda15d4c4410da085d59ce38737.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
df99316e57002298d88be785acad4c3a900cbc5e04a29e32d4549f25f08a7527.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60.exe
Resource
win7-20241010-en
General
-
Target
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe
-
Size
268KB
-
MD5
4e2b58f99ad9f13c2b09f0741739775d
-
SHA1
6a51d0cd9ea189babad031864217ddd3a7ddba84
-
SHA256
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b
-
SHA512
dd74f94fbe6324410e832ab22b2807bbc5bc4171704477898a2b64a1ce6a7b3a289a4fb399412152b33a6b286e439c8d89eca4d5cba7bcd65dcb864e18487ebd
-
SSDEEP
3072:gfLB0w+Wv5pa/Dc/nuOL23e8aoeE+aqfnfj59AEYfzaBUGm+0lh831QPfrwV6cFK:+TgenuOLCL+559AEq+m+jmEIcFaNtN
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8633) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations 1 TTPs 4 IoCs
Remove evidence of malicious network connections to clean up operations traces.
Processes:
reg.exereg.exereg.exereg.exepid process 2928 reg.exe 2856 reg.exe 2568 reg.exe 2000 reg.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1484 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CertificatesCheck = "C:\\Users\\Public\\72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe" 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe -
Drops desktop.ini file(s) 38 IoCs
Processes:
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exedescription ioc process File opened for modification C:\Users\Public\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Music\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Videos\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Public\Documents\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Music\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Users\Admin\Links\desktop.ini 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exedescription pid process target process PID 2656 set thread context of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Opulent.thmx 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185670.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Windhoek 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-sampler.xml 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnPPT.dll 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLINTL32.DLL 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.jsp.jasper.registry_1.0.300.v20130327-1442.jar 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Beirut 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\button-highlight.png 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\TAB_ON.GIF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GREETING.DPV 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090089.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178460.JPG 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_ja_4.4.0.v20140623020002.jar 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui_3.106.0.v20140812-1751.jar 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\RECOVER-FILES.html 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\vlc.mo 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jerusalem 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Adak 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPOlive.png 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\vlm_cmd.xml 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Traditional.dotx 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00452_.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00898_.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-10 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_zh_CN.jar 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.zh_CN_5.5.0.165303.jar 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\InfoPathWelcomeImage.jpg 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00669_.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwinhibit_plugin.dll 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsBlankPage.html 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\spacebackupicons.jpg 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00391_.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository_1.1.300.v20131211-1531.jar 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Form.zip 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21314_.GIF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Easter 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\IconImages.jpg 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\SPLASH.WAV 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\RECOVER-FILES.html 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0278882.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02158_.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086426.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\RECOVER-FILES.html 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\lib\accessibility.properties 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactHighMask.bmp 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.properties 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui.zh_CN_5.5.0.165303.jar 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LOGO98.POC 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\BG_ADOBE.GIF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange.css 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198234.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02062U.BMP 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Krasnoyarsk 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSEvents.man 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Windows Journal\de-DE\MSPVWCTL.DLL.mui 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.hsp 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\TAB_ON.GIF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01629_.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0300862.WMF 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\RECOVER-FILES.html 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_ko.properties 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\bundles.info 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vssadmin.exeattrib.exereg.exe72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.execmd.exereg.exeattrib.exereg.exereg.execmd.exereg.exe72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.execmd.exevssadmin.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1984 vssadmin.exe 2500 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exepid process 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2980 vssvc.exe Token: SeRestorePrivilege 2980 vssvc.exe Token: SeAuditPrivilege 2980 vssvc.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.execmd.execmd.exedescription pid process target process PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2656 wrote to memory of 2484 2656 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe PID 2484 wrote to memory of 2060 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 2060 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 2060 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 2060 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2060 wrote to memory of 2500 2060 cmd.exe vssadmin.exe PID 2060 wrote to memory of 2500 2060 cmd.exe vssadmin.exe PID 2060 wrote to memory of 2500 2060 cmd.exe vssadmin.exe PID 2060 wrote to memory of 2500 2060 cmd.exe vssadmin.exe PID 2060 wrote to memory of 2856 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2856 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2856 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2856 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2568 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2568 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2568 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2568 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2584 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2584 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2584 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2584 2060 cmd.exe reg.exe PID 2060 wrote to memory of 2636 2060 cmd.exe attrib.exe PID 2060 wrote to memory of 2636 2060 cmd.exe attrib.exe PID 2060 wrote to memory of 2636 2060 cmd.exe attrib.exe PID 2060 wrote to memory of 2636 2060 cmd.exe attrib.exe PID 2484 wrote to memory of 620 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 620 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 620 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 620 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 1484 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 1484 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 1484 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 2484 wrote to memory of 1484 2484 72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe cmd.exe PID 620 wrote to memory of 1984 620 cmd.exe vssadmin.exe PID 620 wrote to memory of 1984 620 cmd.exe vssadmin.exe PID 620 wrote to memory of 1984 620 cmd.exe vssadmin.exe PID 620 wrote to memory of 1984 620 cmd.exe vssadmin.exe PID 620 wrote to memory of 2000 620 cmd.exe reg.exe PID 620 wrote to memory of 2000 620 cmd.exe reg.exe PID 620 wrote to memory of 2000 620 cmd.exe reg.exe PID 620 wrote to memory of 2000 620 cmd.exe reg.exe PID 620 wrote to memory of 2928 620 cmd.exe reg.exe PID 620 wrote to memory of 2928 620 cmd.exe reg.exe PID 620 wrote to memory of 2928 620 cmd.exe reg.exe PID 620 wrote to memory of 2928 620 cmd.exe reg.exe PID 620 wrote to memory of 1436 620 cmd.exe reg.exe PID 620 wrote to memory of 1436 620 cmd.exe reg.exe PID 620 wrote to memory of 1436 620 cmd.exe reg.exe PID 620 wrote to memory of 1436 620 cmd.exe reg.exe PID 620 wrote to memory of 1908 620 cmd.exe attrib.exe PID 620 wrote to memory of 1908 620 cmd.exe attrib.exe PID 620 wrote to memory of 1908 620 cmd.exe attrib.exe PID 620 wrote to memory of 1908 620 cmd.exe attrib.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2636 attrib.exe 1908 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe"C:\Users\Admin\AppData\Local\Temp\72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe"C:\Users\Admin\AppData\Local\Temp\72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe"2⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\__tF029.tmp.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2500
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f4⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f4⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"4⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\SysWOW64\attrib.exeattrib Default.rdp -s -h4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\__t24B1.tmp.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1984
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f4⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f4⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"4⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\attrib.exeattrib Default.rdp -s -h4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c .bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1484
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2980
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
3Clear Network Connection History and Configurations
1File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55be15a115fb4cac961088201343d8305
SHA190bc7467b7959d378622c71be9f00948f91c2c85
SHA256302d2be6c278204ae5091fbd17980826456641d94a031f01796d01fdf26008aa
SHA5129680b0fcb6d1cb68cce151bd545d24877caefd7a09d9fcc8a51ea8274ba67607bfa0c7ed8df12f99ce1e613509f8dd4caad135f33e2f6502c295579653599a06
-
Filesize
256B
MD5e0e7a234622905ee483a9a2ad7135333
SHA1d3129978de0570f88ded2c6be3d952547e968c60
SHA256668463de3ef9c95912d0d3bd3b367895201fc5ba5338dbd033368885e639b9c4
SHA512e4cfc88019ed7d5de5747935b91938fac2660210bcf15ca7f739537cc0d519a61b8de6825c3df7b9010f188deab76ce1819ac857b0a3f25ecad521491c6dc28b
-
Filesize
445B
MD532d8f7a3d0c796cee45f64b63c1cca38
SHA1d58466430a2bba8641bd92c880557379e25b140c
SHA2561a6f73b5c28d1c10f63f2056068c1de61487b8cf8f1dcf7516548df144b3e9ea
SHA512288213b92a03ac750ea319bb23c52e7bdf47f5a47ecb70c905c7610a84c63a3ec0a30801b5880e6def8df2c9f577082072e342198d23a19f64e561923e1ef698
-
Filesize
4KB
MD5388b7fff1cda149842c6bebb315a0436
SHA199ff909294a8482ba94f9ddeadc7afe8de9cc54a
SHA256ac52e354109e524631f3894b27d9d81081ef0226e0805105b4de7cb7d9c7f2ab
SHA51280a93ba95ef22b291785e84268babc2380c07a883256e7574d11e3218374d46e568b380f76b6ce076280b262e44b5a9acca55080974c5ddd12aa5f191c29865f