Analysis
-
max time kernel
48s -
max time network
55s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe
Resource
win10v20210408
General
-
Target
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe
-
Size
423KB
-
MD5
055c2fba242d03ae153be4a796c55ae2
-
SHA1
be71b94e30d5465d8b72e1fc7c0137024f97baee
-
SHA256
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024
-
SHA512
20b31f6db488d26c1f7564106e455a77461e8a9934718e72c6c917e3ec688a9a597a05f1b93584fd88d3e867f09a470eb90094e27c2525939894973d31498890
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
hakbit
daaaataaaaa@protonmail.com
1Kex5QmBGtJLDagn3o2p1yoqyKn2A6EFG9
Signatures
-
Hakbit
Ransomware which encrypts files using AES, first seen in November 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exedescription ioc process File created C:\Users\Admin\Pictures\TraceRevoke.tiff.crypted 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe File opened for modification C:\Users\Admin\Pictures\TraceRevoke.tiff 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1620 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc process File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Atention..." 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "All your files were encrypted, if you want to get them all back, please carefully read the text note located in your desktop..." 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 1772 vssadmin.exe 1392 vssadmin.exe 936 vssadmin.exe 1852 vssadmin.exe 1480 vssadmin.exe 696 vssadmin.exe 1736 vssadmin.exe 224 vssadmin.exe 1052 vssadmin.exe 1764 vssadmin.exe 572 vssadmin.exe 1072 vssadmin.exe 1628 vssadmin.exe 208 vssadmin.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 876 taskkill.exe 568 taskkill.exe 1476 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 960 notepad.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exepid process 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exetaskkill.exetaskkill.exetaskkill.exevssvc.exedescription pid process Token: SeDebugPrivilege 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe Token: SeDebugPrivilege 876 taskkill.exe Token: SeDebugPrivilege 568 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeBackupPrivilege 1732 vssvc.exe Token: SeRestorePrivilege 1732 vssvc.exe Token: SeAuditPrivilege 1732 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exepid process 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exepid process 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1140 wrote to memory of 1176 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1176 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1176 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1176 wrote to memory of 1612 1176 net.exe net1.exe PID 1176 wrote to memory of 1612 1176 net.exe net1.exe PID 1176 wrote to memory of 1612 1176 net.exe net1.exe PID 1140 wrote to memory of 1752 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1752 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1752 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1752 wrote to memory of 1876 1752 net.exe net1.exe PID 1752 wrote to memory of 1876 1752 net.exe net1.exe PID 1752 wrote to memory of 1876 1752 net.exe net1.exe PID 1140 wrote to memory of 1720 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1720 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1720 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1720 wrote to memory of 336 1720 net.exe net1.exe PID 1720 wrote to memory of 336 1720 net.exe net1.exe PID 1720 wrote to memory of 336 1720 net.exe net1.exe PID 1140 wrote to memory of 1760 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1760 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1760 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1760 wrote to memory of 1604 1760 net.exe net1.exe PID 1760 wrote to memory of 1604 1760 net.exe net1.exe PID 1760 wrote to memory of 1604 1760 net.exe net1.exe PID 1140 wrote to memory of 1756 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1756 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1140 wrote to memory of 1756 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe net.exe PID 1756 wrote to memory of 528 1756 net.exe net1.exe PID 1756 wrote to memory of 528 1756 net.exe net1.exe PID 1756 wrote to memory of 528 1756 net.exe net1.exe PID 1140 wrote to memory of 1800 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1800 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1800 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1680 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1680 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1680 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1676 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1676 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 1676 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 668 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 668 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 668 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe sc.exe PID 1140 wrote to memory of 876 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 876 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 876 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 568 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 568 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 568 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 1476 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 1476 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 1476 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe taskkill.exe PID 1140 wrote to memory of 1772 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 1772 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 1772 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 696 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 696 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 696 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 1392 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 1392 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 1392 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 936 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 936 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 936 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe PID 1140 wrote to memory of 1736 1140 4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe"C:\Users\Admin\AppData\Local\Temp\4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe"
- Modifies extensions of user files
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exe"net.exe" stop avpsus /y
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop avpsus /y
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeDLPAgentService /y
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y
-
C:\Windows\system32\net.exe"net.exe" stop mfewc /y
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfewc /y
-
C:\Windows\system32\net.exe"net.exe" stop BMR Boot Service /y
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y
-
C:\Windows\system32\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
-
C:\Windows\system32\sc.exe"sc.exe" config SQLWriter start= disabled
-
C:\Windows\system32\sc.exe"sc.exe" config SstpSvc start= disabled
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet
- Interacts with shadow copies
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
- Opens file in notepad (likely ransom note)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\4984825fb21206a2f2df5d2c84794f0ac4edea3c48d32e9284338d7082d55024.sample.exe
- Deletes itself
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 3
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Downloads
-
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txtMD5
8a23fe4b5999dd0c8e5bfee03a2fce51
SHA13ee09af68ea39f8e0ae4057ccc0ad5da7e75df1e
SHA25668db550814d9b7f6b69f6f1b35f697d7cd2709397cdb0a26100f1fc628eba479
SHA512801fe1987974b510d6a73590434bc11d2a5dcbe754d3ceeae439c4b39959b99a8fe7a9aba5a960dd2ee2e8d3a164d1c114bae974d8e96306a1fecd9ad54453f8
-
memory/204-98-0x0000000000000000-mapping.dmp
-
memory/208-93-0x0000000000000000-mapping.dmp
-
memory/224-87-0x0000000000000000-mapping.dmp
-
memory/336-67-0x0000000000000000-mapping.dmp
-
memory/528-71-0x0000000000000000-mapping.dmp
-
memory/568-78-0x0000000000000000-mapping.dmp
-
memory/572-92-0x0000000000000000-mapping.dmp
-
memory/668-75-0x0000000000000000-mapping.dmp
-
memory/696-81-0x0000000000000000-mapping.dmp
-
memory/876-76-0x0000000000000000-mapping.dmp
-
memory/936-83-0x0000000000000000-mapping.dmp
-
memory/960-95-0x000007FEFB931000-0x000007FEFB933000-memory.dmpFilesize
8KB
-
memory/960-94-0x0000000000000000-mapping.dmp
-
memory/1052-90-0x0000000000000000-mapping.dmp
-
memory/1072-85-0x0000000000000000-mapping.dmp
-
memory/1140-60-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/1140-77-0x000000001AE10000-0x000000001AE12000-memory.dmpFilesize
8KB
-
memory/1176-62-0x0000000000000000-mapping.dmp
-
memory/1392-82-0x0000000000000000-mapping.dmp
-
memory/1476-79-0x0000000000000000-mapping.dmp
-
memory/1480-89-0x0000000000000000-mapping.dmp
-
memory/1604-69-0x0000000000000000-mapping.dmp
-
memory/1612-63-0x0000000000000000-mapping.dmp
-
memory/1620-97-0x0000000000000000-mapping.dmp
-
memory/1628-86-0x0000000000000000-mapping.dmp
-
memory/1676-74-0x0000000000000000-mapping.dmp
-
memory/1680-73-0x0000000000000000-mapping.dmp
-
memory/1720-66-0x0000000000000000-mapping.dmp
-
memory/1736-84-0x0000000000000000-mapping.dmp
-
memory/1752-64-0x0000000000000000-mapping.dmp
-
memory/1756-70-0x0000000000000000-mapping.dmp
-
memory/1760-68-0x0000000000000000-mapping.dmp
-
memory/1764-91-0x0000000000000000-mapping.dmp
-
memory/1772-80-0x0000000000000000-mapping.dmp
-
memory/1800-72-0x0000000000000000-mapping.dmp
-
memory/1852-88-0x0000000000000000-mapping.dmp
-
memory/1876-65-0x0000000000000000-mapping.dmp