Analysis
-
max time kernel
154s -
max time network
168s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 13:21
Static task
static1
Behavioral task
behavioral1
Sample
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe
Resource
win10v2004-en-20220112
General
-
Target
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe
-
Size
15KB
-
MD5
ae3aab90f69a05b131bd76abe8a5a988
-
SHA1
e4b09d053f6d0d95a318a552fc69291874a166c9
-
SHA256
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776
-
SHA512
2c411bf12e79e8620c1188147d6d5d0b06877ad5c60b1043e0d13a8e508dfcf85e95f3691fcd12081d60db42bc3bcf8ef00837318559fe6aac3da34e406ec714
Malware Config
Extracted
C:\[HOW TO RECOVER FILES].TXT
prolock
chec1kyourf1les@protonmail.com.
http://qyyllfooubxzl5am25xoessrbnluxpj73ylgtlx25xdg74yuheaigfqd.onion
Signatures
-
ProLock Ransomware
Rebranded update of PwndLocker first seen in March 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exedescription ioc process File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\TEMPOR~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\History.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\History.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Default\STARTM~1\Programs\ACCESS~1\Desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\APPLIC~1\MICROS~1\INTERN~1\QUICKL~1\USERPI~1\TaskBar\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\AKOZAZUE\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\SendTo\Desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\Startup\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\AKOZAZUE\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\DEFAUL~1\SendTo\Desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\E16QEJ8K\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\History.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\E16QEJ8K\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\History\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\History.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Public\LIBRAR~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\AKOZAZUE\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\MICROS~1\FEEDSC~1\E16QEJ8K\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exedescription ioc process File created C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\features\OR2A73~1.V20\[HOW TO RECOVER FILES].TXT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\COMJRO~2.165\icons\console_view.png d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\platform\config\Modules\org-netbeans-core-output2.xml d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\7-Zip\Lang\ca.txt d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Cuiaba d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Fortaleza d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Europe\Warsaw d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\features\ORGECL~4.V20\epl-v10.html d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\COMJRO~2.165\icons\day-of-week-16.png d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.apache.httpcomponents.httpcore_4.2.5.v201311072007.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\7-Zip\readme.txt d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\VISUAL~1\LogoCanary.png d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File created C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\AUSTRA~1\[HOW TO RECOVER FILES].TXT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Pacific\Tongatapu d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File created C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\COMJRO~1.165\html\dcommon\[HOW TO RECOVER FILES].TXT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File created C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\COMJRO~1.165\html\dcommon\css\[HOW TO RECOVER FILES].TXT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.equinox.http.registry_1.1.300.v20130402-1529.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\ORGECL~2.V20\images\macTSFrame.png d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\Locales\am.pak d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File created C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\SWIFTS~1\[HOW TO RECOVER FILES].TXT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Noronha d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Resolute d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\ANTARC~1\DumontDUrville d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Etc\GMT-7 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File created C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\features\OR7910~1.V20\[HOW TO RECOVER FILES].TXT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.equinox.security.win32.x86_64_1.0.100.v20130327-1442.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\Locales\nb.pak d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Africa\Casablanca d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File created C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\[HOW TO RECOVER FILES].TXT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Chihuahua d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Europe\Stockholm d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\content-types.properties d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Tijuana d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Asia\Srednekolymsk d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Etc\UCT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Pacific\Pago_Pago d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.core.net.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\7-Zip\descript.ion d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\Locales\fa.pak d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.ui_3.106.0.v20140812-1751.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\platform\config\Modules\org-openide-compat.xml d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Asia\Yakutsk d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Europe\Kaliningrad d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Pacific\Funafuti d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Pacific\Kiritimati d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Indian\Cocos d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.w3c.dom.events_3.0.0.draft20060413_v201105210656.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\images\cursors\win32_CopyDrop32x32.gif d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\security\US_export_policy.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\Locales\zh-TW.pak d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\ANTARC~1\Vostok d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\SystemV\MST7MDT d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\com.ibm.icu_52.1.0.v201404241930.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.equinox.ds_1.4.200.v20131126-2331.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\7-Zip\Lang\da.txt d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\Locales\hi.pak d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\platform\lib\locale\org-openide-util_zh_CN.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\AUSTRA~1\Lord_Howe d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.equinox.p2.garbagecollector_1.0.200.v20131115-1210.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\db\bin\stopNetworkServer.bat d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\jsse.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\db\lib\derbytools.jar d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\bin\javacpl.cpl d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 2352 vssadmin.exe 1784 vssadmin.exe 2044 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exepid process 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exepid process 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exevssvc.exedescription pid process Token: SeSecurityPrivilege 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe Token: SeTakeOwnershipPrivilege 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe Token: SeBackupPrivilege 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe Token: SeRestorePrivilege 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe Token: SeManageVolumePrivilege 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe Token: SeDebugPrivilege 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe Token: SeBackupPrivilege 2508 vssvc.exe Token: SeRestorePrivilege 2508 vssvc.exe Token: SeAuditPrivilege 2508 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 756 wrote to memory of 1964 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1964 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1964 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1964 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 2016 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 2016 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 2016 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 2016 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1940 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1940 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1940 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1940 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 2016 wrote to memory of 336 2016 net.exe net1.exe PID 2016 wrote to memory of 336 2016 net.exe net1.exe PID 2016 wrote to memory of 336 2016 net.exe net1.exe PID 2016 wrote to memory of 336 2016 net.exe net1.exe PID 1940 wrote to memory of 1100 1940 net.exe net1.exe PID 1940 wrote to memory of 1100 1940 net.exe net1.exe PID 1940 wrote to memory of 1100 1940 net.exe net1.exe PID 1940 wrote to memory of 1100 1940 net.exe net1.exe PID 1964 wrote to memory of 1224 1964 net.exe net1.exe PID 1964 wrote to memory of 1224 1964 net.exe net1.exe PID 1964 wrote to memory of 1224 1964 net.exe net1.exe PID 1964 wrote to memory of 1224 1964 net.exe net1.exe PID 756 wrote to memory of 696 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 696 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 696 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 696 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1340 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1340 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1340 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1340 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 696 wrote to memory of 768 696 net.exe net1.exe PID 696 wrote to memory of 768 696 net.exe net1.exe PID 696 wrote to memory of 768 696 net.exe net1.exe PID 696 wrote to memory of 768 696 net.exe net1.exe PID 1340 wrote to memory of 908 1340 net.exe net1.exe PID 1340 wrote to memory of 908 1340 net.exe net1.exe PID 1340 wrote to memory of 908 1340 net.exe net1.exe PID 1340 wrote to memory of 908 1340 net.exe net1.exe PID 756 wrote to memory of 1140 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1140 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1140 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1140 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 1140 wrote to memory of 864 1140 net.exe net1.exe PID 1140 wrote to memory of 864 1140 net.exe net1.exe PID 1140 wrote to memory of 864 1140 net.exe net1.exe PID 1140 wrote to memory of 864 1140 net.exe net1.exe PID 756 wrote to memory of 1884 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1884 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1884 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 1884 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 1884 wrote to memory of 1656 1884 net.exe net1.exe PID 1884 wrote to memory of 1656 1884 net.exe net1.exe PID 1884 wrote to memory of 1656 1884 net.exe net1.exe PID 1884 wrote to memory of 1656 1884 net.exe net1.exe PID 756 wrote to memory of 704 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 704 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 704 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 756 wrote to memory of 704 756 d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe net.exe PID 704 wrote to memory of 832 704 net.exe net1.exe PID 704 wrote to memory of 832 704 net.exe net1.exe PID 704 wrote to memory of 832 704 net.exe net1.exe PID 704 wrote to memory of 832 704 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe"C:\Users\Admin\AppData\Local\Temp\d3f80ebec40d7c729b87c19bd8f1760a8ec88228839e7d408d571b1577b2b776.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "CSFalconService" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "CSFalconService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "McAfeeFramework" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Alerter" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Alerter" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "AcronisAgent" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecAgentAccelerator" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecDeviceMediaService" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecJobEngine" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecManagementService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecRPCService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecVSSProvider" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "DFSR" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DFSR" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPIntegrationService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPIntegrationService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPProtectedService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPProtectedService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPSecurityService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPUpdateService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MB3Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MB3Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MBAMService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MBEndpointAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeES" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMGMT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMTA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeSA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeSRS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeADTopology" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeADTopology" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeDelivery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeDelivery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeDiagnostics" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeDiagnostics" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeEdgeSync" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeEdgeSync" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeHM" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeHM" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeHMRecovery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeHMRecovery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeIS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMailboxReplication" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMailboxReplication" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeRPC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeRPC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeRepl" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeRepl" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeServiceHost" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeServiceHost" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeTransport" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeTransport" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeUM" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeUM" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeUMCR" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeUMCR" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLSERVER" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MsDtsServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MySQL57" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "OSearch15" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OSearch15" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "OracleClientCache80" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "QuickBooksDB25" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "QuickBooksDB25" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPAdminV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPAdminV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPSearchHostController" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPSearchHostController" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPTraceV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPTraceV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPUserCodeV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPUserCodeV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPWriterV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPWriterV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBrowser" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLSafeOLRService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLsafe Backup Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLSERVERAGENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLTELEMETRY" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBackups" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBackups" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSMQ" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSMQ" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLWriter" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBackupAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBackupAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Symantec System Recovery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SyncoveryVSSService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SyncoveryVSSService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamBackupSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamCatalogSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamCloudSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamEndpointBackupSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEndpointBackupSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamEnterpriseManagerSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamMountSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamNFSSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamRESTSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamTransportSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Veeam Backup Catalog Data Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "epag" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "epag" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "epredline" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "epredline" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "mozyprobackup" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "masvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "macmnsvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "mfemms" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "McAfeeDLPAgentService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeDLPAgentService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "psqlWGE" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "psqlWGE" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "swprv" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swprv" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "wsbexchange" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wsbexchange" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "WinVNC4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WinVNC4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "TMBMServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TMBMServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "tmccsf" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmccsf" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "tmlisten" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VSNAPVSS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSNAPVSS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "stc_endpt_svc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "stc_endpt_svc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "wbengine" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "bbagent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bbagent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "NasPmService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NasPmService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BASupportExpressStandaloneService_N_Central" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BASupportExpressStandaloneService_N_Central" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BASupportExpressSrvcUpdater_N_Central" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BASupportExpressSrvcUpdater_N_Central" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "hasplms" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "hasplms" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EqlVss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EqlVss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EqlReqService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EqlReqService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "RapidRecoveryAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RapidRecoveryAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "YTBackup" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "YTBackup" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "vhdsvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vhdsvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "TeamViewer" /y2⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TeamViewer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$BKUPEXEC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$ECWDB2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PRACTICEMGT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PRACTTICEBGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PROD" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SOPHOS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SQLEXPRESS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$VEEAMSQL2008R2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$VEEAMSQL2012" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLSERVER" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerADHelper" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerADHelper100" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerOLAPService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$BKUPEXEC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$CITRIX_METAFRAME" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$CXDB" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$ECWDB2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PRACTTICEBGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PRACTTICEMGT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PROD" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SOPHOS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SQLEXPRESS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$VEEAMSQL2008R2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$VEEAMSQL2012" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" resize shadowstorage /for=C: /on=C: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" resize shadowstorage /for=C: /on=C: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/756-55-0x00000000760F1000-0x00000000760F3000-memory.dmpFilesize
8KB