Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows10-2004-x64
3Ransomware...KB.exe
windows7-x64
7Ransomware...KB.exe
windows10-2004-x64
3Ransomware...KB.exe
windows10-ltsc_2021-x64
3Ransomware...KB.exe
windows11-21h2-x64
3Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows11-21h2-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-ltsc_2021-x64
10Ransomware...KB.exe
windows11-21h2-x64
10Resubmissions
25/03/2025, 15:11
250325-skmbpsxzaw 1025/03/2025, 15:06
250325-sg1d6a1px2 1025/03/2025, 15:01
250325-sd5jpsxyct 1025/03/2025, 14:56
250325-sbdcfaxxgs 1025/03/2025, 14:50
250325-r7ve6a1nv3 1025/03/2025, 14:46
250325-r5ab7sxwhx 1025/03/2025, 14:40
250325-r2c9paxwe1 1005/02/2025, 10:25
250205-mgcefaslhw 1005/02/2025, 10:17
250205-mbs51atmbk 1005/02/2025, 09:15
250205-k785zs1pfn 10Analysis
-
max time kernel
64s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral6
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral12
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral16
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win11-20250314-en
Behavioral task
behavioral26
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral27
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win11-20250313-en
General
-
Target
RansomwareSamples/Conti_22_12_2020_186KB.exe
-
Size
185KB
-
MD5
7076f9674bc42536d1e0e2ca80d1e4f6
-
SHA1
854485ee63e5a399fffe150f04cd038d6a5490ef
-
SHA256
ebeca2df24a55c629cf0ce0d4b703ed632819d8ac101b1b930ec666760036124
-
SHA512
71c507108cc0c8b5609076672bd0b64a42c015995fe7220aa97e273c1754e63271edb06b284f4fc01b71a4751c1bcac0f572339e94ff0fd538dc0250caa9181a
-
SSDEEP
3072:+qS7gtGIeq8KxrvRp1MImcZeuLaxugfCJsOlq8WkJK0BOog/Tt3onM9kHpOBae4f:zS7gtyuzFxm16axugfqlMw5g5BkOdSlr
Malware Config
Extracted
C:\Program Files (x86)\R3ADM3.txt
conti
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.info
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Conti family
-
Renames multiple (8002) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\R3ADM3.txt Conti_22_12_2020_186KB.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 46 IoCs
description ioc Process File opened for modification C:\Users\Admin\Saved Games\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\U9KKHJMH\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Links\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Music\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Videos\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\TN6BGAW3\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Music\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Documents\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\FP29B0EC\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VSUVY3HP\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Conti_22_12_2020_186KB.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.forms_3.6.100.v20140422-1825.jar Conti_22_12_2020_186KB.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\R3ADM3.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01181_.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB02229_.GIF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Costa_Rica Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-3 Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-core.xml Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Module.thmx Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GIFT.DPV Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR16F.GIF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.http.jetty_3.0.200.v20131021-1843.jar Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\vlc.mo Conti_22_12_2020_186KB.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\R3ADM3.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\LICENSE Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\RIPPLE.ELM Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18226_.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\StarterNotificationDescriptors.xml Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSGR3EN.LEX Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\id.pak Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_Country.gif Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup-impl_ja.jar Conti_22_12_2020_186KB.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\R3ADM3.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Novosibirsk Conti_22_12_2020_186KB.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\R3ADM3.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239997.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL027.XML Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1258.TXT Conti_22_12_2020_186KB.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\R3ADM3.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler_ja.jar Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\vlc.mo Conti_22_12_2020_186KB.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\R3ADM3.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08758_.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0215086.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Khandyga Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Reykjavik Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\UpdateRestart.xhtml Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Mozilla Firefox\application.ini Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099190.JPG Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107090.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro_5.5.0.165303.jar Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Whitehorse Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Lindeman Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Earthy.gif Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0301076.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.XLS Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BZCD98SP.POC Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\VERSION.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\CALENDAR.GIF Conti_22_12_2020_186KB.exe File created C:\Program Files\Common Files\System\ado\fr-FR\R3ADM3.txt Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Toronto Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382965.JPG Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN096.XML Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_SelectionSubpicture.png Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata_2.2.0.v20131211-1531.jar Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\GIFIMP32.FLT Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240189.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\vlc.mo Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD09662_.WMF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0384895.JPG Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\SNET.NET.XML Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21533_.GIF Conti_22_12_2020_186KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME34.CSS Conti_22_12_2020_186KB.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Conti_22_12_2020_186KB.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe 2516 Conti_22_12_2020_186KB.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2332 vssvc.exe Token: SeRestorePrivilege 2332 vssvc.exe Token: SeAuditPrivilege 2332 vssvc.exe Token: SeIncreaseQuotaPrivilege 2744 WMIC.exe Token: SeSecurityPrivilege 2744 WMIC.exe Token: SeTakeOwnershipPrivilege 2744 WMIC.exe Token: SeLoadDriverPrivilege 2744 WMIC.exe Token: SeSystemProfilePrivilege 2744 WMIC.exe Token: SeSystemtimePrivilege 2744 WMIC.exe Token: SeProfSingleProcessPrivilege 2744 WMIC.exe Token: SeIncBasePriorityPrivilege 2744 WMIC.exe Token: SeCreatePagefilePrivilege 2744 WMIC.exe Token: SeBackupPrivilege 2744 WMIC.exe Token: SeRestorePrivilege 2744 WMIC.exe Token: SeShutdownPrivilege 2744 WMIC.exe Token: SeDebugPrivilege 2744 WMIC.exe Token: SeSystemEnvironmentPrivilege 2744 WMIC.exe Token: SeRemoteShutdownPrivilege 2744 WMIC.exe Token: SeUndockPrivilege 2744 WMIC.exe Token: SeManageVolumePrivilege 2744 WMIC.exe Token: 33 2744 WMIC.exe Token: 34 2744 WMIC.exe Token: 35 2744 WMIC.exe Token: SeIncreaseQuotaPrivilege 2744 WMIC.exe Token: SeSecurityPrivilege 2744 WMIC.exe Token: SeTakeOwnershipPrivilege 2744 WMIC.exe Token: SeLoadDriverPrivilege 2744 WMIC.exe Token: SeSystemProfilePrivilege 2744 WMIC.exe Token: SeSystemtimePrivilege 2744 WMIC.exe Token: SeProfSingleProcessPrivilege 2744 WMIC.exe Token: SeIncBasePriorityPrivilege 2744 WMIC.exe Token: SeCreatePagefilePrivilege 2744 WMIC.exe Token: SeBackupPrivilege 2744 WMIC.exe Token: SeRestorePrivilege 2744 WMIC.exe Token: SeShutdownPrivilege 2744 WMIC.exe Token: SeDebugPrivilege 2744 WMIC.exe Token: SeSystemEnvironmentPrivilege 2744 WMIC.exe Token: SeRemoteShutdownPrivilege 2744 WMIC.exe Token: SeUndockPrivilege 2744 WMIC.exe Token: SeManageVolumePrivilege 2744 WMIC.exe Token: 33 2744 WMIC.exe Token: 34 2744 WMIC.exe Token: 35 2744 WMIC.exe Token: SeIncreaseQuotaPrivilege 2636 WMIC.exe Token: SeSecurityPrivilege 2636 WMIC.exe Token: SeTakeOwnershipPrivilege 2636 WMIC.exe Token: SeLoadDriverPrivilege 2636 WMIC.exe Token: SeSystemProfilePrivilege 2636 WMIC.exe Token: SeSystemtimePrivilege 2636 WMIC.exe Token: SeProfSingleProcessPrivilege 2636 WMIC.exe Token: SeIncBasePriorityPrivilege 2636 WMIC.exe Token: SeCreatePagefilePrivilege 2636 WMIC.exe Token: SeBackupPrivilege 2636 WMIC.exe Token: SeRestorePrivilege 2636 WMIC.exe Token: SeShutdownPrivilege 2636 WMIC.exe Token: SeDebugPrivilege 2636 WMIC.exe Token: SeSystemEnvironmentPrivilege 2636 WMIC.exe Token: SeRemoteShutdownPrivilege 2636 WMIC.exe Token: SeUndockPrivilege 2636 WMIC.exe Token: SeManageVolumePrivilege 2636 WMIC.exe Token: 33 2636 WMIC.exe Token: 34 2636 WMIC.exe Token: 35 2636 WMIC.exe Token: SeIncreaseQuotaPrivilege 2636 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2760 2516 Conti_22_12_2020_186KB.exe 33 PID 2516 wrote to memory of 2760 2516 Conti_22_12_2020_186KB.exe 33 PID 2516 wrote to memory of 2760 2516 Conti_22_12_2020_186KB.exe 33 PID 2516 wrote to memory of 2760 2516 Conti_22_12_2020_186KB.exe 33 PID 2760 wrote to memory of 2744 2760 cmd.exe 35 PID 2760 wrote to memory of 2744 2760 cmd.exe 35 PID 2760 wrote to memory of 2744 2760 cmd.exe 35 PID 2516 wrote to memory of 2808 2516 Conti_22_12_2020_186KB.exe 36 PID 2516 wrote to memory of 2808 2516 Conti_22_12_2020_186KB.exe 36 PID 2516 wrote to memory of 2808 2516 Conti_22_12_2020_186KB.exe 36 PID 2516 wrote to memory of 2808 2516 Conti_22_12_2020_186KB.exe 36 PID 2808 wrote to memory of 2636 2808 cmd.exe 38 PID 2808 wrote to memory of 2636 2808 cmd.exe 38 PID 2808 wrote to memory of 2636 2808 cmd.exe 38 PID 2516 wrote to memory of 2536 2516 Conti_22_12_2020_186KB.exe 39 PID 2516 wrote to memory of 2536 2516 Conti_22_12_2020_186KB.exe 39 PID 2516 wrote to memory of 2536 2516 Conti_22_12_2020_186KB.exe 39 PID 2516 wrote to memory of 2536 2516 Conti_22_12_2020_186KB.exe 39 PID 2536 wrote to memory of 2796 2536 cmd.exe 41 PID 2536 wrote to memory of 2796 2536 cmd.exe 41 PID 2536 wrote to memory of 2796 2536 cmd.exe 41 PID 2516 wrote to memory of 2660 2516 Conti_22_12_2020_186KB.exe 42 PID 2516 wrote to memory of 2660 2516 Conti_22_12_2020_186KB.exe 42 PID 2516 wrote to memory of 2660 2516 Conti_22_12_2020_186KB.exe 42 PID 2516 wrote to memory of 2660 2516 Conti_22_12_2020_186KB.exe 42 PID 2660 wrote to memory of 2732 2660 cmd.exe 44 PID 2660 wrote to memory of 2732 2660 cmd.exe 44 PID 2660 wrote to memory of 2732 2660 cmd.exe 44 PID 2516 wrote to memory of 3068 2516 Conti_22_12_2020_186KB.exe 45 PID 2516 wrote to memory of 3068 2516 Conti_22_12_2020_186KB.exe 45 PID 2516 wrote to memory of 3068 2516 Conti_22_12_2020_186KB.exe 45 PID 2516 wrote to memory of 3068 2516 Conti_22_12_2020_186KB.exe 45 PID 3068 wrote to memory of 2020 3068 cmd.exe 47 PID 3068 wrote to memory of 2020 3068 cmd.exe 47 PID 3068 wrote to memory of 2020 3068 cmd.exe 47 PID 2516 wrote to memory of 2012 2516 Conti_22_12_2020_186KB.exe 48 PID 2516 wrote to memory of 2012 2516 Conti_22_12_2020_186KB.exe 48 PID 2516 wrote to memory of 2012 2516 Conti_22_12_2020_186KB.exe 48 PID 2516 wrote to memory of 2012 2516 Conti_22_12_2020_186KB.exe 48 PID 2012 wrote to memory of 1796 2012 cmd.exe 50 PID 2012 wrote to memory of 1796 2012 cmd.exe 50 PID 2012 wrote to memory of 1796 2012 cmd.exe 50 PID 2516 wrote to memory of 1800 2516 Conti_22_12_2020_186KB.exe 51 PID 2516 wrote to memory of 1800 2516 Conti_22_12_2020_186KB.exe 51 PID 2516 wrote to memory of 1800 2516 Conti_22_12_2020_186KB.exe 51 PID 2516 wrote to memory of 1800 2516 Conti_22_12_2020_186KB.exe 51 PID 1800 wrote to memory of 2340 1800 cmd.exe 53 PID 1800 wrote to memory of 2340 1800 cmd.exe 53 PID 1800 wrote to memory of 2340 1800 cmd.exe 53 PID 2516 wrote to memory of 2144 2516 Conti_22_12_2020_186KB.exe 54 PID 2516 wrote to memory of 2144 2516 Conti_22_12_2020_186KB.exe 54 PID 2516 wrote to memory of 2144 2516 Conti_22_12_2020_186KB.exe 54 PID 2516 wrote to memory of 2144 2516 Conti_22_12_2020_186KB.exe 54 PID 2144 wrote to memory of 1776 2144 cmd.exe 56 PID 2144 wrote to memory of 1776 2144 cmd.exe 56 PID 2144 wrote to memory of 1776 2144 cmd.exe 56 PID 2516 wrote to memory of 444 2516 Conti_22_12_2020_186KB.exe 57 PID 2516 wrote to memory of 444 2516 Conti_22_12_2020_186KB.exe 57 PID 2516 wrote to memory of 444 2516 Conti_22_12_2020_186KB.exe 57 PID 2516 wrote to memory of 444 2516 Conti_22_12_2020_186KB.exe 57 PID 444 wrote to memory of 1040 444 cmd.exe 59 PID 444 wrote to memory of 1040 444 cmd.exe 59 PID 444 wrote to memory of 1040 444 cmd.exe 59 PID 2516 wrote to memory of 2112 2516 Conti_22_12_2020_186KB.exe 60 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Conti_22_12_2020_186KB.exeC:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Conti_22_12_2020_186KB.exe bcdedit /set shutdown /r /f /t 21⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A9800B8D-983B-4491-83EB-BC22ED1D7E93}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A9800B8D-983B-4491-83EB-BC22ED1D7E93}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0258A7D5-130D-4CEA-8D31-0A38600E987E}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0258A7D5-130D-4CEA-8D31-0A38600E987E}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CBD34A1A-FA88-4E7E-A5A0-7415768215FC}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CBD34A1A-FA88-4E7E-A5A0-7415768215FC}'" delete3⤵PID:2796
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F032DFF2-FB08-49DC-99C2-BA1882C8466B}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F032DFF2-FB08-49DC-99C2-BA1882C8466B}'" delete3⤵PID:2732
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4F647B4F-234F-4F59-8149-D5612EB25E04}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4F647B4F-234F-4F59-8149-D5612EB25E04}'" delete3⤵PID:2020
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{814F300D-1DFB-4141-A4B1-F0C7DC24F64C}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{814F300D-1DFB-4141-A4B1-F0C7DC24F64C}'" delete3⤵PID:1796
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{71352CEE-A1E7-4E76-A2EE-AB294FC63308}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{71352CEE-A1E7-4E76-A2EE-AB294FC63308}'" delete3⤵PID:2340
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2C78D0B4-0EE8-4DC4-A696-41D961370EDB}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2C78D0B4-0EE8-4DC4-A696-41D961370EDB}'" delete3⤵PID:1776
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{96473345-74F0-447B-9986-43110DAB7ED6}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{96473345-74F0-447B-9986-43110DAB7ED6}'" delete3⤵PID:1040
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C9837082-6FCE-4E80-AA8D-ECE00C540F2D}'" delete2⤵PID:2112
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C9837082-6FCE-4E80-AA8D-ECE00C540F2D}'" delete3⤵PID:764
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{615D6C20-911B-43F1-8086-28A4E25F3116}'" delete2⤵PID:2592
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{615D6C20-911B-43F1-8086-28A4E25F3116}'" delete3⤵PID:2220
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2ACD8735-6BFA-491F-B9B3-523827A0A950}'" delete2⤵PID:1908
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2ACD8735-6BFA-491F-B9B3-523827A0A950}'" delete3⤵PID:2788
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9D827368-593F-47D0-A898-A10D320A44F2}'" delete2⤵PID:2992
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9D827368-593F-47D0-A898-A10D320A44F2}'" delete3⤵PID:2464
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{63BA5C73-453B-455D-9F8B-30A376C62F07}'" delete2⤵PID:1296
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{63BA5C73-453B-455D-9F8B-30A376C62F07}'" delete3⤵PID:592
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B19070AF-F105-4C66-8407-2799A5DA875D}'" delete2⤵PID:1400
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B19070AF-F105-4C66-8407-2799A5DA875D}'" delete3⤵PID:1308
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B76C57CE-8743-4023-8A0B-EDC2BA9DC6F6}'" delete2⤵PID:1544
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B76C57CE-8743-4023-8A0B-EDC2BA9DC6F6}'" delete3⤵PID:1556
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4F0CB2E9-6400-4596-B4A3-2778D67044BA}'" delete2⤵PID:832
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4F0CB2E9-6400-4596-B4A3-2778D67044BA}'" delete3⤵PID:2912
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{40113DEC-5436-4294-A9B9-58D2A3592CC4}'" delete2⤵PID:1272
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{40113DEC-5436-4294-A9B9-58D2A3592CC4}'" delete3⤵PID:2092
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846B
MD5e6f001fc98cb51a0429ca5dc95f6a950
SHA116a73b95d0b5408fa95c97bc9f314f1eff4902b4
SHA256acf1bb83790c25806dd3c29e0b453002397c7fe7abc25a3470ae4e3164f9f31b
SHA51211e65ed0e80aedb497ab40edf5d3f756b121527cb1102408cdd9f146549c849a41a16fc908bb284c920b061c6b37723117b929de150a62cd61273c40e660168c