Malware Analysis Report

2025-03-14 23:59

Sample ID 250227-g974xsyva1
Target payload.exe
SHA256 7ecb2207b8e9e3e95700c1a0e8616995a07aecc3437d53705ba9dc6bf7ca18e0
Tags
dharma credential_access defense_evasion discovery execution impact persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7ecb2207b8e9e3e95700c1a0e8616995a07aecc3437d53705ba9dc6bf7ca18e0

Threat Level: Known bad

The file payload.exe was found to be: Known bad.

Malicious Activity Summary

dharma credential_access defense_evasion discovery execution impact persistence ransomware spyware stealer

Dharma family

Dharma

Renames multiple (313) files with added filename extension

Renames multiple (666) files with added filename extension

Deletes shadow copies

Reads user/profile data of web browsers

Drops startup file

Checks computer location settings

Credentials from Password Stores: Windows Credential Manager

Drops desktop.ini file(s)

Adds Run key to start application

Drops file in System32 directory

Drops file in Program Files directory

Enumerates physical storage devices

Browser Information Discovery

Unsigned PE

System Location Discovery: System Language Discovery

Modifies Internet Explorer settings

Uses Volume Shadow Copy service COM API

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Interacts with shadow copies

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-27 06:31

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-27 06:31

Reported

2025-02-27 06:32

Platform

win7-20240903-en

Max time kernel

70s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

Signatures

Dharma

ransomware dharma

Dharma family

dharma

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (313) files with added filename extension

ransomware

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload.exe = "C:\\Windows\\System32\\payload.exe" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y07CWM3B\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WMBPAEF9\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\60QKHYE2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\09OB1FV8\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SK4ZQZYF\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Windows\System32\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Apia.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01805_.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libtta_plugin.dll.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services_3.4.0.v20140312-2051.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\intf\dummy.luac.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\codec\liblpcm_plugin.dll.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Managua.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD06200_.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-heapdump_zh_CN.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04196_.WMF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01566_.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\RECOVR32.CNV.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Tasks.accdt.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Grand_Turk.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292272.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\ARCTIC.ELM C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238959.WMF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382963.JPG C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Buenos_Aires.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21336_.GIF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Windows Media Player\de-DE\WMPDMC.exe.mui C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\WidescreenPresentation.potx.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Nipigon.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14594_.GIF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCHDRESN.CFG.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\cpu.html C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\sRGB.pf C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107192.WMF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02022_.WMF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\fonts\LucidaSansRegular.ttf.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18256_.WMF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Common Files\System\ado\msader15.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382965.JPG.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-previous-static.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins_1.1.200.v20131119-0908.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Office14\NPAUTHZ.DLL C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsColorChart.html.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\System.AddIn.dll.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveNoDrop32x32.gif.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.registry_3.5.400.v20140428-1507.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore.xmi_2.10.1.v20140901-1043.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\org-openide-modules.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\Mahjong.exe.mui.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Accessibility.api.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-modules-appui.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host_zh_CN.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Tehran C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Pacific\Pohnpei.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Shared16x16ImagesMask.bmp C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\PINELUMB.JPG C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.properties.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactHigh.jpg.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_COL.HXT.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01168_.WMF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.HXS.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01166_.WMF C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02296_.WMF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14579_.GIF.id-0681297D.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\System32\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\System32\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2452 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2452 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2452 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2452 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2648 wrote to memory of 380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2648 wrote to memory of 380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2648 wrote to memory of 380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2648 wrote to memory of 992 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2648 wrote to memory of 992 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2648 wrote to memory of 992 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2452 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2452 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2452 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2452 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 964 wrote to memory of 2512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 964 wrote to memory of 2512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 964 wrote to memory of 2512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 964 wrote to memory of 4884 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 964 wrote to memory of 4884 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 964 wrote to memory of 4884 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2452 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2452 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2452 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2452 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2452 wrote to memory of 3224 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2452 wrote to memory of 3224 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2452 wrote to memory of 3224 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 2452 wrote to memory of 3224 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\payload.exe

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

Network

N/A

Files

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.id-0681297D.[[email protected]].SCRT

MD5 66db10dab46bd7a6c13b71372996c92e
SHA1 ed51ad957c9ff91ebe2424d72f231f3b5b6bc35c
SHA256 3e3ec79bfe1496dcda4424a3184194554ddc929bac65fde7e14d2711d59b72d4
SHA512 caddd0ee91cab38c15afb6d4609c22275de285a033e166069b9e0275f26caf22f7fcb4a5092bca83791486c88974b463c6d7a7cdffb5bd9ce74124bd7c10b865

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

MD5 b9649327057b35bcdb22245d1ec2d080
SHA1 9fb4f8ce47d8737bfe165089db6dc5dfac3fa762
SHA256 af44da08ccc5d10272252e018cd105e1af6378312620b663f487071798eb6d8f
SHA512 4e961b0d4b9648914581b3c6d095156fc967cbf64ac7bb97ae072869c4ce6e5f23d26142a39157ebabe719917a31a6850d1928b0a02dd1d32fda848a7cdae107

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-27 06:31

Reported

2025-02-27 06:32

Platform

win10v2004-20250217-en

Max time kernel

75s

Max time network

68s

Command Line

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

Signatures

Dharma

ransomware dharma

Dharma family

dharma

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (666) files with added filename extension

ransomware

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Credentials from Password Stores: Windows Credential Manager

credential_access stealer

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\payload.exe = "C:\\Windows\\System32\\payload.exe" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2593460650-190333679-3676257533-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-2593460650-190333679-3676257533-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\System32\payload.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Windows\System32\Info.hta C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libantiflicker_plugin.dll.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN110.XML.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\wab32res.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\elevation_service.exe.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Installer\setup.exe.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.Specialized.dll.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-256_altform-lightunplated.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\LargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-ul-oob.xrm-ms.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\root\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-100.png.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions2x.png.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalDemoR_BypassTrial180-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\vlc.mo.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\demux\libty_plugin.dll.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\pe.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\50.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageSmallTile.scale-150.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notificationsUI\notificationCenter.html C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ui-strings.js.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-convert-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\access-bridge-64.jar C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ms-my.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WorldClockLargeTile.contrast-white_scale-125.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview2x.png.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\MSFT_PackageManagement.strings.psd1.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MixedRealityPortalAppList.targetsize-40_altform-unplated_contrast-black.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-20_altform-unplated_contrast-white.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Retail-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\IDPValueAssets\GameDVRValueProp.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Grace-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\de-de\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\System\atl110.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\directshow.md C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.AeroLite.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Grace-ul-oob.xrm-ms.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libglwin32_plugin.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\ca-Es-VALENCIA.pak.DATA.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0409-1000-0000000FF1CE.xml.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\clrgc.dll.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\profilePic.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\uk-ua\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-ul-oob.xrm-ms.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\HeartbeatConfig.xml C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-54_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\WindowsBase.resources.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\WindowsBase.resources.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\sendforcomments.svg.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\accessibility_poster.jpg.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libequalizer_plugin.dll.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Exchange.scale-300.png C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-environment-l1-1-0.dll.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_OEM_Perp-ul-oob.xrm-ms.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\access\libsdp_plugin.dll.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\MSFT_PackageManagementSource.schema.mfl.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\ui-strings.js C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\da-dk\ui-strings.js.id-3174F0EE.[[email protected]].SCRT C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\api-ms-win-core-xstate-l2-1-0.dll C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\payload.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 368 wrote to memory of 4952 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 368 wrote to memory of 4952 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 4952 wrote to memory of 1996 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 4952 wrote to memory of 1996 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 4952 wrote to memory of 2052 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4952 wrote to memory of 2052 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 368 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 368 wrote to memory of 2388 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\system32\cmd.exe
PID 2388 wrote to memory of 792 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2388 wrote to memory of 792 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\mode.com
PID 2388 wrote to memory of 8908 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2388 wrote to memory of 8908 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 368 wrote to memory of 10068 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 368 wrote to memory of 10068 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 368 wrote to memory of 6032 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe
PID 368 wrote to memory of 6032 N/A C:\Users\Admin\AppData\Local\Temp\payload.exe C:\Windows\System32\mshta.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\payload.exe

"C:\Users\Admin\AppData\Local\Temp\payload.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\mode.com

mode con cp select=1251

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

C:\Windows\System32\mshta.exe

"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"

Network

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-3174F0EE.[[email protected]].SCRT

MD5 0d3e66cde8bd7702c62f8f0dee52c617
SHA1 b808009afbe37f0173b38cb1fd01644187e49679
SHA256 c5d4af714ea1713452ebfae0c88946891fecba35d0be9d8b487d14c54a908cab
SHA512 f770c89f53cb04f7f5a595f6f170cc4149fc6c45918243254fd25c51cbe31be9bbe7479be80a1194b0640052ce846de0a6f01086a5fcfcee3652f18a22542cc2

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

MD5 66c9ff6a39078f7a77bb72de34896f99
SHA1 9b6c4d885735dd28648e5dfaac25cf7ff86a5a68
SHA256 5cc0c2f38ef4ae70d482dd41ab9392b1bd364a6311cf34fbe19979cc93cf08b3
SHA512 0e7c5e5c68c6adfa6228d339270eab615d9fe784d5b4e4b88794350c260ad4f70740e023d6a33889a001759934a6af868c7bf3e6621a03844a47eabeae328ef5