Analysis
-
max time kernel
87s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-04-2021 13:37
Static task
static1
Behavioral task
behavioral1
Sample
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe
Resource
win10v20210408
General
-
Target
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe
-
Size
79KB
-
MD5
d6fc9e993c69aceb7a5501641fc823fa
-
SHA1
7839b437b279d3f0ec22a57df7ea84ad01322c17
-
SHA256
ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76
-
SHA512
afd92c03d357ebbccd495017d5f7738ab83fadd865f008037a30ed326768c583acbb8858da73aea85b1b3c37d3dd4baeec4d0c9a0a09dd0bac26b15d65d7b3c6
Malware Config
Extracted
C:\How To Restore Your Files.txt
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/7907aef660251acf19895fb5a805cefa7d37819ccfad83835d1492d5d96bf286/
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/
http://tsu2dpiiv4zjzfyq73eibemit2qyrimbbb6lhpm6n5ihgallom5lhdyd.onion/9091cf99461b326d4bf5ed0eaa849a7c58e9678a426aa910392ea3e1f8cc85f6
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 20 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SplitRedo.png.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\CompleteDisconnect.tiff ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\CopyReset.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\MergeUnregister.tiff ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\MergeUnregister.tiff.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\ResolveRegister.tif => C:\Users\Admin\Pictures\ResolveRegister.tif.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\StopEdit.raw => C:\Users\Admin\Pictures\StopEdit.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\SplitRedo.png => C:\Users\Admin\Pictures\SplitRedo.png.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\BlockConvert.png.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\CopyReset.raw => C:\Users\Admin\Pictures\CopyReset.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\RestartEdit.raw => C:\Users\Admin\Pictures\RestartEdit.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\StopEdit.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\BlockConvert.png => C:\Users\Admin\Pictures\BlockConvert.png.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\JoinOut.tif => C:\Users\Admin\Pictures\JoinOut.tif.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\JoinOut.tif.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\ResolveRegister.tif.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\RestartEdit.raw.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\CompleteDisconnect.tiff => C:\Users\Admin\Pictures\CompleteDisconnect.tiff.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened for modification C:\Users\Admin\Pictures\CompleteDisconnect.tiff.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File renamed C:\Users\Admin\Pictures\MergeUnregister.tiff => C:\Users\Admin\Pictures\MergeUnregister.tiff.babyk ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\G: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\H: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\X: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\M: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\Q: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\E: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\Y: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\A: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\K: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\L: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\V: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\N: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\W: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\T: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\O: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\P: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\J: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\S: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\Z: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\B: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\R: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\U: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe File opened (read-only) \??\I: ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1604 vssadmin.exe 3956 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3992 vssvc.exe Token: SeRestorePrivilege 3992 vssvc.exe Token: SeAuditPrivilege 3992 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 1964 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 74 PID 860 wrote to memory of 1964 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 74 PID 1964 wrote to memory of 2072 1964 cmd.exe 76 PID 1964 wrote to memory of 2072 1964 cmd.exe 76 PID 2072 wrote to memory of 3248 2072 net.exe 77 PID 2072 wrote to memory of 3248 2072 net.exe 77 PID 860 wrote to memory of 2840 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 79 PID 860 wrote to memory of 2840 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 79 PID 2840 wrote to memory of 512 2840 cmd.exe 81 PID 2840 wrote to memory of 512 2840 cmd.exe 81 PID 512 wrote to memory of 1880 512 net.exe 82 PID 512 wrote to memory of 1880 512 net.exe 82 PID 860 wrote to memory of 200 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 83 PID 860 wrote to memory of 200 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 83 PID 200 wrote to memory of 940 200 cmd.exe 85 PID 200 wrote to memory of 940 200 cmd.exe 85 PID 940 wrote to memory of 2304 940 net.exe 86 PID 940 wrote to memory of 2304 940 net.exe 86 PID 860 wrote to memory of 3992 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 87 PID 860 wrote to memory of 3992 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 87 PID 3992 wrote to memory of 3396 3992 cmd.exe 89 PID 3992 wrote to memory of 3396 3992 cmd.exe 89 PID 3396 wrote to memory of 3648 3396 net.exe 90 PID 3396 wrote to memory of 3648 3396 net.exe 90 PID 860 wrote to memory of 1316 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 91 PID 860 wrote to memory of 1316 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 91 PID 1316 wrote to memory of 2124 1316 cmd.exe 93 PID 1316 wrote to memory of 2124 1316 cmd.exe 93 PID 2124 wrote to memory of 2144 2124 net.exe 94 PID 2124 wrote to memory of 2144 2124 net.exe 94 PID 860 wrote to memory of 2236 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 95 PID 860 wrote to memory of 2236 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 95 PID 2236 wrote to memory of 912 2236 cmd.exe 97 PID 2236 wrote to memory of 912 2236 cmd.exe 97 PID 912 wrote to memory of 3920 912 net.exe 98 PID 912 wrote to memory of 3920 912 net.exe 98 PID 860 wrote to memory of 3368 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 99 PID 860 wrote to memory of 3368 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 99 PID 3368 wrote to memory of 1788 3368 cmd.exe 101 PID 3368 wrote to memory of 1788 3368 cmd.exe 101 PID 1788 wrote to memory of 1972 1788 net.exe 102 PID 1788 wrote to memory of 1972 1788 net.exe 102 PID 860 wrote to memory of 3956 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 103 PID 860 wrote to memory of 3956 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 103 PID 3956 wrote to memory of 2072 3956 cmd.exe 105 PID 3956 wrote to memory of 2072 3956 cmd.exe 105 PID 2072 wrote to memory of 3292 2072 net.exe 106 PID 2072 wrote to memory of 3292 2072 net.exe 106 PID 860 wrote to memory of 580 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 107 PID 860 wrote to memory of 580 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 107 PID 580 wrote to memory of 416 580 cmd.exe 109 PID 580 wrote to memory of 416 580 cmd.exe 109 PID 416 wrote to memory of 2844 416 net.exe 110 PID 416 wrote to memory of 2844 416 net.exe 110 PID 860 wrote to memory of 188 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 111 PID 860 wrote to memory of 188 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 111 PID 188 wrote to memory of 2404 188 cmd.exe 113 PID 188 wrote to memory of 2404 188 cmd.exe 113 PID 2404 wrote to memory of 184 2404 net.exe 114 PID 2404 wrote to memory of 184 2404 net.exe 114 PID 860 wrote to memory of 740 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 115 PID 860 wrote to memory of 740 860 ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe 115 PID 740 wrote to memory of 2804 740 cmd.exe 117 PID 740 wrote to memory of 2804 740 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe"C:\Users\Admin\AppData\Local\Temp\ed0f154481261e9a08dcc4f7e4d396bce75526811216106daa70d4148c660d76.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop mssqlserver /y2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\net.exenet stop mssqlserver /y3⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mssqlserver /y4⤵PID:3248
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop vss /y2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\net.exenet stop vss /y3⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop vss /y4⤵PID:1880
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop sql /y2⤵
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Windows\system32\net.exenet stop sql /y3⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sql /y4⤵PID:2304
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop svc$ /y2⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\system32\net.exenet stop svc$ /y3⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop svc$ /y4⤵PID:3648
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop memtas /y2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\net.exenet stop memtas /y3⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop memtas /y4⤵PID:2144
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop mepocs /y2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\net.exenet stop mepocs /y3⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mepocs /y4⤵PID:3920
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop sophos /y2⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\system32\net.exenet stop sophos /y3⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sophos /y4⤵PID:1972
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop veeam /y2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\net.exenet stop veeam /y3⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop veeam /y4⤵PID:3292
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop backup /y2⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\net.exenet stop backup /y3⤵
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop backup /y4⤵PID:2844
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop GxVss /y2⤵
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Windows\system32\net.exenet stop GxVss /y3⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxVss /y4⤵PID:184
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop GxBlr /y2⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\net.exenet stop GxBlr /y3⤵PID:2804
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxBlr /y4⤵PID:496
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop GxFWD /y2⤵PID:764
-
C:\Windows\system32\net.exenet stop GxFWD /y3⤵PID:2192
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxFWD /y4⤵PID:2240
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop GxCVD /y2⤵PID:2244
-
C:\Windows\system32\net.exenet stop GxCVD /y3⤵PID:3916
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxCVD /y4⤵PID:2512
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop GxCIMgr /y2⤵PID:3420
-
C:\Windows\system32\net.exenet stop GxCIMgr /y3⤵PID:2000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GxCIMgr /y4⤵PID:2324
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop DefWatch /y2⤵PID:3796
-
C:\Windows\system32\net.exenet stop DefWatch /y3⤵PID:1848
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop DefWatch /y4⤵PID:3216
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop ccEvtMgr /y2⤵PID:512
-
C:\Windows\system32\net.exenet stop ccEvtMgr /y3⤵PID:2624
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y4⤵PID:192
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop ccSetMgr /y2⤵PID:1664
-
C:\Windows\system32\net.exenet stop ccSetMgr /y3⤵PID:3060
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y4⤵PID:2404
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop SavRoam /y2⤵PID:3752
-
C:\Windows\system32\net.exenet stop SavRoam /y3⤵PID:1324
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SavRoam /y4⤵PID:2816
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop RTVscan /y2⤵PID:2296
-
C:\Windows\system32\net.exenet stop RTVscan /y3⤵PID:2120
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop RTVscan /y4⤵PID:2164
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop QBFCService /y2⤵PID:2172
-
C:\Windows\system32\net.exenet stop QBFCService /y3⤵PID:3920
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBFCService /y4⤵PID:60
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop QBIDPService /y2⤵PID:2324
-
C:\Windows\system32\net.exenet stop QBIDPService /y3⤵PID:3640
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBIDPService /y4⤵PID:2072
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop Intuit.QuickBooks.FCS /y2⤵PID:3216
-
C:\Windows\system32\net.exenet stop Intuit.QuickBooks.FCS /y3⤵PID:2848
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y4⤵PID:3796
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop QBCFMonitorService /y2⤵PID:3592
-
C:\Windows\system32\net.exenet stop QBCFMonitorService /y3⤵PID:1880
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y4⤵PID:3280
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop YooBackup /y2⤵PID:2624
-
C:\Windows\system32\net.exenet stop YooBackup /y3⤵PID:1256
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooBackup /y4⤵PID:2340
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop YooIT /y2⤵PID:1856
-
C:\Windows\system32\net.exenet stop YooIT /y3⤵PID:2148
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooIT /y4⤵PID:1020
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop zhudongfangyu /y2⤵PID:3648
-
C:\Windows\system32\net.exenet stop zhudongfangyu /y3⤵PID:764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y4⤵PID:1200
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop sophos /y2⤵PID:2144
-
C:\Windows\system32\net.exenet stop sophos /y3⤵PID:2240
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sophos /y4⤵PID:3620
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop stc_raw_agent /y2⤵PID:60
-
C:\Windows\system32\net.exenet stop stc_raw_agent /y3⤵PID:2152
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y4⤵PID:3920
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop VSNAPVSS /y2⤵PID:3956
-
C:\Windows\system32\net.exenet stop VSNAPVSS /y3⤵PID:1972
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y4⤵PID:3204
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop VeeamTransportSvc /y2⤵PID:3496
-
C:\Windows\system32\net.exenet stop VeeamTransportSvc /y3⤵PID:2848
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y4⤵PID:736
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop VeeamDeploymentService /y2⤵PID:584
-
C:\Windows\system32\net.exenet stop VeeamDeploymentService /y3⤵PID:1880
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y4⤵PID:3592
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop VeeamNFSSvc /y2⤵PID:1604
-
C:\Windows\system32\net.exenet stop VeeamNFSSvc /y3⤵PID:768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y4⤵PID:2624
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop veeam /y2⤵PID:2340
-
C:\Windows\system32\net.exenet stop veeam /y3⤵PID:2148
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop veeam /y4⤵PID:1856
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop PDVFSService /y2⤵PID:972
-
C:\Windows\system32\net.exenet stop PDVFSService /y3⤵PID:764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop PDVFSService /y4⤵PID:3648
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop BackupExecVSSProvider /y2⤵PID:2296
-
C:\Windows\system32\net.exenet stop BackupExecVSSProvider /y3⤵PID:2240
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y4⤵PID:2144
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop BackupExecAgentAccelerator /y2⤵PID:588
-
C:\Windows\system32\net.exenet stop BackupExecAgentAccelerator /y3⤵PID:384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y4⤵PID:3916
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop BackupExecAgentBrowser /y2⤵PID:3424
-
C:\Windows\system32\net.exenet stop BackupExecAgentBrowser /y3⤵PID:1972
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y4⤵PID:3248
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop BackupExecDiveciMediaService /y2⤵PID:2840
-
C:\Windows\system32\net.exenet stop BackupExecDiveciMediaService /y3⤵PID:2848
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y4⤵PID:3496
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop BackupExecJobEngine /y2⤵PID:508
-
C:\Windows\system32\net.exenet stop BackupExecJobEngine /y3⤵PID:1880
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y4⤵PID:584
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop BackupExecManagementService /y2⤵PID:1664
-
C:\Windows\system32\net.exenet stop BackupExecManagementService /y3⤵PID:768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y4⤵PID:3548
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop BackupExecRPCService /y2⤵PID:3000
-
C:\Windows\system32\net.exenet stop BackupExecRPCService /y3⤵PID:2308
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y4⤵PID:2340
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop AcrSch2Svc /y2⤵PID:1172
-
C:\Windows\system32\net.exenet stop AcrSch2Svc /y3⤵PID:764
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y4⤵PID:1200
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop AcronisAgent /y2⤵PID:3540
-
C:\Windows\system32\net.exenet stop AcronisAgent /y3⤵PID:2244
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y4⤵PID:2236
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop CASAD2DWebSvc /y2⤵PID:2144
-
C:\Windows\system32\net.exenet stop CASAD2DWebSvc /y3⤵PID:384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y4⤵PID:3212
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop CAARCUpdateSvc /y2⤵PID:3876
-
C:\Windows\system32\net.exenet stop CAARCUpdateSvc /y3⤵PID:1972
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y4⤵PID:3424
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c net stop GoogleChromeElevationService /y2⤵PID:1964
-
C:\Windows\system32\net.exenet stop GoogleChromeElevationService /y3⤵PID:2848
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop GoogleChromeElevationService /y4⤵PID:3216
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:652
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:2272
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3956
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3992