Malware Analysis Report

2025-03-15 00:02

Sample ID 250221-cp8shazpdv
Target payload.exe
SHA256 7ecb2207b8e9e3e95700c1a0e8616995a07aecc3437d53705ba9dc6bf7ca18e0
Tags
dharma credential_access defense_evasion discovery execution impact persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7ecb2207b8e9e3e95700c1a0e8616995a07aecc3437d53705ba9dc6bf7ca18e0

Threat Level: Known bad

The file payload.exe was found to be: Known bad.

Malicious Activity Summary

dharma credential_access defense_evasion discovery execution impact persistence ransomware spyware stealer

Dharma

Dharma family

Renames multiple (666) files with added filename extension

Renames multiple (316) files with added filename extension

Deletes shadow copies

Checks computer location settings

Reads user/profile data of web browsers

Drops startup file

Credentials from Password Stores: Windows Credential Manager

Adds Run key to start application

Drops desktop.ini file(s)

Drops file in System32 directory

Drops file in Program Files directory

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

Browser Information Discovery

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Modifies Internet Explorer settings

Interacts with shadow copies

Suspicious behavior: EnumeratesProcesses

Uses Volume Shadow Copy service COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-21 02:16

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-21 02:16

Reported

2025-02-21 02:19

Platform

win7-20240903-en

Max time kernel

150s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

Signatures

Dharma

ransomware dharma

Dharma family

dharma

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (316) files with added filename extension

ransomware

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload.exe = "C:\\Windows\\System32\\payload.exe" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GUJ7UW2N\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GY8QW6M2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8O71085\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\L7XNHY48\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GFIGH6G\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GKATPXW1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\75GKCLJR\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Windows\System32\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN02724_.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libgnutls_plugin.dll.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185800.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECURS.ICO.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_pressed.gif C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\an.txt.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\bundles.info.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_zh_CN.jar.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107254.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199429.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.PNG C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\EXPEDITN.ELM.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_over.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\main.css.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libsamplerate_plugin.dll.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBSBR.DPV.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Document.gif.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Nauru.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Status.accft.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18252_.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBBTN.XML C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-api-caching.xml.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Horizon.eftx.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\msinfo32.exe.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-text.xml.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javafx.policy.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libwave_plugin.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.properties.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jre7\lib\images\cursors\win32_LinkDrop32x32.gif.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152628.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\TipsImage.jpg C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099192.GIF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-editor-mimelookup-impl.xml.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\alertIcon.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\ED00010_.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195248.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javaws.policy.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jre7\lib\cmm\sRGB.pf.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\Tucuman.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00116_.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\soundcloud.luac.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\18.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_foggy.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00965_.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\chkrzm.exe.mui.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libspeex_resampler_plugin.dll.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.Targets C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00110_.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\PYCC.pf.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Gibraltar.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196358.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341448.JPG.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CONTACTINFOBB.DPV.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\HEADER.GIF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_zh_4.4.0.v20140623020002.jar C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-actions_zh_CN.jar C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107130.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107302.WMF.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\STINTL.DLL.id-6B1F7312.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02009_.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\System32\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\System32\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2516 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2516 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2516 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2516 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2176 wrote to memory of 2704 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2176 wrote to memory of 2704 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2176 wrote to memory of 2704 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2176 wrote to memory of 1748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2176 wrote to memory of 1748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2176 wrote to memory of 1748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2516 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2516 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2516 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2516 wrote to memory of 3464 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3464 wrote to memory of 5072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 3464 wrote to memory of 5072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 3464 wrote to memory of 5072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 3464 wrote to memory of 5060 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3464 wrote to memory of 5060 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3464 wrote to memory of 5060 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2516 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2516 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2516 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2516 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2516 wrote to memory of 4736 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2516 wrote to memory of 4736 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2516 wrote to memory of 4736 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2516 wrote to memory of 4736 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\payload.exe

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

Network

N/A

Files

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.id-6B1F7312.[[email protected]].SCRT

MD5 a32b7ae3a7a21b23477112be5e3a58a8
SHA1 7c16fd13d25282a67b116b2d433836dd2b968c0d
SHA256 3996e9c98fa60b9ab99f094b5b7ba19ca78679f582610ee045c7137ef6fd4164
SHA512 4265617e7e967484dd57a5ffcd6ceb96b4214b288ed156ecdef57ab538c3f86582930e064db522413d63d4c2823be74e4f1bf0850d63bc097a194fec27568d4a

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

MD5 8a109d022c38508b67a1263582857539
SHA1 d9905325df03e9ca4e447be4aab53882f04ffbc0
SHA256 81756d1393494a3811cf23cfea9c652971894de36b364e8362cf8a3a482e2a9d
SHA512 4641fb48e4a56c9a8a436ab4e9c42503d4e377886b08c68f0974637794113e51bc330840389d759044491d72bc182c13c1c77310694729aa742dc3c56588e38f

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-21 02:16

Reported

2025-02-21 02:19

Platform

win10v2004-20250217-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

Signatures

Dharma

ransomware dharma

Dharma family

dharma

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (666) files with added filename extension

ransomware

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload.exe = "C:\\Windows\\System32\\payload.exe" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3181990009-820930284-137514597-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-3181990009-820930284-137514597-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Windows\System32\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\selector.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-ppd.xrm-ms.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.ReportingServices.DataExtensions.dll.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\intf\luac.luac.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL044.XML C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\http\images\Video-48.png.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-black\Settings.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\flavormap.properties C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\AppxSignature.p7x C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\zh-CN.pak C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-72_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\bulletin_board.css C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-black_targetsize-96.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\fxplugins.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\s_listview_18.svg.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial2-ul-oob.xrm-ms.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libheadphone_channel_mixer_plugin.dll.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL016.XML C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Back-48.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_scale-125.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalSplashScreen.scale-200.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\japanese_over.png.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-il\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BOOKOSBI.TTF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\psuser.dll.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\example_icons2x.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Grace-ppd.xrm-ms.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\rtscom.dll.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\uk-UA\MSFT_PackageManagement.strings.psd1.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\rsod\onenotemui.msi.16.en-us.boot.tree.dat.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_GB\added.txt.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\PresentationUI.resources.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_18.svg C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nl-nl\ui-strings.js.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\kok.pak.DATA C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN107.XML.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleLargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\ARIALNBI.TTF.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-96_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\hand.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\SmallTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-ppd.xrm-ms.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\es-es\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription4-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GOTHICBI.TTF.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\demux\libmod_plugin.dll.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-black_scale-80.png.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteSmallTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Standard.targetsize-24_contrast-black.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\Fonts\StorMDL2.ttf C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\msedgeupdateres_uk.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\http\js\ui.js.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinPageTemplates.xml C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\ucrtbase.dll.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest3-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\GIFIMP32.FLT.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\arrow-left.png.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-ae\ui-strings.js.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado26.tlb C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\id.pak.id-8058FF6C.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ARCTIC\THMBNAIL.PNG C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2348 wrote to memory of 1796 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2348 wrote to memory of 1796 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 1796 wrote to memory of 4860 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 1796 wrote to memory of 4860 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 1796 wrote to memory of 6240 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1796 wrote to memory of 6240 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2348 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2348 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 4452 wrote to memory of 6420 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 4452 wrote to memory of 6420 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 4452 wrote to memory of 5508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4452 wrote to memory of 5508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2348 wrote to memory of 8884 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2348 wrote to memory of 8884 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2348 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2348 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\payload.exe

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

Network

Country Destination Domain Proto
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-8058FF6C.[[email protected]].SCRT

MD5 782c33e956df3022a7dc550715ba790e
SHA1 da4b9bdf5241689418f588fe75bdd469df8a1f44
SHA256 c2dd0561b30560711ca4d9c044717e0bad2d7ba706515afa362f907d3edf8eb6
SHA512 7007b2d6811c6d5ed11a5c1c9663ca0d69dd55cb44ff10c3a175bbaff77aa967bc842f997eb081425d92d3dea1147648b7e2602ad08af0003f8054e8854dba26

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

MD5 9dbe675c7d93c330f2dfebfcc09437ab
SHA1 fa7daf2d70935f5e164f3518f78ee61cc241d5b2
SHA256 f3c7354952dcd5f5ba3da8460646da3d58dfd0481b5577cdb28e3b1b90b5fea9
SHA512 424e84f32b9437e76e8a1878ee30270280f67d1592dc3a99e582234ca4587da60d047e4717f1d7d8decb1de9de88983f745bf205f5539884edd22e6787a86955