Analysis
-
max time kernel
749s -
max time network
1555s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
27-10-2021 08:53
Static task
static1
Behavioral task
behavioral1
Sample
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe
Resource
win11
Behavioral task
behavioral3
Sample
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe
Resource
win10-en-20211014
General
-
Target
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe
Malware Config
Extracted
C:\[HOW TO RECOVER FILES].TXT
prolock
support981723721@protonmail.com
http://msaoyrayohnp32tcgwcanhjouetb5k54aekgnwg7dcvtgtecpumrxpqd.onion
Signatures
-
ProLock Ransomware
Rebranded update of PwndLocker first seen in March 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 28 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\SuspendRegister.tiff.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\GetRestart.raw.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\PushRemove.tif.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\PushRemove.tif.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\WaitRestore.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\DisableApprove.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\ImportSelect.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\ImportSelect.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\DisableApprove.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\DisableApprove.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\PushRemove.tif.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\SuspendRegister.tiff.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\SuspendRegister.tiff.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\SuspendRegister.tiff.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\WaitRestore.png.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\WaitRestore.png.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\PushRemove.tif.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\GetRestart.raw.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\GroupSearch.png.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\ImportSelect.png.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\ImportSelect.png.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\GetRestart.raw.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\GetRestart.raw.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\SuspendRegister.tiff.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\SuspendRegister.tiff.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\WaitRestore.png.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\GroupSearch.png.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\GroupSearch.png.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\PushRemove.tif.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\PushRemove.tif.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\DisableApprove.png.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\DisableApprove.png.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\DisableApprove.png.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\ImportSelect.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\GroupSearch.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\GroupSearch.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\ImportSelect.png.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\Users\Admin\Pictures\GroupSearch.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\GetRestart.raw.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\GetRestart.raw.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File renamed C:\Users\Admin\Pictures\WaitRestore.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock => C:\Users\Admin\Pictures\WaitRestore.png.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exedescription ioc process File opened for modification C:\DOCUME~1\Admin\Links\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\ACCESS~2\SYSTEM~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\Searches\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\DOCUME~1\MYMUSI~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\ADMINI~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\APPLIC~1\MICROS~1\INTERN~1\QUICKL~1\USERPI~1\TaskBar\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\FAVORI~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Default\STARTM~1\Programs\SYSTEM~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\ACCOUN~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Default\STARTM~1\Programs\ACCESS~2\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\SYSTEM~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\SYSTEM~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\ADMINI~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\ADMINI~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\Startup\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\Desktop\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\LIBRAR~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\DOCUME~1\MYMUSI~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\DOCUME~1\MYPICT~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\DOCUME~1\MYVIDE~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\DOWNLO~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\Desktop\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\DOCUME~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\Recent\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\DOCUME~1\MYPICT~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\Startup\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\Office16\1033\DATASE~1\DESKTOP.INI dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\SAVEDG~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\MAINTE~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Default\STARTM~1\Programs\ACCESS~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\DOCUME~1\MYVIDE~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\Videos\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Public\DOCUME~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\ACCESS~2\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\MAINTE~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\FAVORI~1\Links\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\ACCESS~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\SYSTEM~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Default\SendTo\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\MAINTE~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\APPLIC~1\MICROS~1\INTERN~1\QUICKL~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\DOCUME~1\MYPICT~1\SAVEDP~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Default\STARTM~1\Programs\MAINTE~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\Contacts\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\DOCUME~1\MYPICT~1\CAMERA~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\ACCESS~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\Startup\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\ACCESS~2\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\STARTM~1\Programs\ACCESS~1\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\DOWNLO~1\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\OneDrive\desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\DOCUME~1\Admin\SendTo\Desktop.ini dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exedescription ioc process File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe -
Drops file in Program Files directory 64 IoCs
Processes:
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exedescription ioc process File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jvmstat_ja.jar dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\images\s_ellipses_selected.svg.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\ON-BOA~1\js\nls\ru-ru\ui-strings.js.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\MISSIO~1\plugins\org.eclipse.equinox.http.servlet_1.1.500.v20140318-1755.jar dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\SIGNAT~1\images\themes\dark\bun.png dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\UEV\INBOXT~1\MicrosoftLync2013Win64.xml.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\140__Connections_Cellular_Orange (France)_i2$(__MVID)@WAP.provxml dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\640__Connections_Cellular_AQL - 3 (United Kingdom)_i1$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\Office16\BIBLIO~1\Style\ISO690Nmerical.XSL.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\131__Connections_Cellular_Go Communication Ltd. (Finland)_i1$(__MVID)@WAP.provxml dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\MISSIO~1\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler.nl_zh_4.4.0.v20140623020002.jar.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\LICENS~1\ProjectProO365R_SubTrial-pl.xrm-ms dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\DESKTO~2\js\plugin.js dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\385__Connections_Cellular_Singtel (Singapore)_i2$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{23CB5~1\customizations.xml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\home\images\themes\dark\icons_retina.png.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\MISSIO~1\plugins\org.eclipse.osgi.nl_ja_4.4.0.v20140623020002.jar dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-api_zh_CN.jar dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\Office16\LOGOIM~1\PowerPntLogo.scale-80.png dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\VideoLAN\VLC\locale\fa\LC_MES~1\vlc.mo dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\ON-BOA~1\images\THEMEL~1\et_get.svg dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\241__Connections_Cellular_A1 Mobilkom (Liechtenstein)_i0$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\LICENS~1\ProjectStd2019VL_KMS_Client_AE-ul.xrm-ms.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\Office16\BIBLIO~1\Style\GostName.XSL dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroApp\ENU\Edit_R_Exp_RHP.aapp dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\658__Connections_Cellular_Fido (Canada)_i1$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\MICROS~1\Network\DOWNLO~1\qmgr.db.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\MISSIO~1\plugins\ORGECL~2.V20\images\macGrey.png dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File created C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\OB-PRE~1\js\nls\ar-ae\[HOW TO RECOVER FILES].TXT dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\MISSIO~1\plugins\org.eclipse.help.webapp.nl_ja_4.4.0.v20140623020002.jar.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\LICENS~1\AccessVL_MAK-ul-phn.xrm-ms.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\MICROS~1\UEV\INBOXT~1\MicrosoftSkypeForBusiness2016Win32.xml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\visualvm\visualvm\UPDATE~1\com-sun-tools-visualvm-host-views.xml dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\home\js\nls\fr-fr\ui-strings.js dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\DIAGNO~1\ETLLogs\SHUTDO~1\AutoLogger-Diagtrack-Listener.etl.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\Network\DOWNLO~1\edb.log.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\LICENS~1\ProPlusVL_KMS_Client-ppd.xrm-ms.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\MICROS~1\UEV\INBOXT~1\MicrosoftOffice2016BackupWin32.xml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\237__Connections_Cellular_Alfa (Lebanon)_i0$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\Oracle\Java\INSTAL~1\baseimagefam8.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\315__Connections_Cellular_Mobilink GSM (Pakistan)_i1$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\LICENS~1\VisioStdCO365R_SubTest-ppd.xrm-ms.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\Office16\1033\QUICKS~1\Classic.dotx.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\ON-BOA~1\images\THEMEL~1\da_get.svg.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\SIGNAT~1\images\share_icons.png.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\DIAGNO~1\DOWNLO~1\WINDOWS.PERFTRACKPOINTDATA.xml dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{7A30A~1\customizations.xml.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\349__Connections_Cellular_SFR (Réunion) (France)_i1$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\105__Connections_Cellular_Mobinil (Egypt)_i0$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\gl\LC_MES~1\[HOW TO RECOVER FILES].TXT dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File created C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\APP-CE~1\js\nls\hu-hu\[HOW TO RECOVER FILES].TXT dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\374__Cellular_PerSimSettings_$(__ICCID)_AppID.provxml dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\DESKTO~2\js\nls\fr-ma\ui-strings.js.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\MICROS~2\root\Office16\ODBCDR~1\SALESF~1\lib\cacerts.pem dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\Mozilla\updates\308046~1\update-config.json.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\STARTM~1\Programs\ACCESS~1\Desktop.ini.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\Java\JDK18~1.0_6\lib\MISSIO~1\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~1\VideoLAN\VLC\lua\http\css\UI-LIG~1\images\ui-bg_highlight-soft_75_ffe45c_1x100.png dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{33D78~1\MasterDatastore.xml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\PROVIS~1\{C8A32~1\Prov\RunTime\373__Connections_Cellular_Mobily (Saudi Arabia)_i1$(__MVID)@WAP.provxml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~3\APPLIC~1\MICROS~1\CLICKT~1\{9AC08~1\C2RManifest.Proof.Culture.msi.16.es-es.xml.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock.proLock dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WEBRES~1\RESOUR~1\static\js\plugins\ON-BOA~1\images\THEMEL~1\LOCALI~1\da-dk\AppStore_icon.svg dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe File created C:\PROGRA~3\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\DEVICE~2\[HOW TO RECOVER FILES].TXT dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe -
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\1601268389\3068621934.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\1195458082.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
-
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 4304 vssadmin.exe 1344 vssadmin.exe 1728 vssadmin.exe 2132 vssadmin.exe 2964 vssadmin.exe 908 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exetaskmgr.exepid process 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exepid process 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exevssvc.exetaskmgr.exedescription pid process Token: SeSecurityPrivilege 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe Token: SeTakeOwnershipPrivilege 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe Token: SeBackupPrivilege 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe Token: SeRestorePrivilege 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe Token: SeManageVolumePrivilege 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe Token: SeDebugPrivilege 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe Token: SeBackupPrivilege 2060 vssvc.exe Token: SeRestorePrivilege 2060 vssvc.exe Token: SeAuditPrivilege 2060 vssvc.exe Token: SeDebugPrivilege 3008 taskmgr.exe Token: SeSystemProfilePrivilege 3008 taskmgr.exe Token: SeCreateGlobalPrivilege 3008 taskmgr.exe Token: 33 3008 taskmgr.exe Token: SeIncBasePriorityPrivilege 3008 taskmgr.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
Processes:
taskmgr.exepid process 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe -
Suspicious use of SendNotifyMessage 36 IoCs
Processes:
taskmgr.exepid process 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe 3008 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 4400 wrote to memory of 4480 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4480 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4480 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4432 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4432 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4432 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4480 wrote to memory of 4576 4480 net.exe net1.exe PID 4480 wrote to memory of 4576 4480 net.exe net1.exe PID 4480 wrote to memory of 4576 4480 net.exe net1.exe PID 4432 wrote to memory of 4632 4432 net.exe net1.exe PID 4432 wrote to memory of 4632 4432 net.exe net1.exe PID 4432 wrote to memory of 4632 4432 net.exe net1.exe PID 4400 wrote to memory of 4540 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4540 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4540 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4540 wrote to memory of 360 4540 net.exe net1.exe PID 4540 wrote to memory of 360 4540 net.exe net1.exe PID 4540 wrote to memory of 360 4540 net.exe net1.exe PID 4400 wrote to memory of 4668 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4668 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 4668 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4668 wrote to memory of 660 4668 net.exe net1.exe PID 4668 wrote to memory of 660 4668 net.exe net1.exe PID 4668 wrote to memory of 660 4668 net.exe net1.exe PID 4400 wrote to memory of 872 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 872 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 872 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 872 wrote to memory of 1028 872 net.exe net1.exe PID 872 wrote to memory of 1028 872 net.exe net1.exe PID 872 wrote to memory of 1028 872 net.exe net1.exe PID 4400 wrote to memory of 1132 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 1132 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 1132 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 1132 wrote to memory of 1420 1132 net.exe net1.exe PID 1132 wrote to memory of 1420 1132 net.exe net1.exe PID 1132 wrote to memory of 1420 1132 net.exe net1.exe PID 4400 wrote to memory of 1564 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 1564 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 1564 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 1564 wrote to memory of 1816 1564 net.exe net1.exe PID 1564 wrote to memory of 1816 1564 net.exe net1.exe PID 1564 wrote to memory of 1816 1564 net.exe net1.exe PID 4400 wrote to memory of 1884 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 1884 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 1884 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 1884 wrote to memory of 2432 1884 net.exe net1.exe PID 1884 wrote to memory of 2432 1884 net.exe net1.exe PID 1884 wrote to memory of 2432 1884 net.exe net1.exe PID 4400 wrote to memory of 2560 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 2560 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 2560 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 2560 wrote to memory of 2840 2560 net.exe net1.exe PID 2560 wrote to memory of 2840 2560 net.exe net1.exe PID 2560 wrote to memory of 2840 2560 net.exe net1.exe PID 4400 wrote to memory of 3112 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 3112 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 3112 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 3112 wrote to memory of 3888 3112 net.exe net1.exe PID 3112 wrote to memory of 3888 3112 net.exe net1.exe PID 3112 wrote to memory of 3888 3112 net.exe net1.exe PID 4400 wrote to memory of 3220 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 3220 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 4400 wrote to memory of 3220 4400 dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe net.exe PID 3220 wrote to memory of 4684 3220 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe"C:\Users\Admin\AppData\Local\Temp\dfbd62a3d1b239601e17a5533e5cef53036647901f3fb72be76d92063e279178.sample.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "CSFalconService" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "CSFalconService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "McAfeeFramework" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Alerter" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Alerter" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "AcronisAgent" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecAgentAccelerator" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecDeviceMediaService" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecJobEngine" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecManagementService" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecRPCService" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecVSSProvider" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "DFSR" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DFSR" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPIntegrationService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPIntegrationService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPProtectedService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPProtectedService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPSecurityService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPUpdateService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MB3Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MB3Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MBAMService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MBEndpointAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeES" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMGMT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMTA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeSA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeSRS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeADTopology" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeADTopology" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeDelivery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeDelivery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeDiagnostics" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeDiagnostics" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeEdgeSync" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeEdgeSync" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeHM" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeHM" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeHMRecovery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeHMRecovery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeIS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMailboxReplication" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMailboxReplication" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeRPC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeRPC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeRepl" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeRepl" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeServiceHost" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeServiceHost" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeTransport" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeTransport" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeUM" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeUM" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeUMCR" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeUMCR" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLSERVER" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MsDtsServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MySQL57" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "OSearch15" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OSearch15" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "OracleClientCache80" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "QuickBooksDB25" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "QuickBooksDB25" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPAdminV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPAdminV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPSearchHostController" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPSearchHostController" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPTraceV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPTraceV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPUserCodeV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPUserCodeV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPWriterV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPWriterV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBrowser" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLSafeOLRService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLsafe Backup Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLSERVERAGENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLTELEMETRY" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBackups" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBackups" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSMQ" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSMQ" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLWriter" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBackupAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBackupAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Symantec System Recovery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SyncoveryVSSService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SyncoveryVSSService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamBackupSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamCatalogSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamCloudSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamEndpointBackupSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEndpointBackupSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamEnterpriseManagerSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamMountSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamNFSSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamRESTSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamTransportSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Veeam Backup Catalog Data Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "epag" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "epag" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "epredline" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "epredline" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "mozyprobackup" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "masvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "macmnsvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "mfemms" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "McAfeeDLPAgentService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeDLPAgentService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "psqlWGE" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "psqlWGE" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "swprv" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swprv" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "wsbexchange" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wsbexchange" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "WinVNC4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WinVNC4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "TMBMServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TMBMServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "tmccsf" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmccsf" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "tmlisten" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VSNAPVSS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSNAPVSS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "stc_endpt_svc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "stc_endpt_svc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "wbengine" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "bbagent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bbagent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "NasPmService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NasPmService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BASupportExpressStandaloneService_N_Central" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BASupportExpressStandaloneService_N_Central" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BASupportExpressSrvcUpdater_N_Central" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BASupportExpressSrvcUpdater_N_Central" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "hasplms" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "hasplms" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EqlVss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EqlVss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EqlReqService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EqlReqService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "RapidRecoveryAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RapidRecoveryAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "YTBackup" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "YTBackup" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "vhdsvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vhdsvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "TeamViewer" /y2⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TeamViewer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$BKUPEXEC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$ECWDB2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PRACTICEMGT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PRACTTICEBGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PROD" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SOPHOS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SQLEXPRESS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$VEEAMSQL2008R2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$VEEAMSQL2012" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLSERVER" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerADHelper" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerADHelper100" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerOLAPService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$BKUPEXEC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$CITRIX_METAFRAME" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$CXDB" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$ECWDB2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PRACTTICEBGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PRACTTICEMGT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PROD" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SOPHOS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SQLEXPRESS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$VEEAMSQL2008R2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$VEEAMSQL2012" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" resize shadowstorage /for=D: /on=D: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" resize shadowstorage /for=D: /on=D: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" resize shadowstorage /for=C: /on=C: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" resize shadowstorage /for=C: /on=C: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\DFBD62~1.EXE >> NUL2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/360-123-0x0000000000000000-mapping.dmp
-
memory/368-156-0x0000000000000000-mapping.dmp
-
memory/660-125-0x0000000000000000-mapping.dmp
-
memory/700-160-0x0000000000000000-mapping.dmp
-
memory/872-126-0x0000000000000000-mapping.dmp
-
memory/952-159-0x0000000000000000-mapping.dmp
-
memory/1028-127-0x0000000000000000-mapping.dmp
-
memory/1048-158-0x0000000000000000-mapping.dmp
-
memory/1064-179-0x0000000000000000-mapping.dmp
-
memory/1132-128-0x0000000000000000-mapping.dmp
-
memory/1160-143-0x0000000000000000-mapping.dmp
-
memory/1196-154-0x0000000000000000-mapping.dmp
-
memory/1420-129-0x0000000000000000-mapping.dmp
-
memory/1488-162-0x0000000000000000-mapping.dmp
-
memory/1564-130-0x0000000000000000-mapping.dmp
-
memory/1604-180-0x0000000000000000-mapping.dmp
-
memory/1608-163-0x0000000000000000-mapping.dmp
-
memory/1816-131-0x0000000000000000-mapping.dmp
-
memory/1884-132-0x0000000000000000-mapping.dmp
-
memory/1956-165-0x0000000000000000-mapping.dmp
-
memory/2148-167-0x0000000000000000-mapping.dmp
-
memory/2172-155-0x0000000000000000-mapping.dmp
-
memory/2216-146-0x0000000000000000-mapping.dmp
-
memory/2300-164-0x0000000000000000-mapping.dmp
-
memory/2344-168-0x0000000000000000-mapping.dmp
-
memory/2432-133-0x0000000000000000-mapping.dmp
-
memory/2560-134-0x0000000000000000-mapping.dmp
-
memory/2772-153-0x0000000000000000-mapping.dmp
-
memory/2840-135-0x0000000000000000-mapping.dmp
-
memory/2880-175-0x0000000000000000-mapping.dmp
-
memory/2964-170-0x0000000000000000-mapping.dmp
-
memory/2968-169-0x0000000000000000-mapping.dmp
-
memory/3112-136-0x0000000000000000-mapping.dmp
-
memory/3220-138-0x0000000000000000-mapping.dmp
-
memory/3244-174-0x0000000000000000-mapping.dmp
-
memory/3332-166-0x0000000000000000-mapping.dmp
-
memory/3480-149-0x0000000000000000-mapping.dmp
-
memory/3560-176-0x0000000000000000-mapping.dmp
-
memory/3784-172-0x0000000000000000-mapping.dmp
-
memory/3852-152-0x0000000000000000-mapping.dmp
-
memory/3888-137-0x0000000000000000-mapping.dmp
-
memory/3944-173-0x0000000000000000-mapping.dmp
-
memory/4012-181-0x0000000000000000-mapping.dmp
-
memory/4036-150-0x0000000000000000-mapping.dmp
-
memory/4268-140-0x0000000000000000-mapping.dmp
-
memory/4348-177-0x0000000000000000-mapping.dmp
-
memory/4432-119-0x0000000000000000-mapping.dmp
-
memory/4480-118-0x0000000000000000-mapping.dmp
-
memory/4528-178-0x0000000000000000-mapping.dmp
-
memory/4540-122-0x0000000000000000-mapping.dmp
-
memory/4576-120-0x0000000000000000-mapping.dmp
-
memory/4632-121-0x0000000000000000-mapping.dmp
-
memory/4668-124-0x0000000000000000-mapping.dmp
-
memory/4680-161-0x0000000000000000-mapping.dmp
-
memory/4684-139-0x0000000000000000-mapping.dmp
-
memory/4756-151-0x0000000000000000-mapping.dmp
-
memory/4828-171-0x0000000000000000-mapping.dmp
-
memory/4836-145-0x0000000000000000-mapping.dmp
-
memory/4908-141-0x0000000000000000-mapping.dmp
-
memory/4940-157-0x0000000000000000-mapping.dmp
-
memory/4968-142-0x0000000000000000-mapping.dmp
-
memory/5008-148-0x0000000000000000-mapping.dmp
-
memory/5024-147-0x0000000000000000-mapping.dmp
-
memory/5076-144-0x0000000000000000-mapping.dmp