Resubmissions
27-08-2020 15:47
200827-m1jren2nas 10Analysis
-
max time kernel
129s -
max time network
154s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
27-08-2020 15:47
Static task
static1
Behavioral task
behavioral1
Sample
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe
Resource
win10
General
-
Target
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe
-
Size
181KB
-
MD5
80d3605d4b180cdd2fef6cb6312942bd
-
SHA1
12386eee0db55c3c612c92b7912d6f5eceaaffdc
-
SHA256
7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91
-
SHA512
cfb0f5785978586aeaec6a832f0dfae13039c07f977f0afb63fcdbb27981b7bc95ecaf202c7a5ddfec9b47bbf1c5c00c2cfdbc471035311b2458dec6a2e65fd9
Malware Config
Extracted
smokeloader
2020
http://rexstat35x.xyz/statweb955/
http://dexspot2x.xyz/statweb955/
http://atxspot20x.xyz/statweb955/
http://rexspot7x.xyz/statweb955/
http://fdmail85.club/statweb955/
http://servicem977x.xyz/statweb955/
http://advertxman7x.xyz/statweb955/
http://starxpush7x.xyz/statweb955/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 5 IoCs
pid Process 1548 A248.exe 1944 A362.exe 1196 A778.exe 932 AB11.exe 912 ACF6.exe -
Deletes itself 1 IoCs
pid Process 1236 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\A248.exe A248.exe -
Loads dropped DLL 2 IoCs
pid Process 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 1236 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\A248.exe = "C:\\Windows\\System32\\A248.exe" A248.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2090973689-680783404-4292415065-1000\desktop.ini A248.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\A248.exe A248.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1420 set thread context of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 -
Drops file in Program Files directory 256 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\History.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll A248.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt A248.exe File created C:\Program Files\7-Zip\Lang\is.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\nb.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL A248.exe File created C:\Program Files\7-Zip\Lang\gu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt A248.exe File created C:\Program Files\7-Zip\Lang\ext.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ast.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\cs.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\descript.ion A248.exe File created C:\Program Files\7-Zip\Lang\fa.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt A248.exe File created C:\Program Files\7-Zip\Lang\be.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\bn.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt A248.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt A248.exe File created C:\Program Files\7-Zip\Lang\fr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ar.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\fur.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\msgfilt.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt A248.exe File opened for modification C:\Program Files\CheckpointFormat.M2TS.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\BackupCompress.reg A248.exe File created C:\Program Files\BackupCompress.reg.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\hr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\lv.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt A248.exe File created C:\Program Files\7-Zip\Lang\ka.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt A248.exe File created C:\Program Files\7-Zip\Lang\eu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\CheckpointFormat.M2TS A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\CGMIMP32.FLT.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\hy.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt A248.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe A248.exe File created C:\Program Files\7-Zip\descript.ion.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt A248.exe File created C:\Program Files\7-Zip\Lang\de.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF A248.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt A248.exe File created C:\Program Files\7-Zip\Lang\an.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EURO\MSOEURO.DLL A248.exe File created C:\Program Files\7-Zip\Lang\co.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt A248.exe File created C:\Program Files\7-Zip\Lang\da.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll A248.exe File created C:\Program Files\7-Zip\Lang\hi.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP A248.exe File created C:\Program Files\7-Zip\Lang\kk.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\az.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt A248.exe File created C:\Program Files\7-Zip\Lang\cy.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt A248.exe File opened for modification C:\Program Files\7-Zip\7z.sfx A248.exe File created C:\Program Files\7-Zip\Lang\en.ttt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt A248.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\lij.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt A248.exe File opened for modification C:\Program Files\7-Zip\descript.ion.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\kab.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ko.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\mng.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL A248.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt A248.exe File created C:\Program Files\7-Zip\Lang\br.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\7zG.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt A248.exe File created C:\Program Files\7-Zip\Lang\mk.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ba.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\7z.sfx.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ms.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt A248.exe File created C:\Program Files\7-Zip\Lang\ca.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\io.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ku.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\7z.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ga.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EURO\MSOEURO.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll A248.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\CGMIMP32.CFG A248.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\CheckpointFormat.M2TS.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\fi.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\mn.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\msgfilt.dll A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\CGMIMP32.CFG.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\CGMIMP32.FLT A248.exe File created C:\Program Files\7-Zip\Lang\af.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\7zCon.sfx.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\BackupCompress.reg.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\1033\EEINTL.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt A248.exe File opened for modification C:\Program Files\7-Zip\7zG.exe A248.exe File created C:\Program Files\7-Zip\7zFM.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.HLP.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt A248.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\7-zip.chm.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt A248.exe File created C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\CGMIMP32.CFG.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\bg.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7z.sfx.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt A248.exe File created C:\Program Files\7-Zip\Lang\gl.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt A248.exe File opened for modification C:\Program Files\7-Zip\History.txt A248.exe File created C:\Program Files\7-Zip\7-zip.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\et.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EQUATION\eqnedt32.exe.manifest.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\es.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\mr.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt A248.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Uninstall.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ja.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\ky.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm A248.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\lt.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\History.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\fy.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\he.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt A248.exe File created C:\Program Files\7-Zip\Lang\hu.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\eo.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\EQUATION\MTEXTRA.TTF.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\it.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EURO\MSOEURO.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\7-zip32.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7z.exe A248.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe A248.exe File created C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\el.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7z.dll.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7z.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt A248.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\7zG.exe.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File created C:\Program Files\7-Zip\Lang\id.txt.id-B43DDCC2.[telegram_@spacedatax].ROGER A248.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt A248.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt A248.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx A248.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1868 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 636 IoCs
pid Process 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1548 A248.exe 1236 Process not Found 1548 A248.exe 1236 Process not Found 1236 Process not Found 1236 Process not Found 1548 A248.exe 1236 Process not Found 1236 Process not Found 1236 Process not Found 1548 A248.exe 1236 Process not Found 1236 Process not Found 1236 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1800 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1236 Process not Found Token: SeShutdownPrivilege 1236 Process not Found -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 PID 1420 wrote to memory of 1800 1420 7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe 25 PID 1236 wrote to memory of 1548 1236 Process not Found 29 PID 1236 wrote to memory of 1548 1236 Process not Found 29 PID 1236 wrote to memory of 1548 1236 Process not Found 29 PID 1236 wrote to memory of 1548 1236 Process not Found 29 PID 1236 wrote to memory of 1944 1236 Process not Found 30 PID 1236 wrote to memory of 1944 1236 Process not Found 30 PID 1236 wrote to memory of 1944 1236 Process not Found 30 PID 1236 wrote to memory of 1944 1236 Process not Found 30 PID 1548 wrote to memory of 1912 1548 A248.exe 31 PID 1548 wrote to memory of 1912 1548 A248.exe 31 PID 1548 wrote to memory of 1912 1548 A248.exe 31 PID 1548 wrote to memory of 1912 1548 A248.exe 31 PID 1912 wrote to memory of 572 1912 cmd.exe 33 PID 1912 wrote to memory of 572 1912 cmd.exe 33 PID 1912 wrote to memory of 572 1912 cmd.exe 33 PID 1236 wrote to memory of 1196 1236 Process not Found 34 PID 1236 wrote to memory of 1196 1236 Process not Found 34 PID 1236 wrote to memory of 1196 1236 Process not Found 34 PID 1912 wrote to memory of 1868 1912 cmd.exe 35 PID 1912 wrote to memory of 1868 1912 cmd.exe 35 PID 1912 wrote to memory of 1868 1912 cmd.exe 35 PID 1236 wrote to memory of 932 1236 Process not Found 36 PID 1236 wrote to memory of 932 1236 Process not Found 36 PID 1236 wrote to memory of 932 1236 Process not Found 36 PID 1236 wrote to memory of 932 1236 Process not Found 36 PID 1236 wrote to memory of 912 1236 Process not Found 38 PID 1236 wrote to memory of 912 1236 Process not Found 38 PID 1236 wrote to memory of 912 1236 Process not Found 38 PID 1236 wrote to memory of 912 1236 Process not Found 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"C:\Users\Admin\AppData\Local\Temp\7c9eba57cb8262a908dc10929cf38b8e4e0af9f5a3f69bdf226b151761580e91.exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\A248.exeC:\Users\Admin\AppData\Local\Temp\A248.exe1⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:572
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\A362.exeC:\Users\Admin\AppData\Local\Temp\A362.exe1⤵
- Executes dropped EXE
PID:1944
-
C:\Users\Admin\AppData\Local\Temp\A778.exeC:\Users\Admin\AppData\Local\Temp\A778.exe1⤵
- Executes dropped EXE
PID:1196
-
C:\Users\Admin\AppData\Local\Temp\AB11.exeC:\Users\Admin\AppData\Local\Temp\AB11.exe1⤵
- Executes dropped EXE
PID:932
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\ACF6.exeC:\Users\Admin\AppData\Local\Temp\ACF6.exe1⤵
- Executes dropped EXE
PID:912