Analysis
-
max time kernel
147s -
max time network
197s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe
Resource
win10v20210410
General
-
Target
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe
-
Size
35KB
-
MD5
592aafb1e6e8d972cf5b32ab96e0b9bc
-
SHA1
012c542b7ee058edb72f9ce0fc738ff34561e043
-
SHA256
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1
-
SHA512
f97cc86f2b92be722573258ee45ffcd662e4ef30ef7f3476ed877d52d4a08d5aed4aec635b1fbd7a44f9e45d01fc0375e47b1d801fbd37116a02aac6b3dee87c
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 1092 wbadmin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe\"" 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Montevideo 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MML2OMML.XSL 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-multitabs.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_down.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\delete_over.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\README.TXT 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-applemenu.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Shanghai 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00015_.WMF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Shared24x24ImagesMask.bmp 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\INVITE.XML 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\SettingsInternal.zip 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\vlc.mo 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_pressed.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341742.JPG 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00525_.WMF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SWEST_01.MID 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExpenseReport.xltx 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jakarta 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.common_2.10.1.v20140901-1043.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedQuanPin.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151067.WMF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341499.JPG 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0187423.WMF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME41.CSS 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.filesystem_1.4.100.v20140514-1614.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\access-bridge-64.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\New_York 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01300_.GIF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143746.GIF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\UnreadIcon.jpg 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\NUMERIC.JPG 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityLetter.Dotx 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-modules-options-api.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Ho_Chi_Minh 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf.[6757F04A].[[email protected]].makop 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\THMBNAIL.PNG 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR30F.GIF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\AddToViewArrowMask.bmp 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGMARQ.XML 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-1 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core_2.3.0.v20131211-1531.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-queries_ja.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216540.WMF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console.nl_zh_4.4.0.v20140623020002.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-ui.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107024.WMF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\TABOFF.JPG 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341654.JPG 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Vilnius 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\pdf.gif.[6757F04A].[[email protected]].makop 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1257.TXT.[6757F04A].[[email protected]].makop 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Macquarie 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.jasper.glassfish_2.2.2.v201205150955.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198494.WMF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1288 vssadmin.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 1660 vssvc.exe Token: SeRestorePrivilege 1660 vssvc.exe Token: SeAuditPrivilege 1660 vssvc.exe Token: SeBackupPrivilege 1136 wbengine.exe Token: SeRestorePrivilege 1136 wbengine.exe Token: SeSecurityPrivilege 1136 wbengine.exe Token: SeIncreaseQuotaPrivilege 968 WMIC.exe Token: SeSecurityPrivilege 968 WMIC.exe Token: SeTakeOwnershipPrivilege 968 WMIC.exe Token: SeLoadDriverPrivilege 968 WMIC.exe Token: SeSystemProfilePrivilege 968 WMIC.exe Token: SeSystemtimePrivilege 968 WMIC.exe Token: SeProfSingleProcessPrivilege 968 WMIC.exe Token: SeIncBasePriorityPrivilege 968 WMIC.exe Token: SeCreatePagefilePrivilege 968 WMIC.exe Token: SeBackupPrivilege 968 WMIC.exe Token: SeRestorePrivilege 968 WMIC.exe Token: SeShutdownPrivilege 968 WMIC.exe Token: SeDebugPrivilege 968 WMIC.exe Token: SeSystemEnvironmentPrivilege 968 WMIC.exe Token: SeRemoteShutdownPrivilege 968 WMIC.exe Token: SeUndockPrivilege 968 WMIC.exe Token: SeManageVolumePrivilege 968 WMIC.exe Token: 33 968 WMIC.exe Token: 34 968 WMIC.exe Token: 35 968 WMIC.exe Token: SeIncreaseQuotaPrivilege 968 WMIC.exe Token: SeSecurityPrivilege 968 WMIC.exe Token: SeTakeOwnershipPrivilege 968 WMIC.exe Token: SeLoadDriverPrivilege 968 WMIC.exe Token: SeSystemProfilePrivilege 968 WMIC.exe Token: SeSystemtimePrivilege 968 WMIC.exe Token: SeProfSingleProcessPrivilege 968 WMIC.exe Token: SeIncBasePriorityPrivilege 968 WMIC.exe Token: SeCreatePagefilePrivilege 968 WMIC.exe Token: SeBackupPrivilege 968 WMIC.exe Token: SeRestorePrivilege 968 WMIC.exe Token: SeShutdownPrivilege 968 WMIC.exe Token: SeDebugPrivilege 968 WMIC.exe Token: SeSystemEnvironmentPrivilege 968 WMIC.exe Token: SeRemoteShutdownPrivilege 968 WMIC.exe Token: SeUndockPrivilege 968 WMIC.exe Token: SeManageVolumePrivilege 968 WMIC.exe Token: 33 968 WMIC.exe Token: 34 968 WMIC.exe Token: 35 968 WMIC.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1672 1620 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe 30 PID 1620 wrote to memory of 1672 1620 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe 30 PID 1620 wrote to memory of 1672 1620 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe 30 PID 1620 wrote to memory of 1672 1620 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe 30 PID 1672 wrote to memory of 1288 1672 cmd.exe 32 PID 1672 wrote to memory of 1288 1672 cmd.exe 32 PID 1672 wrote to memory of 1288 1672 cmd.exe 32 PID 1672 wrote to memory of 1092 1672 cmd.exe 35 PID 1672 wrote to memory of 1092 1672 cmd.exe 35 PID 1672 wrote to memory of 1092 1672 cmd.exe 35 PID 1672 wrote to memory of 968 1672 cmd.exe 39 PID 1672 wrote to memory of 968 1672 cmd.exe 39 PID 1672 wrote to memory of 968 1672 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe"C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe"C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe" n16202⤵PID:1864
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1288
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:1092
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
-
C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe"C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe" n16202⤵PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe"C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe" n16202⤵PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe"C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.sample.exe" n16202⤵PID:1688
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:240
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:820