Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 01:06
Static task
static1
Behavioral task
behavioral1
Sample
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe
Resource
win10-en-20211208
General
-
Target
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe
-
Size
164KB
-
MD5
99a4e0dbe9af1764daa126d53347b57c
-
SHA1
8d0f98e65be8d79b0ea1c350fe7bbff84616ea0e
-
SHA256
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d
-
SHA512
3ae6ded0d008c3696f80baa681e5b9a02d0237849ffd46caa5d7a347d61f46ea06bcae8b781fa06415c07f24eaaca0a9f81228928e70dec195f4000cd61ca32d
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exedescription ioc process File opened (read-only) \??\W: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\X: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\Y: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\Z: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\A: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\H: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\K: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\M: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\G: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\J: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\Q: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\S: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\T: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\V: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\E: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\L: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\N: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\P: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\R: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\U: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\B: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\F: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\I: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened (read-only) \??\O: c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe -
Drops file in Windows directory 64 IoCs
Processes:
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exedescription ioc process File opened for modification C:\Windows\winsxs\Backup\amd64_networking-mpssvc-svc_31bf3856ad364e35_6.1.7601.17514_none_f83a40e7de7c47da_wfapigp.dll_4a104032 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..lient-dll.resources_31bf3856ad364e35_6.1.7601.17514_en-us_57ee6a4218527f7e_dhcpcsvc6.dll.mui_b45c7567 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-f..rcluster-clientcore_31bf3856ad364e35_6.1.7601.17514_none_934ef25796a1b53e.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasbase_31bf3856ad364e35_6.1.7601.17514_none_6c066d50910ecf5a_kmddsp.tsp_c999e400 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-htmlhelp.resources_31bf3856ad364e35_6.1.7600.16385_de-de_72a70ca7e03b9b86.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-wmi-core-svc_31bf3856ad364e35_6.1.7601.17514_none_092d6b9141f16aca.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..vironment-os-loader_31bf3856ad364e35_6.1.7601.17514_none_b94cbfa183466a89_winresume.exe_85cd1215 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..ependencyminifilter_31bf3856ad364e35_6.1.7601.17514_none_8878ff5a9e1a8a48_fsdepends.sys_fe2390cb c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_6.1.7600.16385_none_df4bbe8e10903104_cvgasys.fon_a23acca1 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mfc42x.resources_31bf3856ad364e35_6.1.7600.16385_de-de_75a5d492b9d7cd2f.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mup_31bf3856ad364e35_6.1.7600.16385_none_08e73ad57234cf5f.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_fi-fi_8be3f9b7c370e5b6_comdlg32.dll.mui_ac8e62f4 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..irectdraw.resources_31bf3856ad364e35_6.1.7600.16385_de-de_c59ac573df5cb39a_ddraw.dll.mui_95b8c3ab c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-newdev_31bf3856ad364e35_6.1.7600.16385_none_6d6b3cfb6a5a1e5a_newdev.exe_7eb73dcd c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-uxtheme_31bf3856ad364e35_6.1.7600.16385_none_0c2e36cd54a163b4_uxtheme.dll_9f6cda06 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..r_service.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_3d7abc1882b36787_iscsidsc.dll.mui_6acb64a6 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-acledit_31bf3856ad364e35_6.1.7600.16385_none_67b7d66bbde58bb7.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-u..dem-voice.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_1c9f3fffd349960b.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.7601.17514_none_3bd2e487d8e769d3.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-win32k.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b3ae596aac502e91.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-keyiso.resources_31bf3856ad364e35_6.1.7600.16385_de-de_6170816be6863ccb.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..utoenroll.resources_31bf3856ad364e35_6.1.7600.16385_en-us_172c7ef07346f98d.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-uiribbon_31bf3856ad364e35_6.1.7601.17514_none_d102e18929d497cb.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ure-ws232.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_98d4b6b35beff4c4_ws2_32.dll.mui_f13ef3a5 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_d02acaa3e17e4bae_wininit.exe.mui_997435f5 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-winsock-core.resources_31bf3856ad364e35_6.1.7600.16385_es-es_a7a90ee6983e9333.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-vgaoem_31bf3856ad364e35_6.1.7600.16385_none_73966d7b932081de.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-embedding_31bf3856ad364e35_6.1.7601.17514_none_13e628b635935244_t2embed.dll_66e8486f c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7601.17514_en-us_c342610ed289dc75_lodctr.exe.mui_4ac7d1a1 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-cryptsp-dll_31bf3856ad364e35_6.1.7600.16385_none_2933c430682017d9_cryptsp.dll_ae5341e1 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-rpc-local.resources_31bf3856ad364e35_6.1.7600.16385_es-es_9b5d51a51f05b818.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_da-dk_18a24a3dbedfab6e.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ure-ws232.resources_31bf3856ad364e35_6.1.7600.16385_es-es_69cfcb609ed0e709.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-dns-client.resources_31bf3856ad364e35_6.1.7600.16385_es-es_231366a72d1cda71.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..lient-dll.resources_31bf3856ad364e35_6.1.7601.17514_en-us_b40d05c5d0aff0b4_dhcpcore.dll.mui_8b901fc3 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-p..unterinfrastructure_31bf3856ad364e35_6.1.7600.16385_none_cd7aeeff1897d018_perfh.dat_e67d1236 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ef4ae318c161881c_comctl32.dll.mui_0da4e682 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-object-picker_31bf3856ad364e35_6.1.7600.16385_none_0f6c30b96de81257.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-t..cesframework-msimtf_31bf3856ad364e35_6.1.7600.16385_none_d15bda804befe6a3.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-webservices.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_b11048a8ca8c8b7d.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-eventlog-api.resources_31bf3856ad364e35_6.1.7600.16385_de-de_d6dabc6182566680_wevtapi.dll.mui_27c9f5dd c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-newdev.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_fdd0e869f380cdab_ndadmin.exe.mui_2e106c3e c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-ole-automation_31bf3856ad364e35_6.1.7601.17514_none_1b262ffd1219bd69_oleaut32.dll_730e3d41 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasserver_31bf3856ad364e35_6.1.7601.17514_none_09cf3ec67e6c6b50_rasservermigplugin-dl.man_babd2d8e c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-htmlhelp-infotech_31bf3856ad364e35_6.1.7601.17514_none_f8ab56ff71fc562a.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_sv-se_d2199a50165e07e9_comdlg32.dll.mui_ac8e62f4 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_fi-fi_5da51703a4d4ef9c.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-tabletpc-softkeyboard_31bf3856ad364e35_6.1.7601.17514_none_2fd7b56967fc5c76_main.xml_e4c2fcc8 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-security-spp.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_31e1db4242326351.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_6.1.7601.17514_es-es_3d0d9ae012cffd0d.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_lt-lt_d8a56adb99152caa.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7600.16385_es-es_cb31547d0a230c7b_prflbmsg.dll.mui_4caa0054 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-rasbase.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_66e40021f6ac2d53_rasdiag.dll.mui_15cb4ec4 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-win32k.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_56312c4d9f493698.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-terminal_31bf3856ad364e35_6.1.7600.16385_none_70644a8bdb0d9303_cga40869.fon_2c83a12b c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_uk-ua_0c40c3925a9ae4c4_mlang.dll.mui_2904864a c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..edstorage.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_71755af76007c973_psbase.dll.mui_c28690ab c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-shacct.resources_31bf3856ad364e35_6.1.7600.16385_de-de_8a127f71285a9219.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ck-legacy.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_d680f5897102fd16.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-e..geengine-isam-win2k_31bf3856ad364e35_6.1.7600.16385_none_273d3082288d2a38.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..tional-codepage-864_31bf3856ad364e35_6.1.7600.16385_none_cebf380cfc84b5bf.manifest c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-shell32.resources_31bf3856ad364e35_6.1.7601.17514_es-es_5b7c8d693744aea4_shell32.dll.mui_19f538b4 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_eb7357d6e70b38e1_listsvc.dll.mui_27f0fc85 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-o..iles-core.resources_31bf3856ad364e35_6.1.7600.16385_es-es_5f7103aaf3c5ba0d_cscmig.dll.mui_7e59bd05 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2000 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exepid process 472 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1088 vssvc.exe Token: SeRestorePrivilege 1088 vssvc.exe Token: SeAuditPrivilege 1088 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.execmd.exedescription pid process target process PID 472 wrote to memory of 1136 472 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe cmd.exe PID 472 wrote to memory of 1136 472 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe cmd.exe PID 472 wrote to memory of 1136 472 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe cmd.exe PID 472 wrote to memory of 1136 472 c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe cmd.exe PID 1136 wrote to memory of 2000 1136 cmd.exe vssadmin.exe PID 1136 wrote to memory of 2000 1136 cmd.exe vssadmin.exe PID 1136 wrote to memory of 2000 1136 cmd.exe vssadmin.exe PID 1136 wrote to memory of 2000 1136 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe"C:\Users\Admin\AppData\Local\Temp\c68adc712c821600ff48fb32d79110a9e1d92538126d42279875d9e85a8c806d.exe"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2000
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1644
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/472-54-0x0000000075891000-0x0000000075893000-memory.dmpFilesize
8KB