Analysis
-
max time kernel
164s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01/02/2022, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe
Resource
win10v2004-en-20220113
General
-
Target
124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe
-
Size
667KB
-
MD5
dbedb905796795de32272ea95c45a36a
-
SHA1
76354f7b2a20d76f82343e0d01c8710600d01483
-
SHA256
124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa
-
SHA512
871def3ab6253a2dfae41b5dc6bf19461bca16e234ff94165e7e25aeee79563c0a074304f0627104f76871961dd7c421dd8fa277f821cf6dfa150d61a4105b4e
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
href="mailto:[email protected]">[email protected]</a><br>
href="mailto:[email protected]">[email protected]</a>
http-equiv="X-UA-Compatible"
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker Payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000014073-55.dat family_medusalocker behavioral1/files/0x0006000000014073-56.dat family_medusalocker -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 884 svhost.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ExpandGet.png => C:\Users\Admin\Pictures\ExpandGet.png.ReadInstructions 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File renamed C:\Users\Admin\Pictures\MountGrant.raw => C:\Users\Admin\Pictures\MountGrant.raw.ReadInstructions 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-3846991908-3261386348-1409841751-1000\desktop.ini 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\A: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\F: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\G: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\O: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\P: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\Q: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\I: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\N: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\T: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\V: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\W: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\X: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\E: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\J: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\K: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\S: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\U: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\B: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\H: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\L: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\M: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\R: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe File opened (read-only) \??\Y: 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 472 vssadmin.exe 1124 vssadmin.exe 1912 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeBackupPrivilege 788 vssvc.exe Token: SeRestorePrivilege 788 vssvc.exe Token: SeAuditPrivilege 788 vssvc.exe Token: SeIncreaseQuotaPrivilege 784 wmic.exe Token: SeSecurityPrivilege 784 wmic.exe Token: SeTakeOwnershipPrivilege 784 wmic.exe Token: SeLoadDriverPrivilege 784 wmic.exe Token: SeSystemProfilePrivilege 784 wmic.exe Token: SeSystemtimePrivilege 784 wmic.exe Token: SeProfSingleProcessPrivilege 784 wmic.exe Token: SeIncBasePriorityPrivilege 784 wmic.exe Token: SeCreatePagefilePrivilege 784 wmic.exe Token: SeBackupPrivilege 784 wmic.exe Token: SeRestorePrivilege 784 wmic.exe Token: SeShutdownPrivilege 784 wmic.exe Token: SeDebugPrivilege 784 wmic.exe Token: SeSystemEnvironmentPrivilege 784 wmic.exe Token: SeRemoteShutdownPrivilege 784 wmic.exe Token: SeUndockPrivilege 784 wmic.exe Token: SeManageVolumePrivilege 784 wmic.exe Token: 33 784 wmic.exe Token: 34 784 wmic.exe Token: 35 784 wmic.exe Token: SeIncreaseQuotaPrivilege 1048 wmic.exe Token: SeSecurityPrivilege 1048 wmic.exe Token: SeTakeOwnershipPrivilege 1048 wmic.exe Token: SeLoadDriverPrivilege 1048 wmic.exe Token: SeSystemProfilePrivilege 1048 wmic.exe Token: SeSystemtimePrivilege 1048 wmic.exe Token: SeProfSingleProcessPrivilege 1048 wmic.exe Token: SeIncBasePriorityPrivilege 1048 wmic.exe Token: SeCreatePagefilePrivilege 1048 wmic.exe Token: SeBackupPrivilege 1048 wmic.exe Token: SeRestorePrivilege 1048 wmic.exe Token: SeShutdownPrivilege 1048 wmic.exe Token: SeDebugPrivilege 1048 wmic.exe Token: SeSystemEnvironmentPrivilege 1048 wmic.exe Token: SeRemoteShutdownPrivilege 1048 wmic.exe Token: SeUndockPrivilege 1048 wmic.exe Token: SeManageVolumePrivilege 1048 wmic.exe Token: 33 1048 wmic.exe Token: 34 1048 wmic.exe Token: 35 1048 wmic.exe Token: SeIncreaseQuotaPrivilege 1548 wmic.exe Token: SeSecurityPrivilege 1548 wmic.exe Token: SeTakeOwnershipPrivilege 1548 wmic.exe Token: SeLoadDriverPrivilege 1548 wmic.exe Token: SeSystemProfilePrivilege 1548 wmic.exe Token: SeSystemtimePrivilege 1548 wmic.exe Token: SeProfSingleProcessPrivilege 1548 wmic.exe Token: SeIncBasePriorityPrivilege 1548 wmic.exe Token: SeCreatePagefilePrivilege 1548 wmic.exe Token: SeBackupPrivilege 1548 wmic.exe Token: SeRestorePrivilege 1548 wmic.exe Token: SeShutdownPrivilege 1548 wmic.exe Token: SeDebugPrivilege 1548 wmic.exe Token: SeSystemEnvironmentPrivilege 1548 wmic.exe Token: SeRemoteShutdownPrivilege 1548 wmic.exe Token: SeUndockPrivilege 1548 wmic.exe Token: SeManageVolumePrivilege 1548 wmic.exe Token: 33 1548 wmic.exe Token: 34 1548 wmic.exe Token: 35 1548 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1504 wrote to memory of 472 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 27 PID 1504 wrote to memory of 472 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 27 PID 1504 wrote to memory of 472 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 27 PID 1504 wrote to memory of 472 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 27 PID 1504 wrote to memory of 784 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 30 PID 1504 wrote to memory of 784 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 30 PID 1504 wrote to memory of 784 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 30 PID 1504 wrote to memory of 784 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 30 PID 1504 wrote to memory of 1124 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 32 PID 1504 wrote to memory of 1124 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 32 PID 1504 wrote to memory of 1124 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 32 PID 1504 wrote to memory of 1124 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 32 PID 1504 wrote to memory of 1048 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 34 PID 1504 wrote to memory of 1048 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 34 PID 1504 wrote to memory of 1048 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 34 PID 1504 wrote to memory of 1048 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 34 PID 1504 wrote to memory of 1912 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 36 PID 1504 wrote to memory of 1912 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 36 PID 1504 wrote to memory of 1912 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 36 PID 1504 wrote to memory of 1912 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 36 PID 1504 wrote to memory of 1548 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 38 PID 1504 wrote to memory of 1548 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 38 PID 1504 wrote to memory of 1548 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 38 PID 1504 wrote to memory of 1548 1504 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe 38 PID 676 wrote to memory of 884 676 taskeng.exe 43 PID 676 wrote to memory of 884 676 taskeng.exe 43 PID 676 wrote to memory of 884 676 taskeng.exe 43 PID 676 wrote to memory of 884 676 taskeng.exe 43 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe"C:\Users\Admin\AppData\Local\Temp\124c65d01c6ba01dead43e246ae4c300d7345c8f46ae71ebf101bef5510f35aa.exe"1⤵
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1504 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:472
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1124
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1912
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:788
-
C:\Windows\system32\taskeng.exetaskeng.exe {F13C6E6E-0FDF-4020-B3DF-7ED2DC2E578B} S-1-5-21-3846991908-3261386348-1409841751-1000:VQVVOAJK\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
PID:884
-