Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
10-05-2021 02:38
Static task
static1
Behavioral task
behavioral1
Sample
f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe
Resource
win10v20210410
General
-
Target
f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe
-
Size
275KB
-
MD5
fcd76b66fe9f80581a7255e3d43ac450
-
SHA1
fdf1fd8d3935e3f076fd4c12e6b3744bf82826a4
-
SHA256
f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161
-
SHA512
27fbf11f3cdf34d561c364b651058b0fa3c5be02206b34482f627a7f12f1a691e3bdc97bd385b8c70e633f9ef90e54a88ab1188cceab9ae48c10eeac6f9292d9
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 768 wbadmin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_up.png f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\eclipse.inf f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+1 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18233_.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PS10TARG.POC f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.properties f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench3.nl_ja_4.4.0.v20140623020002.jar f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\readme-warning.txt f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WWINTL.REST.IDX_DLL f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0102594.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15035_.GIF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106958.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_center.gif f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\grvschema.xsd f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Hovd f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD19563_.GIF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler.jar f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01586_.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-api-visual.xml f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-api_zh_CN.jar f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-tabcontrol.xml f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedShuangPin.txt f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\PABR.SAM f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_left_disable.gif f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.HTM f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\ResourceInternal.zip f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\readme-warning.txt f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor.nl_ja_4.4.0.v20140623020002.jar f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\SignedManagedObjects.cer f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02356_.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.nl_ja_4.4.0.v20140623020002.jar f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jre7\lib\resources.jar f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.IT.XML f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.RSA f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.nl_ja_4.4.0.v20140623020002.jar f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0293800.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_h.png f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0149118.JPG f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02862_.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-api.xml f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\vlc.mo f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_right.png f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_hover.png f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR1B.GIF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\blacklist f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152688.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02755U.BMP f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18211_.WMF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis.css f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_ring_docked.png f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_LinkDrop32x32.gif f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Barbados f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jre7\lib\net.properties f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14981_.GIF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21302_.GIF f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Creston f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodicon.gif f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\item_hover_docked.png f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Data1.cab f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\dialdot.png f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1304 vssadmin.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1268 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 840 vssvc.exe Token: SeRestorePrivilege 840 vssvc.exe Token: SeAuditPrivilege 840 vssvc.exe Token: SeBackupPrivilege 1092 wbengine.exe Token: SeRestorePrivilege 1092 wbengine.exe Token: SeSecurityPrivilege 1092 wbengine.exe Token: SeIncreaseQuotaPrivilege 1312 WMIC.exe Token: SeSecurityPrivilege 1312 WMIC.exe Token: SeTakeOwnershipPrivilege 1312 WMIC.exe Token: SeLoadDriverPrivilege 1312 WMIC.exe Token: SeSystemProfilePrivilege 1312 WMIC.exe Token: SeSystemtimePrivilege 1312 WMIC.exe Token: SeProfSingleProcessPrivilege 1312 WMIC.exe Token: SeIncBasePriorityPrivilege 1312 WMIC.exe Token: SeCreatePagefilePrivilege 1312 WMIC.exe Token: SeBackupPrivilege 1312 WMIC.exe Token: SeRestorePrivilege 1312 WMIC.exe Token: SeShutdownPrivilege 1312 WMIC.exe Token: SeDebugPrivilege 1312 WMIC.exe Token: SeSystemEnvironmentPrivilege 1312 WMIC.exe Token: SeRemoteShutdownPrivilege 1312 WMIC.exe Token: SeUndockPrivilege 1312 WMIC.exe Token: SeManageVolumePrivilege 1312 WMIC.exe Token: 33 1312 WMIC.exe Token: 34 1312 WMIC.exe Token: 35 1312 WMIC.exe Token: SeIncreaseQuotaPrivilege 1312 WMIC.exe Token: SeSecurityPrivilege 1312 WMIC.exe Token: SeTakeOwnershipPrivilege 1312 WMIC.exe Token: SeLoadDriverPrivilege 1312 WMIC.exe Token: SeSystemProfilePrivilege 1312 WMIC.exe Token: SeSystemtimePrivilege 1312 WMIC.exe Token: SeProfSingleProcessPrivilege 1312 WMIC.exe Token: SeIncBasePriorityPrivilege 1312 WMIC.exe Token: SeCreatePagefilePrivilege 1312 WMIC.exe Token: SeBackupPrivilege 1312 WMIC.exe Token: SeRestorePrivilege 1312 WMIC.exe Token: SeShutdownPrivilege 1312 WMIC.exe Token: SeDebugPrivilege 1312 WMIC.exe Token: SeSystemEnvironmentPrivilege 1312 WMIC.exe Token: SeRemoteShutdownPrivilege 1312 WMIC.exe Token: SeUndockPrivilege 1312 WMIC.exe Token: SeManageVolumePrivilege 1312 WMIC.exe Token: 33 1312 WMIC.exe Token: 34 1312 WMIC.exe Token: 35 1312 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1716 1268 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe 28 PID 1268 wrote to memory of 1716 1268 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe 28 PID 1268 wrote to memory of 1716 1268 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe 28 PID 1268 wrote to memory of 1716 1268 f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe 28 PID 1716 wrote to memory of 1304 1716 cmd.exe 30 PID 1716 wrote to memory of 1304 1716 cmd.exe 30 PID 1716 wrote to memory of 1304 1716 cmd.exe 30 PID 1716 wrote to memory of 768 1716 cmd.exe 35 PID 1716 wrote to memory of 768 1716 cmd.exe 35 PID 1716 wrote to memory of 768 1716 cmd.exe 35 PID 1716 wrote to memory of 1312 1716 cmd.exe 39 PID 1716 wrote to memory of 1312 1716 cmd.exe 39 PID 1716 wrote to memory of 1312 1716 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe"C:\Users\Admin\AppData\Local\Temp\f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe"1⤵
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe"C:\Users\Admin\AppData\Local\Temp\f45288e0e78141dad0f01666bdf430a40caef6af174f293db0f1247d0a0a4161.exe" n12682⤵PID:1776
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1304
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:768
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:840
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1984
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1004
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\readme-warning.txt1⤵PID:1312
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:236