Analysis
-
max time kernel
62s -
max time network
37s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
20-01-2021 15:44
Static task
static1
Behavioral task
behavioral1
Sample
locker.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
locker.exe
Resource
win10v20201028
General
-
Target
locker.exe
-
Size
191KB
-
MD5
20f0c736a966142de88dee06a2e4a5b1
-
SHA1
afb2fe6b541069259b0fd9be82d62594a361afb0
-
SHA256
198667b1eda010a431dfb051a101cc73ead1d45ba8d0f6641ec1c14bca4106f3
-
SHA512
a012898e9e8cc6789cbaea7a36f54140f1b70c45b8874f2f5504ea3971494d5856f7f54aaa00dc37a3746362d85b54c665bc485f0e7d491ec99e9155950c7e43
Malware Config
Extracted
C:\readme.txt
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.best
Signatures
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
locker.exedescription ioc process File renamed C:\Users\Admin\Pictures\UnprotectPush.crw => C:\Users\Admin\Pictures\UnprotectPush.crw.KKBKR locker.exe File renamed C:\Users\Admin\Pictures\ClearRename.tif => C:\Users\Admin\Pictures\ClearRename.tif.KKBKR locker.exe File renamed C:\Users\Admin\Pictures\GrantSave.png => C:\Users\Admin\Pictures\GrantSave.png.KKBKR locker.exe File renamed C:\Users\Admin\Pictures\JoinEdit.png => C:\Users\Admin\Pictures\JoinEdit.png.KKBKR locker.exe File renamed C:\Users\Admin\Pictures\TestUnprotect.png => C:\Users\Admin\Pictures\TestUnprotect.png.KKBKR locker.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 39 IoCs
Processes:
locker.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\desktop.ini locker.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini locker.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini locker.exe File opened for modification C:\Users\Admin\Music\desktop.ini locker.exe File opened for modification C:\Users\Admin\Videos\desktop.ini locker.exe File opened for modification C:\Users\Public\Downloads\desktop.ini locker.exe File opened for modification C:\Program Files (x86)\desktop.ini locker.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini locker.exe File opened for modification C:\Users\Admin\Documents\desktop.ini locker.exe File opened for modification C:\Users\Public\Music\desktop.ini locker.exe File opened for modification C:\Users\Public\Videos\desktop.ini locker.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RKGIF8TT\desktop.ini locker.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini locker.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini locker.exe File opened for modification C:\Users\Admin\Searches\desktop.ini locker.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AT22T7OH\desktop.ini locker.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini locker.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini locker.exe File opened for modification C:\Users\Public\Documents\desktop.ini locker.exe File opened for modification C:\Users\Public\Pictures\desktop.ini locker.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini locker.exe File opened for modification C:\Users\Admin\Links\desktop.ini locker.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini locker.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini locker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini locker.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini locker.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini locker.exe File opened for modification C:\Users\Public\desktop.ini locker.exe File opened for modification C:\Users\Public\Desktop\desktop.ini locker.exe File opened for modification C:\Users\Public\Libraries\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\8DDKLDOL\desktop.ini locker.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\F6O5NPVK\desktop.ini locker.exe File opened for modification C:\Program Files\desktop.ini locker.exe -
Drops file in Program Files directory 8824 IoCs
Processes:
locker.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153089.WMF locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-ui.xml locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341448.JPG locker.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\readme.txt locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormToolImages.jpg locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR_K_COL.HXK locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\messageboxerror.ico locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\VeriSign_Class_3_Code_Signing_2001-4_CA.cer locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01630_.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.LEX locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Casey locker.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\readme.txt locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198226.WMF locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+12 locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-loaders.xml locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00799_.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02470U.BMP locker.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\tab_on.gif locker.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_content-background.png locker.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_GreenTea.gif locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsImageTemplate.html locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00442_.WMF locker.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_ButtonGraphic.png locker.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt locker.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt locker.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\readme.txt locker.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\readme.txt locker.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Martinique locker.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll locker.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\readme.txt locker.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\uk.pak locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Manaus locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107492.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200383.WMF locker.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\LAYERS.ELM locker.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\readme.txt locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02075_.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0281640.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SAFRI_01.MID locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Chatham locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00254_.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187863.WMF locker.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\San_Luis locker.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif locker.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\readme.txt locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-uisupport_ja.jar locker.exe File created C:\Program Files (x86)\MSBuild\readme.txt locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00438_.WMF locker.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\readme.txt locker.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\readme.txt locker.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-actions.jar locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TAIL.WMF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\EXPLODE.WAV locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\QUIKPUBS.POC locker.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\readme.txt locker.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\readme.txt locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\ADD.GIF locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Origin.xml locker.exe File opened for modification C:\Program Files (x86)\Windows Mail locker.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MENU.DPV locker.exe -
Suspicious behavior: EnumeratesProcesses 189 IoCs
Processes:
locker.exepid process 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe 776 locker.exe -
Suspicious use of AdjustPrivilegeToken 443 IoCs
Processes:
vssvc.exeWMIC.exeWMIC.exedescription pid process Token: SeBackupPrivilege 1292 vssvc.exe Token: SeRestorePrivilege 1292 vssvc.exe Token: SeAuditPrivilege 1292 vssvc.exe Token: SeIncreaseQuotaPrivilege 976 WMIC.exe Token: SeSecurityPrivilege 976 WMIC.exe Token: SeTakeOwnershipPrivilege 976 WMIC.exe Token: SeLoadDriverPrivilege 976 WMIC.exe Token: SeSystemProfilePrivilege 976 WMIC.exe Token: SeSystemtimePrivilege 976 WMIC.exe Token: SeProfSingleProcessPrivilege 976 WMIC.exe Token: SeIncBasePriorityPrivilege 976 WMIC.exe Token: SeCreatePagefilePrivilege 976 WMIC.exe Token: SeBackupPrivilege 976 WMIC.exe Token: SeRestorePrivilege 976 WMIC.exe Token: SeShutdownPrivilege 976 WMIC.exe Token: SeDebugPrivilege 976 WMIC.exe Token: SeSystemEnvironmentPrivilege 976 WMIC.exe Token: SeRemoteShutdownPrivilege 976 WMIC.exe Token: SeUndockPrivilege 976 WMIC.exe Token: SeManageVolumePrivilege 976 WMIC.exe Token: 33 976 WMIC.exe Token: 34 976 WMIC.exe Token: 35 976 WMIC.exe Token: SeIncreaseQuotaPrivilege 976 WMIC.exe Token: SeSecurityPrivilege 976 WMIC.exe Token: SeTakeOwnershipPrivilege 976 WMIC.exe Token: SeLoadDriverPrivilege 976 WMIC.exe Token: SeSystemProfilePrivilege 976 WMIC.exe Token: SeSystemtimePrivilege 976 WMIC.exe Token: SeProfSingleProcessPrivilege 976 WMIC.exe Token: SeIncBasePriorityPrivilege 976 WMIC.exe Token: SeCreatePagefilePrivilege 976 WMIC.exe Token: SeBackupPrivilege 976 WMIC.exe Token: SeRestorePrivilege 976 WMIC.exe Token: SeShutdownPrivilege 976 WMIC.exe Token: SeDebugPrivilege 976 WMIC.exe Token: SeSystemEnvironmentPrivilege 976 WMIC.exe Token: SeRemoteShutdownPrivilege 976 WMIC.exe Token: SeUndockPrivilege 976 WMIC.exe Token: SeManageVolumePrivilege 976 WMIC.exe Token: 33 976 WMIC.exe Token: 34 976 WMIC.exe Token: 35 976 WMIC.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeSecurityPrivilege 1588 WMIC.exe Token: SeTakeOwnershipPrivilege 1588 WMIC.exe Token: SeLoadDriverPrivilege 1588 WMIC.exe Token: SeSystemProfilePrivilege 1588 WMIC.exe Token: SeSystemtimePrivilege 1588 WMIC.exe Token: SeProfSingleProcessPrivilege 1588 WMIC.exe Token: SeIncBasePriorityPrivilege 1588 WMIC.exe Token: SeCreatePagefilePrivilege 1588 WMIC.exe Token: SeBackupPrivilege 1588 WMIC.exe Token: SeRestorePrivilege 1588 WMIC.exe Token: SeShutdownPrivilege 1588 WMIC.exe Token: SeDebugPrivilege 1588 WMIC.exe Token: SeSystemEnvironmentPrivilege 1588 WMIC.exe Token: SeRemoteShutdownPrivilege 1588 WMIC.exe Token: SeUndockPrivilege 1588 WMIC.exe Token: SeManageVolumePrivilege 1588 WMIC.exe Token: 33 1588 WMIC.exe Token: 34 1588 WMIC.exe Token: 35 1588 WMIC.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe -
Suspicious use of WriteProcessMemory 77 IoCs
Processes:
locker.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 776 wrote to memory of 432 776 locker.exe cmd.exe PID 776 wrote to memory of 432 776 locker.exe cmd.exe PID 776 wrote to memory of 432 776 locker.exe cmd.exe PID 776 wrote to memory of 432 776 locker.exe cmd.exe PID 432 wrote to memory of 976 432 cmd.exe WMIC.exe PID 432 wrote to memory of 976 432 cmd.exe WMIC.exe PID 432 wrote to memory of 976 432 cmd.exe WMIC.exe PID 776 wrote to memory of 1828 776 locker.exe cmd.exe PID 776 wrote to memory of 1828 776 locker.exe cmd.exe PID 776 wrote to memory of 1828 776 locker.exe cmd.exe PID 776 wrote to memory of 1828 776 locker.exe cmd.exe PID 1828 wrote to memory of 1588 1828 cmd.exe WMIC.exe PID 1828 wrote to memory of 1588 1828 cmd.exe WMIC.exe PID 1828 wrote to memory of 1588 1828 cmd.exe WMIC.exe PID 776 wrote to memory of 1648 776 locker.exe cmd.exe PID 776 wrote to memory of 1648 776 locker.exe cmd.exe PID 776 wrote to memory of 1648 776 locker.exe cmd.exe PID 776 wrote to memory of 1648 776 locker.exe cmd.exe PID 1648 wrote to memory of 672 1648 cmd.exe WMIC.exe PID 1648 wrote to memory of 672 1648 cmd.exe WMIC.exe PID 1648 wrote to memory of 672 1648 cmd.exe WMIC.exe PID 776 wrote to memory of 1176 776 locker.exe cmd.exe PID 776 wrote to memory of 1176 776 locker.exe cmd.exe PID 776 wrote to memory of 1176 776 locker.exe cmd.exe PID 776 wrote to memory of 1176 776 locker.exe cmd.exe PID 1176 wrote to memory of 1636 1176 cmd.exe WMIC.exe PID 1176 wrote to memory of 1636 1176 cmd.exe WMIC.exe PID 1176 wrote to memory of 1636 1176 cmd.exe WMIC.exe PID 776 wrote to memory of 1720 776 locker.exe cmd.exe PID 776 wrote to memory of 1720 776 locker.exe cmd.exe PID 776 wrote to memory of 1720 776 locker.exe cmd.exe PID 776 wrote to memory of 1720 776 locker.exe cmd.exe PID 1720 wrote to memory of 1356 1720 cmd.exe WMIC.exe PID 1720 wrote to memory of 1356 1720 cmd.exe WMIC.exe PID 1720 wrote to memory of 1356 1720 cmd.exe WMIC.exe PID 776 wrote to memory of 576 776 locker.exe cmd.exe PID 776 wrote to memory of 576 776 locker.exe cmd.exe PID 776 wrote to memory of 576 776 locker.exe cmd.exe PID 776 wrote to memory of 576 776 locker.exe cmd.exe PID 576 wrote to memory of 1100 576 cmd.exe WMIC.exe PID 576 wrote to memory of 1100 576 cmd.exe WMIC.exe PID 576 wrote to memory of 1100 576 cmd.exe WMIC.exe PID 776 wrote to memory of 1624 776 locker.exe cmd.exe PID 776 wrote to memory of 1624 776 locker.exe cmd.exe PID 776 wrote to memory of 1624 776 locker.exe cmd.exe PID 776 wrote to memory of 1624 776 locker.exe cmd.exe PID 1624 wrote to memory of 940 1624 cmd.exe WMIC.exe PID 1624 wrote to memory of 940 1624 cmd.exe WMIC.exe PID 1624 wrote to memory of 940 1624 cmd.exe WMIC.exe PID 776 wrote to memory of 664 776 locker.exe cmd.exe PID 776 wrote to memory of 664 776 locker.exe cmd.exe PID 776 wrote to memory of 664 776 locker.exe cmd.exe PID 776 wrote to memory of 664 776 locker.exe cmd.exe PID 664 wrote to memory of 640 664 cmd.exe WMIC.exe PID 664 wrote to memory of 640 664 cmd.exe WMIC.exe PID 664 wrote to memory of 640 664 cmd.exe WMIC.exe PID 776 wrote to memory of 1680 776 locker.exe cmd.exe PID 776 wrote to memory of 1680 776 locker.exe cmd.exe PID 776 wrote to memory of 1680 776 locker.exe cmd.exe PID 776 wrote to memory of 1680 776 locker.exe cmd.exe PID 1680 wrote to memory of 1600 1680 cmd.exe WMIC.exe PID 1680 wrote to memory of 1600 1680 cmd.exe WMIC.exe PID 1680 wrote to memory of 1600 1680 cmd.exe WMIC.exe PID 776 wrote to memory of 1356 776 locker.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\locker.exe"C:\Users\Admin\AppData\Local\Temp\locker.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6C94F5DE-71AA-4748-A6E4-65D732C8E17B}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6C94F5DE-71AA-4748-A6E4-65D732C8E17B}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AEAC8CFA-3DBF-4075-86C2-AEB4E13B8C8D}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AEAC8CFA-3DBF-4075-86C2-AEB4E13B8C8D}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C0A63CD4-7BC9-443E-B08E-F75B9AAA7BEE}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C0A63CD4-7BC9-443E-B08E-F75B9AAA7BEE}'" delete3⤵PID:672
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A8F9DEFE-0315-4860-BBD3-3EA51B04277B}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A8F9DEFE-0315-4860-BBD3-3EA51B04277B}'" delete3⤵PID:1636
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F485DFB7-940C-445F-89B0-830CD4C0C6AA}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F485DFB7-940C-445F-89B0-830CD4C0C6AA}'" delete3⤵PID:1356
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{62B550E8-FBB1-4E5A-8A36-2AD110607E82}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{62B550E8-FBB1-4E5A-8A36-2AD110607E82}'" delete3⤵PID:1100
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F5012BF2-8EBD-43FA-9BD9-AAC31516894B}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F5012BF2-8EBD-43FA-9BD9-AAC31516894B}'" delete3⤵PID:940
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9311D394-0691-49F4-9843-4698E19D71B7}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9311D394-0691-49F4-9843-4698E19D71B7}'" delete3⤵PID:640
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{114C0DA1-C29B-46BD-B65D-DC42616CE6F9}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{114C0DA1-C29B-46BD-B65D-DC42616CE6F9}'" delete3⤵PID:1600
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DCC28F2F-1AB0-404A-9561-EB252EC404F1}'" delete2⤵PID:1356
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DCC28F2F-1AB0-404A-9561-EB252EC404F1}'" delete3⤵PID:956
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07E5D5E7-4EB4-4081-AC00-CF87FFD39B2C}'" delete2⤵PID:976
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07E5D5E7-4EB4-4081-AC00-CF87FFD39B2C}'" delete3⤵PID:1632
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1292