Analysis
-
max time kernel
123s -
max time network
266s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09-07-2021 09:45
Static task
static1
Behavioral task
behavioral1
Sample
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe
Resource
win10v20210410
General
-
Target
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe
-
Size
144KB
-
MD5
89895cf4c88f13e5797aab63dddf1078
-
SHA1
1efc175983a17bd6c562fe7b054045d6dcb341e5
-
SHA256
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a
-
SHA512
d238fa264ad931ed43798a65f01cbe1d044300dbe5312bdcef8540f2757079514daae27f30f2369b7b811a3273c961f9fd38e7ae5010c11120c83906e8c102e2
Malware Config
Extracted
C:\$Recycle.Bin\RyukReadMe.html
ryuk
http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 2508 1073r.exe 2612 zpttZFcBylan.exe 3084 SocTmVGrelan.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3684 icacls.exe 3464 icacls.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\R: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\N: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\L: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\J: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\I: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\H: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\V: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\P: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\O: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\G: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\F: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\E: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\Y: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\Q: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\K: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\T: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\S: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\M: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\X: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\W: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\U: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.ja_5.5.0.165303.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.descriptorProvider.exsd 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.app_1.3.200.v20130910-1609.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-multitabs_ja.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\feature.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_zh_4.4.0.v20140623020002.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\blafdoc.css 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.contenttype_3.4.200.v20140207-1251.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.base_4.0.200.v20141007-2301.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.annotation_1.2.0.v201401042248.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\insertbase.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\COPYRIGHT 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\stopNetworkServer 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_fr.properties 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.engine_2.3.0.v20140506-1720.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\time-span-16.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.resources_3.9.1.v20140825-1431.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Stars.htm 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.alert.zh_CN_5.5.0.165303.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.jobs_3.6.0.v20140424-0053.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql.nl_ja_4.4.0.v20140623020002.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.text.nl_zh_4.4.0.v20140623020002.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-windows.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\artifacts.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer_3.2.200.v20140827-1444.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher_1.1.0.v20131211-1531.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\baseAltGr_rtl.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_zh_CN.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro_5.5.0.165303.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_zh_TW.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\about.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.lock 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.zh_CN_5.5.0.165303.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.httpcomponents.httpclient_4.2.6.v201311072007.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\IPSEventLogMsg.dll.mui 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_win.css 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-visual.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\THIRDPARTYLICENSEREADME.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\ij.bat 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\meta-index 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.renderers.swt.nl_ja_4.4.0.v20140623020002.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\org-openide-filesystems_zh_CN.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\ECLIPSE_.RSA 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.RSA 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\MANIFEST.MF 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\mailapi.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3980 4732 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2304 SCHTASKS.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2508 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 83 PID 3424 wrote to memory of 2508 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 83 PID 3424 wrote to memory of 2508 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 83 PID 3424 wrote to memory of 2612 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 84 PID 3424 wrote to memory of 2612 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 84 PID 3424 wrote to memory of 2612 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 84 PID 3424 wrote to memory of 3084 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 85 PID 3424 wrote to memory of 3084 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 85 PID 3424 wrote to memory of 3084 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 85 PID 3424 wrote to memory of 3684 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 86 PID 3424 wrote to memory of 3684 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 86 PID 3424 wrote to memory of 3684 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 86 PID 3424 wrote to memory of 3464 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 87 PID 3424 wrote to memory of 3464 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 87 PID 3424 wrote to memory of 3464 3424 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe"C:\Users\Admin\AppData\Local\Temp\8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\1073r.exe"C:\Users\Admin\AppData\Local\Temp\1073r.exe" 9 REP2⤵
- Executes dropped EXE
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\zpttZFcBylan.exe"C:\Users\Admin\AppData\Local\Temp\zpttZFcBylan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\SocTmVGrelan.exe"C:\Users\Admin\AppData\Local\Temp\SocTmVGrelan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:3084
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3684
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3464
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:1968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:4160
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:4972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:4268
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:4228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4360
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:5024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4436
-
-
-
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /CREATE /NP /SC DAILY /TN "PrintIv" /TR "C:\Windows\System32\cmd.exe /c for /l %x in (1,1,50) do start wordpad.exe /p C:\users\Public\WuPbJ.dll" /ST 10:25 /SD 07/10/2021 /ED 07/17/20212⤵
- Creates scheduled task(s)
PID:2304
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:5420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:5524
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:5460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:5548
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3464
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\SendAssert.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵PID:1112
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\BackupNew.jpeg" /ForceBootstrapPaint3D1⤵PID:3408
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\BackupNew.jpeg" /ForceBootstrapPaint3D1⤵PID:4860
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DsSvc1⤵PID:4100
-
C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca1⤵PID:4732
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4732 -s 37522⤵
- Program crash
PID:3980
-