Analysis
-
max time kernel
128s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-08-2021 17:02
Static task
static1
Behavioral task
behavioral1
Sample
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe
Resource
win10v20210410
General
-
Target
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe
-
Size
678KB
-
MD5
ff1b2e9d3e7af50b302b090a15d15c76
-
SHA1
3bae4caa7c4ecca659aec342472fe49b3c0b2131
-
SHA256
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212
-
SHA512
d3527aa4e7d4a8fbd0565ea8c0d26dc7e9ff0f294efa5260b9e964e5943782eb697b964cb684ad9008a717b93cfd120ec1337acb0ecbefef0931313f7b88e881
Malware Config
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\OutConvertFrom.raw => C:\Users\Admin\Pictures\OutConvertFrom.raw.grlock a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File renamed C:\Users\Admin\Pictures\SkipDisconnect.crw => C:\Users\Admin\Pictures\SkipDisconnect.crw.grlock a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File renamed C:\Users\Admin\Pictures\SubmitUnpublish.tif => C:\Users\Admin\Pictures\SubmitUnpublish.tif.grlock a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File renamed C:\Users\Admin\Pictures\SuspendImport.tif => C:\Users\Admin\Pictures\SuspendImport.tif.grlock a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exedescription ioc process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-3686645723-710336880-414668232-1000\desktop.ini a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exedescription ioc process File opened (read-only) \??\F: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\I: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\M: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\Y: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\W: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\G: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\N: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\Q: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\T: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\O: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\R: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\S: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\U: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\A: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\E: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\K: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\L: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\V: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\X: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\Z: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\B: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\H: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\J: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe File opened (read-only) \??\P: a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 2396 vssadmin.exe 2444 vssadmin.exe 3424 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exepid process 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exewmic.exewmic.exewmic.exedescription pid process Token: SeBackupPrivilege 1004 vssvc.exe Token: SeRestorePrivilege 1004 vssvc.exe Token: SeAuditPrivilege 1004 vssvc.exe Token: SeIncreaseQuotaPrivilege 2828 wmic.exe Token: SeSecurityPrivilege 2828 wmic.exe Token: SeTakeOwnershipPrivilege 2828 wmic.exe Token: SeLoadDriverPrivilege 2828 wmic.exe Token: SeSystemProfilePrivilege 2828 wmic.exe Token: SeSystemtimePrivilege 2828 wmic.exe Token: SeProfSingleProcessPrivilege 2828 wmic.exe Token: SeIncBasePriorityPrivilege 2828 wmic.exe Token: SeCreatePagefilePrivilege 2828 wmic.exe Token: SeBackupPrivilege 2828 wmic.exe Token: SeRestorePrivilege 2828 wmic.exe Token: SeShutdownPrivilege 2828 wmic.exe Token: SeDebugPrivilege 2828 wmic.exe Token: SeSystemEnvironmentPrivilege 2828 wmic.exe Token: SeRemoteShutdownPrivilege 2828 wmic.exe Token: SeUndockPrivilege 2828 wmic.exe Token: SeManageVolumePrivilege 2828 wmic.exe Token: 33 2828 wmic.exe Token: 34 2828 wmic.exe Token: 35 2828 wmic.exe Token: 36 2828 wmic.exe Token: SeIncreaseQuotaPrivilege 3984 wmic.exe Token: SeSecurityPrivilege 3984 wmic.exe Token: SeTakeOwnershipPrivilege 3984 wmic.exe Token: SeLoadDriverPrivilege 3984 wmic.exe Token: SeSystemProfilePrivilege 3984 wmic.exe Token: SeSystemtimePrivilege 3984 wmic.exe Token: SeProfSingleProcessPrivilege 3984 wmic.exe Token: SeIncBasePriorityPrivilege 3984 wmic.exe Token: SeCreatePagefilePrivilege 3984 wmic.exe Token: SeBackupPrivilege 3984 wmic.exe Token: SeRestorePrivilege 3984 wmic.exe Token: SeShutdownPrivilege 3984 wmic.exe Token: SeDebugPrivilege 3984 wmic.exe Token: SeSystemEnvironmentPrivilege 3984 wmic.exe Token: SeRemoteShutdownPrivilege 3984 wmic.exe Token: SeUndockPrivilege 3984 wmic.exe Token: SeManageVolumePrivilege 3984 wmic.exe Token: 33 3984 wmic.exe Token: 34 3984 wmic.exe Token: 35 3984 wmic.exe Token: 36 3984 wmic.exe Token: SeIncreaseQuotaPrivilege 2068 wmic.exe Token: SeSecurityPrivilege 2068 wmic.exe Token: SeTakeOwnershipPrivilege 2068 wmic.exe Token: SeLoadDriverPrivilege 2068 wmic.exe Token: SeSystemProfilePrivilege 2068 wmic.exe Token: SeSystemtimePrivilege 2068 wmic.exe Token: SeProfSingleProcessPrivilege 2068 wmic.exe Token: SeIncBasePriorityPrivilege 2068 wmic.exe Token: SeCreatePagefilePrivilege 2068 wmic.exe Token: SeBackupPrivilege 2068 wmic.exe Token: SeRestorePrivilege 2068 wmic.exe Token: SeShutdownPrivilege 2068 wmic.exe Token: SeDebugPrivilege 2068 wmic.exe Token: SeSystemEnvironmentPrivilege 2068 wmic.exe Token: SeRemoteShutdownPrivilege 2068 wmic.exe Token: SeUndockPrivilege 2068 wmic.exe Token: SeManageVolumePrivilege 2068 wmic.exe Token: 33 2068 wmic.exe Token: 34 2068 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exedescription pid process target process PID 2116 wrote to memory of 2396 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 2396 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 2396 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 2828 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 2828 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 2828 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 2444 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 2444 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 2444 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 3984 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 3984 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 3984 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 3424 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 3424 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 3424 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe vssadmin.exe PID 2116 wrote to memory of 2068 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 2068 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe PID 2116 wrote to memory of 2068 2116 a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe wmic.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe"C:\Users\Admin\AppData\Local\Temp\a25c0227728878c386ab6dba139976cb10e853dd3cd1eb3623f236ee8e1df212.bin.exe"1⤵
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2116 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2396
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2444
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:3424
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004