Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20-04-2021 13:37
Static task
static1
Behavioral task
behavioral1
Sample
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe
Resource
win10v20210408
General
-
Target
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe
-
Size
79KB
-
MD5
d6fc9e993c69aceb7a5501641fc823fa
-
SHA1
7839b437b279d3f0ec22a57df7ea84ad01322c17
-
SHA256
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76
-
SHA512
afd92c03d357ebbccd495017d5f7738ab83fadd865f008037a30ed326768c583acbb8858da73aea85b1b3c37d3dd4baeec4d0c9a0a09dd0bac26b15d65d7b3c6
Malware Config
Extracted
C:\How To Restore Your Files.txt
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/7907aef660251acf19895fb5a805cefa7d37819ccfad83835d1492d5d96bf286/
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/
http://tsu2dpiiv4zjzfyq73eibemit2qyrimbbb6lhpm6n5ihgallom5lhdyd.onion/9091cf99461b326d4bf5ed0eaa849a7c58e9678a426aa910392ea3e1f8cc85f6
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\NewFind.raw => C:\Users\Admin\Pictures\NewFind.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\NewFind.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\RedoImport.crw => C:\Users\Admin\Pictures\RedoImport.crw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\RedoImport.crw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\RenameLimit.tif => C:\Users\Admin\Pictures\RenameLimit.tif.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\RenameLimit.tif.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\E: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\R: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\I: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\P: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\B: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\W: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\T: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\S: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\H: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\K: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\N: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\U: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\G: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\L: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\Z: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\V: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\M: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\Y: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\O: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\A: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\F: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\J: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\X: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1884 vssadmin.exe 1600 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 860 vssvc.exe Token: SeRestorePrivilege 860 vssvc.exe Token: SeAuditPrivilege 860 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 768 wrote to memory of 1176 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 26 PID 768 wrote to memory of 1176 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 26 PID 768 wrote to memory of 1176 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 26 PID 768 wrote to memory of 1176 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 26 PID 1176 wrote to memory of 1984 1176 cmd.exe 28 PID 1176 wrote to memory of 1984 1176 cmd.exe 28 PID 1176 wrote to memory of 1984 1176 cmd.exe 28 PID 1984 wrote to memory of 1848 1984 net.exe 29 PID 1984 wrote to memory of 1848 1984 net.exe 29 PID 1984 wrote to memory of 1848 1984 net.exe 29 PID 768 wrote to memory of 1792 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 30 PID 768 wrote to memory of 1792 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 30 PID 768 wrote to memory of 1792 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 30 PID 768 wrote to memory of 1792 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 30 PID 1792 wrote to memory of 1768 1792 cmd.exe 32 PID 1792 wrote to memory of 1768 1792 cmd.exe 32 PID 1792 wrote to memory of 1768 1792 cmd.exe 32 PID 1768 wrote to memory of 1808 1768 net.exe 33 PID 1768 wrote to memory of 1808 1768 net.exe 33 PID 1768 wrote to memory of 1808 1768 net.exe 33 PID 768 wrote to memory of 1756 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 34 PID 768 wrote to memory of 1756 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 34 PID 768 wrote to memory of 1756 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 34 PID 768 wrote to memory of 1756 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 34 PID 1756 wrote to memory of 1384 1756 cmd.exe 36 PID 1756 wrote to memory of 1384 1756 cmd.exe 36 PID 1756 wrote to memory of 1384 1756 cmd.exe 36 PID 1384 wrote to memory of 1240 1384 net.exe 37 PID 1384 wrote to memory of 1240 1384 net.exe 37 PID 1384 wrote to memory of 1240 1384 net.exe 37 PID 768 wrote to memory of 848 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 38 PID 768 wrote to memory of 848 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 38 PID 768 wrote to memory of 848 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 38 PID 768 wrote to memory of 848 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 38 PID 848 wrote to memory of 1552 848 cmd.exe 40 PID 848 wrote to memory of 1552 848 cmd.exe 40 PID 848 wrote to memory of 1552 848 cmd.exe 40 PID 1552 wrote to memory of 1436 1552 net.exe 41 PID 1552 wrote to memory of 1436 1552 net.exe 41 PID 1552 wrote to memory of 1436 1552 net.exe 41 PID 768 wrote to memory of 1284 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 42 PID 768 wrote to memory of 1284 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 42 PID 768 wrote to memory of 1284 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 42 PID 768 wrote to memory of 1284 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 42 PID 1284 wrote to memory of 1584 1284 cmd.exe 44 PID 1284 wrote to memory of 1584 1284 cmd.exe 44 PID 1284 wrote to memory of 1584 1284 cmd.exe 44 PID 1584 wrote to memory of 300 1584 net.exe 45 PID 1584 wrote to memory of 300 1584 net.exe 45 PID 1584 wrote to memory of 300 1584 net.exe 45 PID 768 wrote to memory of 292 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 46 PID 768 wrote to memory of 292 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 46 PID 768 wrote to memory of 292 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 46 PID 768 wrote to memory of 292 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 46 PID 292 wrote to memory of 112 292 cmd.exe 48 PID 292 wrote to memory of 112 292 cmd.exe 48 PID 292 wrote to memory of 112 292 cmd.exe 48 PID 112 wrote to memory of 332 112 net.exe 49 PID 112 wrote to memory of 332 112 net.exe 49 PID 112 wrote to memory of 332 112 net.exe 49 PID 768 wrote to memory of 1500 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 50 PID 768 wrote to memory of 1500 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 50 PID 768 wrote to memory of 1500 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 50 PID 768 wrote to memory of 1500 768 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe"C:\Users\Admin\AppData\Local\Temp\ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\system32\cmd.execmd.exe /c net stop mssqlserver /y2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\net.exenet stop mssqlserver /y3⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mssqlserver /y4⤵PID:1848
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop vss /y2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\net.exenet stop vss /y3⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop vss /y4⤵PID:1808
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop sql /y2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\net.exenet stop sql /y3⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sql /y4⤵PID:1240
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop svc$ /y2⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\net.exenet stop svc$ /y3⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop svc$ /y4⤵PID:1436
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop memtas /y2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\net.exenet stop memtas /y3⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop memtas /y4⤵PID:300
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop mepocs /y2⤵
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\system32\net.exenet stop mepocs /y3⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mepocs /y4⤵PID:332
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop sophos /y2⤵PID:1500
-
C:\Windows\system32\net.exenet stop sophos /y3⤵PID:340
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sophos /y4⤵PID:1184
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop veeam /y2⤵PID:1532
-
C:\Windows\system32\net.exenet stop veeam /y3⤵PID:1648
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop veeam /y4⤵PID:324
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop backup /y2⤵PID:1516
-
C:\Windows\system32\net.exenet stop backup /y3⤵PID:1496
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop backup /y4⤵PID:860
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop GxVss /y2⤵PID:608
-
C:\Windows\system32\net.exenet stop GxVss /y3⤵PID:1112
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxVss /y4⤵PID:1568
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop GxBlr /y2⤵PID:1944
-
C:\Windows\system32\net.exenet stop GxBlr /y3⤵PID:1720
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxBlr /y4⤵PID:1668
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop GxFWD /y2⤵PID:1760
-
C:\Windows\system32\net.exenet stop GxFWD /y3⤵PID:1912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxFWD /y4⤵PID:1848
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop GxCVD /y2⤵PID:2000
-
C:\Windows\system32\net.exenet stop GxCVD /y3⤵PID:1800
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxCVD /y4⤵PID:1808
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop GxCIMgr /y2⤵PID:1764
-
C:\Windows\system32\net.exenet stop GxCIMgr /y3⤵PID:1156
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxCIMgr /y4⤵PID:1384
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop DefWatch /y2⤵PID:1552
-
C:\Windows\system32\net.exenet stop DefWatch /y3⤵PID:1284
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop DefWatch /y4⤵PID:832
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop ccEvtMgr /y2⤵PID:112
-
C:\Windows\system32\net.exenet stop ccEvtMgr /y3⤵PID:1072
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y4⤵PID:612
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop ccSetMgr /y2⤵PID:928
-
C:\Windows\system32\net.exenet stop ccSetMgr /y3⤵PID:1064
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y4⤵PID:912
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop SavRoam /y2⤵PID:996
-
C:\Windows\system32\net.exenet stop SavRoam /y3⤵PID:1424
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SavRoam /y4⤵PID:1972
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop RTVscan /y2⤵PID:608
-
C:\Windows\system32\net.exenet stop RTVscan /y3⤵PID:296
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop RTVscan /y4⤵PID:2020
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop QBFCService /y2⤵PID:1944
-
C:\Windows\system32\net.exenet stop QBFCService /y3⤵PID:1984
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBFCService /y4⤵PID:1144
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop QBIDPService /y2⤵PID:1656
-
C:\Windows\system32\net.exenet stop QBIDPService /y3⤵PID:1768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBIDPService /y4⤵PID:1820
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop Intuit.QuickBooks.FCS /y2⤵PID:1600
-
C:\Windows\system32\net.exenet stop Intuit.QuickBooks.FCS /y3⤵PID:1176
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y4⤵PID:2000
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop QBCFMonitorService /y2⤵PID:1748
-
C:\Windows\system32\net.exenet stop QBCFMonitorService /y3⤵PID:1384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y4⤵PID:1156
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop YooBackup /y2⤵PID:1776
-
C:\Windows\system32\net.exenet stop YooBackup /y3⤵PID:1412
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooBackup /y4⤵PID:1012
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop YooIT /y2⤵PID:1348
-
C:\Windows\system32\net.exenet stop YooIT /y3⤵PID:1552
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooIT /y4⤵PID:1184
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop zhudongfangyu /y2⤵PID:824
-
C:\Windows\system32\net.exenet stop zhudongfangyu /y3⤵PID:432
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y4⤵PID:1884
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop sophos /y2⤵PID:864
-
C:\Windows\system32\net.exenet stop sophos /y3⤵PID:912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sophos /y4⤵PID:1064
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop stc_raw_agent /y2⤵PID:928
-
C:\Windows\system32\net.exenet stop stc_raw_agent /y3⤵PID:1028
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop VSNAPVSS /y2⤵PID:1972
-
C:\Windows\system32\net.exenet stop VSNAPVSS /y3⤵PID:1516
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y4⤵PID:700
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop VeeamTransportSvc /y2⤵PID:1668
-
C:\Windows\system32\net.exenet stop VeeamTransportSvc /y3⤵PID:296
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y4⤵PID:608
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop VeeamDeploymentService /y2⤵PID:1956
-
C:\Windows\system32\net.exenet stop VeeamDeploymentService /y3⤵PID:1912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y4⤵PID:1980
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop VeeamNFSSvc /y2⤵PID:1804
-
C:\Windows\system32\net.exenet stop VeeamNFSSvc /y3⤵PID:1620
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y4⤵PID:1820
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop veeam /y2⤵PID:1768
-
C:\Windows\system32\net.exenet stop veeam /y3⤵PID:1744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop veeam /y4⤵PID:1624
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop PDVFSService /y2⤵PID:1988
-
C:\Windows\system32\net.exenet stop PDVFSService /y3⤵PID:1740
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop PDVFSService /y4⤵PID:1204
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop BackupExecVSSProvider /y2⤵PID:1340
-
C:\Windows\system32\net.exenet stop BackupExecVSSProvider /y3⤵PID:880
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y4⤵PID:832
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop BackupExecAgentAccelerator /y2⤵PID:268
-
C:\Windows\system32\net.exenet stop BackupExecAgentAccelerator /y3⤵PID:1764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y4⤵PID:1500
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop BackupExecAgentBrowser /y2⤵PID:1716
-
C:\Windows\system32\net.exenet stop BackupExecAgentBrowser /y3⤵PID:316
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y4⤵PID:1884
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop BackupExecDiveciMediaService /y2⤵PID:612
-
C:\Windows\system32\net.exenet stop BackupExecDiveciMediaService /y3⤵PID:912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y4⤵PID:864
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop BackupExecJobEngine /y2⤵PID:576
-
C:\Windows\system32\net.exenet stop BackupExecJobEngine /y3⤵PID:1532
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y4⤵PID:1648
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop BackupExecManagementService /y2⤵PID:700
-
C:\Windows\system32\net.exenet stop BackupExecManagementService /y3⤵PID:996
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y4⤵PID:2020
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop BackupExecRPCService /y2⤵PID:608
-
C:\Windows\system32\net.exenet stop BackupExecRPCService /y3⤵PID:1572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y4⤵PID:1848
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop AcrSch2Svc /y2⤵PID:1980
-
C:\Windows\system32\net.exenet stop AcrSch2Svc /y3⤵PID:1992
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y4⤵PID:1944
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop AcronisAgent /y2⤵PID:1820
-
C:\Windows\system32\net.exenet stop AcronisAgent /y3⤵PID:1808
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y4⤵PID:1788
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop CASAD2DWebSvc /y2⤵PID:1624
-
C:\Windows\system32\net.exenet stop CASAD2DWebSvc /y3⤵PID:1996
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y4⤵PID:1600
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop CAARCUpdateSvc /y2⤵PID:1204
-
C:\Windows\system32\net.exenet stop CAARCUpdateSvc /y3⤵PID:1780
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y4⤵PID:1748
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net stop GoogleChromeElevationService /y2⤵PID:832
-
C:\Windows\system32\net.exenet stop GoogleChromeElevationService /y3⤵PID:1784
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GoogleChromeElevationService /y4⤵PID:1776
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:1412
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:1604
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1600
-
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y1⤵PID:1672
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:860