Analysis
-
max time kernel
31s -
max time network
43s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
08-08-2021 17:49
Static task
static1
Behavioral task
behavioral1
Sample
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe
Resource
win10v20210408
General
-
Target
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe
-
Size
1.2MB
-
MD5
e0ae997e515ce9689eac7e2d74035e29
-
SHA1
a0f28890dfe66a158771ed70745ed1efbde91427
-
SHA256
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc
-
SHA512
4d7cacd97c519c2324b20ec361d065b02261f34e1aa702fbd5f537ba07f9f969ed35fe014f93988f7fa90b89fedf520b926808c28d07daf95fd4fd580d51c4e0
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 664 bcdedit.exe 1872 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exepid Process 364 wbadmin.exe 1696 wbadmin.exe -
Drops file in Drivers directory 13 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription ioc Process File opened for modification C:\Windows\System32\drivers\etc\services.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\networks c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\networks.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\protocol c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\drivers\etc\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\services c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\hosts c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\ProtectNew.crw.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File renamed C:\Users\Admin\Pictures\StepCompare.png => C:\Users\Admin\Pictures\StepCompare.png.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Users\Admin\Pictures\StepCompare.png.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File renamed C:\Users\Admin\Pictures\InitializeExport.raw => C:\Users\Admin\Pictures\InitializeExport.raw.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File renamed C:\Users\Admin\Pictures\InitializeExport.raw.inprocess => C:\Users\Admin\Pictures\InitializeExport.raw.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Users\Admin\Pictures\InitializeExport.raw.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File renamed C:\Users\Admin\Pictures\ProtectNew.crw => C:\Users\Admin\Pictures\ProtectNew.crw.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Users\Admin\Pictures\ProtectNew.crw.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File renamed C:\Users\Admin\Pictures\StepCompare.png.inprocess => C:\Users\Admin\Pictures\StepCompare.png.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Users\Admin\Pictures\InitializeExport.raw.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File renamed C:\Users\Admin\Pictures\ProtectNew.crw.inprocess => C:\Users\Admin\Pictures\ProtectNew.crw.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Users\Admin\Pictures\StepCompare.png.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1380 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe\" e" c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-2513283230-931923277-594887482-1000\desktop.ini c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Enumerates connected drives 3 TTPs 41 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exec2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc Process File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\A: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\G: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\Z: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\Q: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\V: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\E: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\M: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\D: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\I: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\B: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\F: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\K: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\R: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\W: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\N: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\T: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\Y: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\J: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\X: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\S: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\U: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\H: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\L: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\O: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened (read-only) \??\P: c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Drops file in System32 directory 64 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription ioc Process File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\50fc4233-1ec2-41e2-82c7-33fdf44fd413.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\50fc4233-1ec2-41e2-82c7-33fdf44fd413 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\DEFAULT c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\RegBack\DEFAULT c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\RegBack\SOFTWARE c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\SECURITY c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\RegBack\SYSTEM c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b889ab5d-f7d2-47ff-92a1-3ec877b7e01c.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\LogFiles\Scm\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b889ab5d-f7d2-47ff-92a1-3ec877b7e01c c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\7159d68a-652d-40c5-8ef8-48cf3dd69866.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\config\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f22e410f-f947-4e08-8f2a-8f65df603f8d.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\SAM c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\SOFTWARE c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\7159d68a-652d-40c5-8ef8-48cf3dd69866.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e582198-061f-43f1-abdf-d4e9b606b035.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\BCD-Template.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\RegBack\SECURITY c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\BCD-Template c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\SYSTEM c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\50fc4233-1ec2-41e2-82c7-33fdf44fd413.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\RegBack\SAM c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\da266c6b-fa73-4f51-a7eb-a0fd3aba48c6 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e582198-061f-43f1-abdf-d4e9b606b035 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e582198-061f-43f1-abdf-d4e9b606b035.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\System32\config\RegBack\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Drops file in Program Files directory 64 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Bahia_Banderas.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Damascus c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Perth.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Thimphu c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sao_Paulo.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Marengo.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\WET.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Cordoba.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sitka c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Yellowknife.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Simferopol.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Zaporozhye c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\MST7MDT.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Hermosillo c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Boise.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Sydney c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Yakutat.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-9.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Reunion.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\PST8PDT.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Salta c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Galapagos.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Azores.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guayaquil.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-11.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Chagos.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Noumea.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\COPYRIGHT.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Ho_Chi_Minh.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Irkutsk c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Qyzylorda.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Port_of_Spain.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-14.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Cocos c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Mahe c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dubai.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Tarawa.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\EST5.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Faroe.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Chicago c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jakarta.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Tbilisi.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Tehran.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Monterrey c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Accra c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Monaco.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Auckland.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Noumea.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Petersburg.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\MST7 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Majuro c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Bangkok.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh88.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Norfolk.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\Monticello.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Atikokan.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Anchorage c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Aqtau c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Dawson_Creek.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Madrid.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\MST7MDT.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Thule.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Drops file in Windows directory 64 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exewbadmin.exewbadmin.exedescription ioc Process File opened for modification C:\Windows\SoftwareDistribution\Download\f29b02fec13315ab58a997da84d42d39f8d01a1d c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\046b70de3a2fd676d807d11bedad4dcd\cbshandler\state c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\SoftwareDistribution\Download\046b70de3a2fd676d807d11bedad4dcd\cbshandler\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th0 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_0 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\31babaaa45cee9a47acba0207c097502\cbshandler\state.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\SoftwareDistribution\Download\6c3e7934e9e70d0fb2dfeb3af2325793\cbshandler\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\f29b02fec13315ab58a997da84d42d39f8d01a1d.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\Boot\DVD\EFI\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th1 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_3 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Panther\setupinfo c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\Panther\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb0 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\dewindow c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\046b70de3a2fd676d807d11bedad4dcd\cbshandler\state.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\SoftwareDistribution\Download\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb2 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\31babaaa45cee9a47acba0207c097502\cbshandler\state c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\31babaaa45cee9a47acba0207c097502\cbshandler\state.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\046b70de3a2fd676d807d11bedad4dcd\cbshandler\state.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\499e9f34ae4b5b02c752dc8920c033aa\cbshandler\state.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb0 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\enwindow c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\6c3e7934e9e70d0fb2dfeb3af2325793\cbshandler\state.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\6c3e7934e9e70d0fb2dfeb3af2325793\cbshandler\state.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\499e9f34ae4b5b02c752dc8920c033aa\cbshandler\state.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\f29b02fec13315ab58a997da84d42d39f8d01a1d.gpay c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb1 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th2 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb1 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_0 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_2 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_2 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File created C:\Windows\Boot\PCAT\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb2 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\6c3e7934e9e70d0fb2dfeb3af2325793\cbshandler\state c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th0 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th1 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th2 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\499e9f34ae4b5b02c752dc8920c033aa\cbshandler\state c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe File created C:\Windows\Boot\DVD\PCAT\!!!HOW_TO_DECRYPT!!!.mht c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid Process 436 vssadmin.exe 1740 vssadmin.exe 2020 vssadmin.exe 1432 vssadmin.exe 1688 vssadmin.exe 1048 vssadmin.exe 740 vssadmin.exe 616 vssadmin.exe 1608 vssadmin.exe 1308 vssadmin.exe 1516 vssadmin.exe 916 vssadmin.exe 240 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exepid Process 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vssvc.exewmic.exedescription pid Process Token: SeBackupPrivilege 1248 vssvc.exe Token: SeRestorePrivilege 1248 vssvc.exe Token: SeAuditPrivilege 1248 vssvc.exe Token: SeIncreaseQuotaPrivilege 1644 wmic.exe Token: SeSecurityPrivilege 1644 wmic.exe Token: SeTakeOwnershipPrivilege 1644 wmic.exe Token: SeLoadDriverPrivilege 1644 wmic.exe Token: SeSystemProfilePrivilege 1644 wmic.exe Token: SeSystemtimePrivilege 1644 wmic.exe Token: SeProfSingleProcessPrivilege 1644 wmic.exe Token: SeIncBasePriorityPrivilege 1644 wmic.exe Token: SeCreatePagefilePrivilege 1644 wmic.exe Token: SeBackupPrivilege 1644 wmic.exe Token: SeRestorePrivilege 1644 wmic.exe Token: SeShutdownPrivilege 1644 wmic.exe Token: SeDebugPrivilege 1644 wmic.exe Token: SeSystemEnvironmentPrivilege 1644 wmic.exe Token: SeRemoteShutdownPrivilege 1644 wmic.exe Token: SeUndockPrivilege 1644 wmic.exe Token: SeManageVolumePrivilege 1644 wmic.exe Token: 33 1644 wmic.exe Token: 34 1644 wmic.exe Token: 35 1644 wmic.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription pid Process procid_target PID 1820 wrote to memory of 2020 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 26 PID 1820 wrote to memory of 2020 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 26 PID 1820 wrote to memory of 2020 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 26 PID 1820 wrote to memory of 1308 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 30 PID 1820 wrote to memory of 1308 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 30 PID 1820 wrote to memory of 1308 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 30 PID 1820 wrote to memory of 1432 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 32 PID 1820 wrote to memory of 1432 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 32 PID 1820 wrote to memory of 1432 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 32 PID 1820 wrote to memory of 1688 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 34 PID 1820 wrote to memory of 1688 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 34 PID 1820 wrote to memory of 1688 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 34 PID 1820 wrote to memory of 1048 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 36 PID 1820 wrote to memory of 1048 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 36 PID 1820 wrote to memory of 1048 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 36 PID 1820 wrote to memory of 1516 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 38 PID 1820 wrote to memory of 1516 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 38 PID 1820 wrote to memory of 1516 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 38 PID 1820 wrote to memory of 740 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 40 PID 1820 wrote to memory of 740 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 40 PID 1820 wrote to memory of 740 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 40 PID 1820 wrote to memory of 616 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 42 PID 1820 wrote to memory of 616 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 42 PID 1820 wrote to memory of 616 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 42 PID 1820 wrote to memory of 916 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 44 PID 1820 wrote to memory of 916 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 44 PID 1820 wrote to memory of 916 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 44 PID 1820 wrote to memory of 436 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 46 PID 1820 wrote to memory of 436 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 46 PID 1820 wrote to memory of 436 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 46 PID 1820 wrote to memory of 240 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 48 PID 1820 wrote to memory of 240 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 48 PID 1820 wrote to memory of 240 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 48 PID 1820 wrote to memory of 1740 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 50 PID 1820 wrote to memory of 1740 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 50 PID 1820 wrote to memory of 1740 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 50 PID 1820 wrote to memory of 1608 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 52 PID 1820 wrote to memory of 1608 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 52 PID 1820 wrote to memory of 1608 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 52 PID 1820 wrote to memory of 664 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 56 PID 1820 wrote to memory of 664 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 56 PID 1820 wrote to memory of 664 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 56 PID 1820 wrote to memory of 1872 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 58 PID 1820 wrote to memory of 1872 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 58 PID 1820 wrote to memory of 1872 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 58 PID 1820 wrote to memory of 364 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 60 PID 1820 wrote to memory of 364 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 60 PID 1820 wrote to memory of 364 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 60 PID 1820 wrote to memory of 1696 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 62 PID 1820 wrote to memory of 1696 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 62 PID 1820 wrote to memory of 1696 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 62 PID 1820 wrote to memory of 1644 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 64 PID 1820 wrote to memory of 1644 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 64 PID 1820 wrote to memory of 1644 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 64 PID 1820 wrote to memory of 1380 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 69 PID 1820 wrote to memory of 1380 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 69 PID 1820 wrote to memory of 1380 1820 c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe 69 -
System policy modification 1 TTPs 1 IoCs
Processes:
c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe"C:\Users\Admin\AppData\Local\Temp\c2a0a317d73c96428ab088a8f0636ec4ccace7ca691c84ed66a83a70183f40dc.bin.exe"1⤵
- Drops file in Drivers directory
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1820 -
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:2020
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:1308
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1432
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1688
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1048
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1516
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:740
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:616
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:916
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:436
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:240
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1740
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1608
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:664
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1872
-
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:364
-
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:1696
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C2A0A3~1.EXE >> NUL2⤵
- Deletes itself
PID:1380
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248