Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:17
Static task
static1
Behavioral task
behavioral1
Sample
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe
Resource
win10v20201028
General
-
Target
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe
-
Size
69KB
-
MD5
0537d845ba099c6f2b708124eda13f1c
-
SHA1
3fb77d821ea7ec2b30fd3944c3d9361093a58cd6
-
SHA256
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89
-
SHA512
dde034b4a807c1ac4d292df6945f4bd1eed42b021228318f4693b4af25301dec48b6173dec8b1a4bb573ba04d70f49454e003f72753eb0dfad939f28bd553d93
Malware Config
Extracted
C:\Users\Admin\E02CFE-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\ProgramData\Microsoft Help\E02CFE-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\E02CFE-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\UseConvertTo.crw => C:\Users\Admin\Pictures\UseConvertTo.crw.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\MountSync.raw => C:\Users\Admin\Pictures\MountSync.raw.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\SuspendShow.png => C:\Users\Admin\Pictures\SuspendShow.png.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\SaveUpdate.raw => C:\Users\Admin\Pictures\SaveUpdate.raw.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\RestartSave.raw => C:\Users\Admin\Pictures\RestartSave.raw.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\EnableEnter.crw => C:\Users\Admin\Pictures\EnableEnter.crw.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\ConvertFromReceive.crw => C:\Users\Admin\Pictures\ConvertFromReceive.crw.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\PingMeasure.raw => C:\Users\Admin\Pictures\PingMeasure.raw.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File renamed C:\Users\Admin\Pictures\HideAdd.tif => C:\Users\Admin\Pictures\HideAdd.tif.e02cfe 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Drops file in Program Files directory 7492 IoCs
Processes:
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.IT.XML 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21318_.GIF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15072_.GIF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\OrielFax.Dotx 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench3.nl_zh_4.4.0.v20140623020002.jar 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00246_.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AssemblyInfoInternal.zip 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\E02CFE-Readme.txt 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\artifacts.xml 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh89 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR15F.GIF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENGDIC.DAT 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\TAG.XSL 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105338.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01295_.GIF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00175_.GIF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.properties 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-oql_zh_CN.jar 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\El_Aaiun 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\CompleteExpand.TTS 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\BTINTERNET.NET.XML 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\background.gif 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086420.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\JAVA_01.MID 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Madeira 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.preferences_3.5.200.v20140224-1527.jar 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\dummy.luac 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV.HXS 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Workflow.Targets 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZFORM.XML 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03795_.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Oriel.eftx 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WCOMP98.POC 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02158_.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE06049_.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00402_.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Msgbox.accdt 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Sakhalin 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Taipei 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-queries_ja.jar 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSIDEBRV.XML 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN097.XML 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME23.CSS 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101865.BMP 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OCRVC.DAT 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECURE.CFG 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Hermosillo 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director_2.3.100.v20140224-1921.jar 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR8B.GIF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR47B.GIF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Foundry.thmx 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SaveAsRTF.api 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\ActiveTabImageMask.bmp 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow.css 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-settings_ja.jar 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\SWBELL.NET.XML 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\E02CFE-Readme.txt 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Oral 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02223U.BMP 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04225_.WMF 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\XmlFile.zip 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\DumontDUrville 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kamchatka 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1936 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 23598 IoCs
Processes:
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exepid process 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exevssvc.exedescription pid process Token: SeDebugPrivilege 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe Token: SeImpersonatePrivilege 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe Token: SeBackupPrivilege 1056 vssvc.exe Token: SeRestorePrivilege 1056 vssvc.exe Token: SeAuditPrivilege 1056 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exedescription pid process target process PID 1664 wrote to memory of 1936 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe vssadmin.exe PID 1664 wrote to memory of 1936 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe vssadmin.exe PID 1664 wrote to memory of 1936 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe vssadmin.exe PID 1664 wrote to memory of 1936 1664 12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe"C:\Users\Admin\AppData\Local\Temp\12717add64ecf32d7bcb6b2662becbff6b516cf8073f399dc5e4d3615d452e89.bin.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1936
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\E02CFE-Readme.txt"2⤵PID:3132
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1056