Analysis
-
max time kernel
108s -
max time network
115s -
platform
windows7_x64 -
resource
win7v200410 -
submitted
21-04-2020 05:49
Static task
static1
Behavioral task
behavioral1
Sample
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe
Resource
win7v200410
Behavioral task
behavioral2
Sample
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe
Resource
win10v200410
General
-
Target
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe
-
Size
12KB
-
MD5
4a7378c7ef7a9b72aa2b38019aa6fcdc
-
SHA1
7e19a75d8a91fa2e4e6e7519609eb8c300a8a030
-
SHA256
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3
-
SHA512
8eb4cfcd03315f5984ee6909cd33b3086227e610d78d24dd32525a421a92b440fe012f2b5403dbc10be8db875fa5db83731786578395fef44dde8394ec219441
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exepid process 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2016 cmd.exe -
Modifies service 2 TTPs 10 IoCs
Processes:
vssvc.exenetsh.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\LocalConfig netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\napagent\LocalConfig\UI netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\napagent\LocalConfig\Enroll\HcsGroups netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs netsh.exe -
Modifies Windows Firewall 1 TTPs
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\Wallpaper.jpg" b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A092.tmp.jpg" b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1636 vssadmin.exe -
Drops startup file 1 IoCs
Processes:
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2044 timeout.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 996 vssvc.exe Token: SeRestorePrivilege 996 vssvc.exe Token: SeAuditPrivilege 996 vssvc.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1768 bcdedit.exe 1620 bcdedit.exe -
Drops desktop.ini file(s) 41 IoCs
Processes:
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exedescription ioc process File opened for modification C:\Users\Admin\Favorites\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Libraries\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3765897441-2376744223-3151462503-1000\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\FT5Z4PS4\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Documents\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Videos\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files (x86)\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\0DHL2DSS\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Music\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Documents\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Pictures\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RXSZRW3N\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Downloads\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Desktop\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Videos\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\M8IM4P5W\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Searches\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Music\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Admin\Links\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe -
Drops file in Program Files directory 11773 IoCs
Processes:
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\Document Themes 14\Theme Effects\Verve.eftx b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\FORMS\1033\SCDRESNS.ICO b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_FormsHomePageSlice.gif b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_ButtonGraphic.png b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\deploy.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\BD19695_.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\SO02958_.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadce.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PH03014_.GIF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Hermosillo b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_zh_4.4.0.v20140623020002.jar b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\OFFICE14\LINES\LINES.DLL b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\background.gif b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\EntityPicker.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files\Windows Media Player\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\WindowsFormsIntegration.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Macquarie b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0185800.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0301418.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\WORDICON.EXE b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\33.png b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\HH00546_.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\MAPISHELLR.DLL b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOSYNC.EXE b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewFrame.html b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\PUBWIZ\DGACCBOX.DPV b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.zh_CN_5.5.0.165303.jar b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_ja.jar b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PH01236U.BMP b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\MEDIA\CAGCAT10\J0251871.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\msadds.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OWSHLP10.CHM b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\tipresx.dll.mui b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0171685.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PH02466U.BMP b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\librecord_plugin.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_down.png b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-io-ui.xml b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\DEFAULT.XSL b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libmotiondetect_plugin.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files (x86)\Internet Explorer\en-US\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\core.jar b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files\Microsoft Office\Office14\Bibliography\Sort\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_dummy_plugin.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files\Microsoft SQL Server Compact Edition\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\libinteger_mixer_plugin.dll b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\!read_me!.txt b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page_PAL.wmv b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services_3.4.0.v20140312-2051.jar b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-uisupport.xml b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0195428.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\SO00935_.WMF b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\ACCWIZ\UTILITY.ACCDA b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Microsoft Office\Office14\XIMAGE3B.DLL b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Christmas b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-uihandler.xml_hidden b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Srednekolymsk b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.execmd.exedescription pid process target process PID 1536 wrote to memory of 1636 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe vssadmin.exe PID 1536 wrote to memory of 1636 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe vssadmin.exe PID 1536 wrote to memory of 1636 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe vssadmin.exe PID 1536 wrote to memory of 1636 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe vssadmin.exe PID 1536 wrote to memory of 1692 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1692 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1692 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1692 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1728 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1728 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1728 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1728 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1752 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1752 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1752 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 1752 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 2016 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 2016 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 2016 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 1536 wrote to memory of 2016 1536 b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe cmd.exe PID 2016 wrote to memory of 2044 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 2044 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 2044 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 2044 2016 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe"C:\Users\Admin\AppData\Local\Temp\b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Sets desktop wallpaper using registry
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exedelete shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c netsh advfirewall set allprofiles state off2⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state off3⤵
- Modifies service
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\b2a27c3b5c301b22260722383a889d491431e4909e4a0bf810840ba882cbbce3.exe" >> NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\!read_me!.txt1⤵