Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
lkx111.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lkx111.exe
Resource
win10v2004-20241007-en
General
-
Target
lkx111.exe
-
Size
358KB
-
MD5
ce8e9e7376b8f0cd83a0330c2b3a77c1
-
SHA1
fe98b50cca96ce2a2256d48dac65b9d0a3a74283
-
SHA256
b0127f59eb38fd379e87dccace57c6c1f7922dd54b752b3c0f6f62b3358a763d
-
SHA512
5f193ccffaa444bbf0ca543f01832e5dae3dbad105d9c52de58d9ee8edf10546c2f5625ab22c2eafe718f1c115b4925c423270c9b2de5f5a3d7cfbd018b08f24
-
SSDEEP
6144:B4ajIzYLNfMFIvD/BNpa2l1GUrpJmqGTQ0GCM:GA95UFILDlgU2q8
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
https://tox.chat/download.html
http://pexdatax.com/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (528) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation lkx111.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta lkx111.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lkx111.exe lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini lkx111.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-B31EAE1B.[[email protected]].ROGER lkx111.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lkx111.exe = "C:\\Windows\\System32\\lkx111.exe" lkx111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" lkx111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" lkx111.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini lkx111.exe File opened for modification C:\Users\Public\Pictures\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini lkx111.exe File opened for modification C:\Users\Public\Documents\desktop.ini lkx111.exe File opened for modification C:\Users\Public\Downloads\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Videos\desktop.ini lkx111.exe File opened for modification C:\Users\Public\Videos\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini lkx111.exe File opened for modification C:\Users\Public\Libraries\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini lkx111.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini lkx111.exe File opened for modification C:\Program Files (x86)\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Links\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini lkx111.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Music\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini lkx111.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Searches\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini lkx111.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Documents\desktop.ini lkx111.exe File opened for modification C:\Users\Public\Desktop\desktop.ini lkx111.exe File opened for modification C:\Users\Public\Music\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini lkx111.exe File opened for modification C:\Users\Public\desktop.ini lkx111.exe File opened for modification C:\Program Files\desktop.ini lkx111.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini lkx111.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini lkx111.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\lkx111.exe lkx111.exe File created C:\Windows\System32\Info.hta lkx111.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.Process.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\WideTile.scale-400_contrast-black.png lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.OData.Core.NetFX35.dll lkx111.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\UIAutomationProvider.resources.dll lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-utility-l1-1-0.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Drawing.Common.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-80.png lkx111.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ro-ro\ui-strings.js.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_Grace-ul-oob.xrm-ms.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Trial-ppd.xrm-ms.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\data\en-us\2.jpg lkx111.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge.dll.sig.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OSMUX.OSMUX.x-none.msi.16.x-none.xml lkx111.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebClient.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\WindowsBase.resources.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\UIAutomationClient.resources.dll lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Background_RoomSetupDisambig_DeskScale.jpg lkx111.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\autstbim.dll lkx111.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\PSGet.Resource.psd1 lkx111.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\relaxngcc.md.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebSockets.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Sort\TITLE.XSL.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\ucrtbase.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-256_altform-unplated_contrast-white.png lkx111.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\da-dk\ui-strings.js lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.DataWarehouse.Interfaces.DLL.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\notification_helper.exe.manifest.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sv-se.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN090.XML.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\progress_spinner2x.gif.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-synch-l1-1-0.dll lkx111.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\widevinecdmadapter.dll lkx111.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\UIAutomationProvider.resources.dll lkx111.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\PresentationCore.resources.dll.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Extensions.Design.dll lkx111.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\Entities lkx111.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ul-phn.xrm-ms lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\es\msipc.dll.mui.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-core-processthreads-l1-1-1.dll lkx111.exe File created C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\vlc.mo.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.UnmanagedMemoryStream.dll lkx111.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN095.XML.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Context.ps1 lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-200.png lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\BadgeLogo.scale-200_contrast-black.png lkx111.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filterselected-disabled_32.svg.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\rhp_world_icon_hover_2x.png.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\NIRMALAB.TTF lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\avdevice-58_ms.dll lkx111.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\zh-TW.pak.DATA.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\CompatExceptions.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fi-fi.dll lkx111.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorMedTile.contrast-black_scale-125.png lkx111.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-cn\ui-strings.js lkx111.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Grace-ul-oob.xrm-ms.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART12.BDR.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.Printing.resources.dll lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-80.png lkx111.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\OrientationControlMiddleCircle.png lkx111.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-pl.xrm-ms.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json.id-B31EAE1B.[[email protected]].ROGER lkx111.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_equalizer.html lkx111.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkx111.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5880 vssadmin.exe 6856 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe 2440 lkx111.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3928 vssvc.exe Token: SeRestorePrivilege 3928 vssvc.exe Token: SeAuditPrivilege 3928 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3276 2440 lkx111.exe 85 PID 2440 wrote to memory of 3276 2440 lkx111.exe 85 PID 3276 wrote to memory of 2436 3276 cmd.exe 87 PID 3276 wrote to memory of 2436 3276 cmd.exe 87 PID 3276 wrote to memory of 5880 3276 cmd.exe 88 PID 3276 wrote to memory of 5880 3276 cmd.exe 88 PID 2440 wrote to memory of 2236 2440 lkx111.exe 98 PID 2440 wrote to memory of 2236 2440 lkx111.exe 98 PID 2236 wrote to memory of 9208 2236 cmd.exe 100 PID 2236 wrote to memory of 9208 2236 cmd.exe 100 PID 2236 wrote to memory of 6856 2236 cmd.exe 101 PID 2236 wrote to memory of 6856 2236 cmd.exe 101 PID 2440 wrote to memory of 5368 2440 lkx111.exe 102 PID 2440 wrote to memory of 5368 2440 lkx111.exe 102 PID 2440 wrote to memory of 5896 2440 lkx111.exe 103 PID 2440 wrote to memory of 5896 2440 lkx111.exe 103 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\lkx111.exe"C:\Users\Admin\AppData\Local\Temp\lkx111.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2436
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5880
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:9208
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:6856
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:5368
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:5896
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-B31EAE1B.[[email protected]].ROGER
Filesize2.7MB
MD57862c01ae895318cbc4d5b046122688d
SHA12f05e10c472d5a974d50db2bbca31655879fdca4
SHA256bc2e3ca36d9aedb8a5b34b0d84bffcf8796f3eaa1d2f1dd65b1ae2adbfb734f9
SHA512179f0e24d763f0bf8b2355682362e1680f9b109b80c3773c2ebc5798f9241968fcf816e4c6885fb834828ae7ba091938917c08d76d109360393b0e7ce6850a99
-
Filesize
7KB
MD5340c3e1a5b9e6718d2de8fe74ba8ef93
SHA1686370a12b1b1cffee9b0c76a89ab73e4719c52b
SHA256fb4419855856a9eb43e71df11e7d7b3475233b61a226120df11a617071ce43ca
SHA512e97382b1e4d980a99e083c4f9a7df91c1e9ae9f5476c28a9def6453affc131584ce4e5617d6e6d597bdf35a23f8c653aa10783617978d1781cd6f39adab36cf7