Malware Analysis Report

2025-03-14 23:59

Sample ID 250227-fcaaysv1d1
Target payload.exe
SHA256 7ecb2207b8e9e3e95700c1a0e8616995a07aecc3437d53705ba9dc6bf7ca18e0
Tags
dharma credential_access defense_evasion discovery execution impact persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7ecb2207b8e9e3e95700c1a0e8616995a07aecc3437d53705ba9dc6bf7ca18e0

Threat Level: Known bad

The file payload.exe was found to be: Known bad.

Malicious Activity Summary

dharma credential_access defense_evasion discovery execution impact persistence ransomware spyware stealer

Dharma

Dharma family

Deletes shadow copies

Renames multiple (654) files with added filename extension

Renames multiple (325) files with added filename extension

Credentials from Password Stores: Windows Credential Manager

Drops startup file

Checks computer location settings

Reads user/profile data of web browsers

Drops desktop.ini file(s)

Adds Run key to start application

Drops file in System32 directory

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Uses Volume Shadow Copy service COM API

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Interacts with shadow copies

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-27 04:43

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-27 04:43

Reported

2025-02-27 04:45

Platform

win7-20240903-en

Max time kernel

149s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

Signatures

Dharma

ransomware dharma

Dharma family

dharma

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (325) files with added filename extension

ransomware

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload.exe = "C:\\Windows\\System32\\payload.exe" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8O71085\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\L7XNHY48\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GUJ7UW2N\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\3W44XPEP\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GY8QW6M2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Windows\System32\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21322_.GIF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-first-quarter_partly-cloudy.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\freebl3.dll.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387591.JPG.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02252_.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\TEXTVIEW.JPG.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\cy.txt C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\ui.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153299.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313974.JPG C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.commands.nl_zh_4.4.0.v20140623020002.jar C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\INVITE.XML.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\HxRuntime.HxS.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Office14\IEAWSDC.DLL.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\GIFIMP32.FLT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00154_.GIF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.XML.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXT.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Photo Viewer\PhotoBase.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\COPYRIGHT.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01805_.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Moscow.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIELinkedNotes.dll.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\15x15dot.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\menu_arrow.gif C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ccme_base.dll.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107734.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0315612.JPG.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\MST.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0233070.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\GRIP.JPG C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-search_ja.jar C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\VIEW.JS.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECRECL.ICO.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14870_.GIF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CSS7DATA000A.DLL.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\ALERT.ICO.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304861.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libblendbench_plugin.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0211981.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Tell_City C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\JOURNAL.ELM.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CNFRES.CFG.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00270_.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\tzmappings.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_sr.dll.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\DOC.CFG.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\asl-v20.txt C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00160_.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151041.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\WSSFilesToolHomePageBackground.jpg C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\com.jrockit.mc.console.ui.notification_contexts.xml.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_foggy.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Regular.otf.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-lib-uihandler.xml C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\weather.html C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\LightSpirit.css C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_ButtonGraphic.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\PSS10R.CHM.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099182.WMF.id-68D668FA.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153089.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\System32\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\System32\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3012 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3012 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3012 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3012 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2252 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2252 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2252 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2252 wrote to memory of 1684 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2252 wrote to memory of 1684 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2252 wrote to memory of 1684 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3012 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3012 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3012 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3012 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 3400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 1744 wrote to memory of 3400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 1744 wrote to memory of 3400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 1744 wrote to memory of 2784 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1744 wrote to memory of 2784 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1744 wrote to memory of 2784 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3012 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 3012 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 3012 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 3012 wrote to memory of 784 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 3012 wrote to memory of 200 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 3012 wrote to memory of 200 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 3012 wrote to memory of 200 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 3012 wrote to memory of 200 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\payload.exe

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

Network

N/A

Files

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-68D668FA.[[email protected]].SCRT

MD5 347eba37bdc473ad02cc52fe518c5f93
SHA1 7ef8966509db89227266db33bb5a4375e9141cd5
SHA256 00a6e93827dd21912803d17cdb317005bac8054de9a25469273e95304412cc16
SHA512 c59a8d7692931213917a368860a8ee50906db6ad4a3df191ff380eb8721bf056baee2566b5acc2edf235d3e587ecc213751dee69538c216ebac353283f7ab0c1

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

MD5 52019fed6801465c4d466f54772aa4b9
SHA1 60cdacf13557f4eec0b8d68bd5841e89eed0c959
SHA256 4245a77dde07c12ba1833729fdaba1fdebe764b3ecf9e55084037d1f627a7482
SHA512 f99632bf7cacc7f6baf555eae869529ef28ac68e2c4ed396845f090c6ac679a71b3b887ae484ede78afc36d9c0686fdfc5470a5cce8827222721c1fa65c943a8

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-27 04:43

Reported

2025-02-27 04:46

Platform

win10v2004-20250217-en

Max time kernel

150s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

Signatures

Dharma

ransomware dharma

Dharma family

dharma

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (654) files with added filename extension

ransomware

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload.exe = "C:\\Windows\\System32\\payload.exe" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1170604239-850860757-3112005715-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-1170604239-850860757-3112005715-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Windows\System32\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\AppStore_icon.svg.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_OEM_Perp-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SPRING\SPRING.INF.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.IdentityModel.Resources.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\PesterThrow.Tests.ps1 C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\icu.md.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECLIPSE\PREVIEW.GIF.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-sysinfo-l1-1-0.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\tr-tr\ui-strings.js.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libgme_plugin.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Net.WebSockets.Client.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\Microsoft.PackageManagement.MsiProvider.resources.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\System.Windows.Forms.resources.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ko-kr\ui-strings.js.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxWideTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\ui-strings.js.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\ImagingDevices.exe.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer_eula.txt C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.FileSystem.Primitives.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\WelcomeCardRdr.png.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\MicrosoftSolitaireAppList.targetsize-48_altform-unplated_contrast-black_devicefamily-colorfulunplated.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-200_contrast-white.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\BadgeLogo.scale-200_contrast-white.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_selectlist_checkmark_18.svg.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\eu-es\ui-strings.js.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\PresentationUI.resources.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\150.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupWideTile.scale-150.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-64_altform-unplated_contrast-black.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ul-oob.xrm-ms.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\LivingImagesProcessing.Windows.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.targetsize-16_altform-lightunplated.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-tw\ui-strings.js.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\rhp_world_icon_hover.png.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\ru.pak.DATA.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\basicelegant.dotx.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\System.Xaml.resources.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_es-MX.json C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\oledbvbs.inc C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\upe.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Serialization.Primitives.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Delete.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ja-jp\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Input.Manipulations.resources.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\PresentationCore.resources.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\System.Windows.Forms.Primitives.resources.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-72_contrast-white.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp-ul-oob.xrm-ms.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-convert-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\mshwLatin.dll.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\virgo-new-folder.svg.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\CPDF_RHP.aapp.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Security.Cryptography.ProtectedData.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\tool-search-2x.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONCHARTCOMMON.DLL.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\ShouldContain.snippets.ps1xml C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libxml2.md.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_cancel_18.svg C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-localization-l1-2-0.dll.id-E5CC8FBE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2992 wrote to memory of 3364 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2992 wrote to memory of 3364 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 3364 wrote to memory of 1540 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 3364 wrote to memory of 1540 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 3364 wrote to memory of 6424 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3364 wrote to memory of 6424 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2992 wrote to memory of 7772 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2992 wrote to memory of 7772 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 7772 wrote to memory of 5672 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 7772 wrote to memory of 5672 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 7772 wrote to memory of 7560 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 7772 wrote to memory of 7560 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2992 wrote to memory of 5760 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2992 wrote to memory of 5760 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2992 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2992 wrote to memory of 1980 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\payload.exe

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

Network

Country Destination Domain Proto
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-E5CC8FBE.[[email protected]].SCRT

MD5 1332f3e305314c3a53d958cf2389a943
SHA1 d75057d2624b3186c2efa3e549dede650ecdf450
SHA256 7066c6f4aabf602d01a09a10355d03c5232c42a0114582ae3bd257a2b543e389
SHA512 af7dc590545cef849d8253a364fc3564cdd05e15ef97b02958ff376626c208af2e5a7cf509d9eb044cebc15c851d590ce0aec216240135d6390c30754e176283

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

MD5 20100b200e95a41fd1fb1ccd87e8ff7d
SHA1 923dce6ed9d590f493969e5ddf88591962e851b4
SHA256 8f470e0283458dba2ddc54ab05cdd4a00c474981f5af73ad957ad2cd24aa79da
SHA512 237b60e75e235c5c37f3b2bb19575eac89fdf754567c52a3c2f466270e1445255fc68f918bf6a850bd995748cd7ab4c1250c6fb17c8be538d5cf814459e0013d