Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/02/2022, 15:34
220213-sz5ftsbch7 1013/02/2022, 15:31
220213-syb3wsbcg4 1013/02/2022, 15:17
220213-sn7rtadbaq 10Analysis
-
max time kernel
816s -
max time network
826s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13/02/2022, 15:17
Static task
static1
General
-
Target
-
Size
3.4MB
-
MD5
84c82835a5d21bbcf75a61706d8ab549
-
SHA1
5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
-
SHA256
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
-
SHA512
90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 64 IoCs
pid Process 4824 taskdl.exe 1068 taskdl.exe 224 taskdl.exe 3584 taskdl.exe 3136 taskdl.exe 1656 taskdl.exe 2968 @[email protected] 2212 @[email protected] 540 taskhsvc.exe 2684 taskse.exe 2944 @[email protected] 3828 taskdl.exe 2192 taskse.exe 3120 @[email protected] 4544 taskdl.exe 1440 taskse.exe 1940 @[email protected] 3648 taskdl.exe 3176 taskse.exe 320 @[email protected] 400 taskdl.exe 4776 taskse.exe 4728 @[email protected] 2460 taskdl.exe 2528 taskse.exe 5064 @[email protected] 4784 taskdl.exe 2160 taskse.exe 3872 @[email protected] 3592 taskdl.exe 2796 taskse.exe 2932 @[email protected] 2764 taskdl.exe 1036 taskse.exe 4296 @[email protected] 1948 taskdl.exe 2088 taskse.exe 4160 @[email protected] 1144 taskdl.exe 4876 taskse.exe 4260 @[email protected] 4744 taskdl.exe 956 taskse.exe 3888 @[email protected] 4048 taskdl.exe 4468 taskse.exe 4496 @[email protected] 1516 taskdl.exe 4312 taskse.exe 4372 @[email protected] 4624 taskdl.exe 804 taskse.exe 1832 @[email protected] 1712 taskdl.exe 2936 taskse.exe 208 @[email protected] 672 taskdl.exe 4804 taskse.exe 2372 @[email protected] 2012 taskdl.exe 3648 taskse.exe 3192 @[email protected] 4304 taskdl.exe 3176 taskse.exe -
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ClearReset.raw.WNCRYT [email protected] File opened for modification C:\Users\Admin\Pictures\ClearReset.raw.WNCRY [email protected] File opened for modification C:\Users\Admin\Pictures\InitializeExit.tiff.WNCRY [email protected] File created C:\Users\Admin\Pictures\ResolveInvoke.png.WNCRYT [email protected] File opened for modification C:\Users\Admin\Pictures\ResolveInvoke.png.WNCRY [email protected] File opened for modification C:\Users\Admin\Pictures\UpdateShow.tif.WNCRY [email protected] File opened for modification C:\Users\Admin\Pictures\InitializeExit.tiff [email protected] File renamed C:\Users\Admin\Pictures\ClearReset.raw.WNCRYT => C:\Users\Admin\Pictures\ClearReset.raw.WNCRY [email protected] File created C:\Users\Admin\Pictures\InitializeExit.tiff.WNCRYT [email protected] File renamed C:\Users\Admin\Pictures\InitializeExit.tiff.WNCRYT => C:\Users\Admin\Pictures\InitializeExit.tiff.WNCRY [email protected] File renamed C:\Users\Admin\Pictures\ResolveInvoke.png.WNCRYT => C:\Users\Admin\Pictures\ResolveInvoke.png.WNCRY [email protected] File created C:\Users\Admin\Pictures\UpdateShow.tif.WNCRYT [email protected] File renamed C:\Users\Admin\Pictures\UpdateShow.tif.WNCRYT => C:\Users\Admin\Pictures\UpdateShow.tif.WNCRY [email protected] -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDF8A2.tmp [email protected] File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDF993.tmp [email protected] -
Loads dropped DLL 8 IoCs
pid Process 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2428 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\isljbgsxj479 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tasksche.exe\"" reg.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4912 reg.exe -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 3580 WINWORD.EXE 3580 WINWORD.EXE 5072 EXCEL.EXE 212 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 540 taskhsvc.exe 860 chrome.exe 860 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2944 @[email protected] -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3732 svchost.exe Token: SeCreatePagefilePrivilege 3732 svchost.exe Token: SeShutdownPrivilege 3732 svchost.exe Token: SeCreatePagefilePrivilege 3732 svchost.exe Token: SeShutdownPrivilege 3732 svchost.exe Token: SeCreatePagefilePrivilege 3732 svchost.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe Token: SeRestorePrivilege 2388 TiWorker.exe Token: SeSecurityPrivilege 2388 TiWorker.exe Token: SeBackupPrivilege 2388 TiWorker.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 3580 WINWORD.EXE 5072 EXCEL.EXE 3580 WINWORD.EXE 5072 EXCEL.EXE 3580 WINWORD.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 3580 WINWORD.EXE 3580 WINWORD.EXE 3580 WINWORD.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 3580 WINWORD.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 2968 @[email protected] 2212 @[email protected] 2212 @[email protected] 2968 @[email protected] 2944 @[email protected] 2944 @[email protected] 3120 @[email protected] 212 POWERPNT.EXE 1940 @[email protected] 212 POWERPNT.EXE 212 POWERPNT.EXE 212 POWERPNT.EXE 320 @[email protected] 4728 @[email protected] 5064 @[email protected] 3872 @[email protected] 2932 @[email protected] 4296 @[email protected] 4160 @[email protected] 4260 @[email protected] 3888 @[email protected] 4496 @[email protected] 4372 @[email protected] 1832 @[email protected] 208 @[email protected] 2372 @[email protected] 3192 @[email protected] 3084 @[email protected] 4604 @[email protected] 4028 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2440 1600 [email protected] 82 PID 1600 wrote to memory of 2440 1600 [email protected] 82 PID 1600 wrote to memory of 2440 1600 [email protected] 82 PID 1600 wrote to memory of 2428 1600 [email protected] 83 PID 1600 wrote to memory of 2428 1600 [email protected] 83 PID 1600 wrote to memory of 2428 1600 [email protected] 83 PID 1600 wrote to memory of 4824 1600 [email protected] 86 PID 1600 wrote to memory of 4824 1600 [email protected] 86 PID 1600 wrote to memory of 4824 1600 [email protected] 86 PID 1600 wrote to memory of 1300 1600 [email protected] 87 PID 1600 wrote to memory of 1300 1600 [email protected] 87 PID 1600 wrote to memory of 1300 1600 [email protected] 87 PID 1300 wrote to memory of 4908 1300 cmd.exe 89 PID 1300 wrote to memory of 4908 1300 cmd.exe 89 PID 1300 wrote to memory of 4908 1300 cmd.exe 89 PID 1600 wrote to memory of 1068 1600 [email protected] 98 PID 1600 wrote to memory of 1068 1600 [email protected] 98 PID 1600 wrote to memory of 1068 1600 [email protected] 98 PID 1600 wrote to memory of 224 1600 [email protected] 106 PID 1600 wrote to memory of 224 1600 [email protected] 106 PID 1600 wrote to memory of 224 1600 [email protected] 106 PID 1600 wrote to memory of 3584 1600 [email protected] 117 PID 1600 wrote to memory of 3584 1600 [email protected] 117 PID 1600 wrote to memory of 3584 1600 [email protected] 117 PID 1600 wrote to memory of 3136 1600 [email protected] 119 PID 1600 wrote to memory of 3136 1600 [email protected] 119 PID 1600 wrote to memory of 3136 1600 [email protected] 119 PID 1600 wrote to memory of 1656 1600 [email protected] 121 PID 1600 wrote to memory of 1656 1600 [email protected] 121 PID 1600 wrote to memory of 1656 1600 [email protected] 121 PID 1600 wrote to memory of 2968 1600 [email protected] 124 PID 1600 wrote to memory of 2968 1600 [email protected] 124 PID 1600 wrote to memory of 2968 1600 [email protected] 124 PID 1600 wrote to memory of 1508 1600 [email protected] 125 PID 1600 wrote to memory of 1508 1600 [email protected] 125 PID 1600 wrote to memory of 1508 1600 [email protected] 125 PID 1508 wrote to memory of 2212 1508 cmd.exe 127 PID 1508 wrote to memory of 2212 1508 cmd.exe 127 PID 1508 wrote to memory of 2212 1508 cmd.exe 127 PID 2968 wrote to memory of 540 2968 @[email protected] 129 PID 2968 wrote to memory of 540 2968 @[email protected] 129 PID 2968 wrote to memory of 540 2968 @[email protected] 129 PID 1600 wrote to memory of 2684 1600 [email protected] 133 PID 1600 wrote to memory of 2684 1600 [email protected] 133 PID 1600 wrote to memory of 2684 1600 [email protected] 133 PID 1600 wrote to memory of 2944 1600 [email protected] 132 PID 1600 wrote to memory of 2944 1600 [email protected] 132 PID 1600 wrote to memory of 2944 1600 [email protected] 132 PID 1600 wrote to memory of 1804 1600 [email protected] 131 PID 1600 wrote to memory of 1804 1600 [email protected] 131 PID 1600 wrote to memory of 1804 1600 [email protected] 131 PID 1804 wrote to memory of 4912 1804 cmd.exe 135 PID 1804 wrote to memory of 4912 1804 cmd.exe 135 PID 1804 wrote to memory of 4912 1804 cmd.exe 135 PID 2212 wrote to memory of 1132 2212 @[email protected] 136 PID 2212 wrote to memory of 1132 2212 @[email protected] 136 PID 2212 wrote to memory of 1132 2212 @[email protected] 136 PID 1132 wrote to memory of 2832 1132 cmd.exe 138 PID 1132 wrote to memory of 2832 1132 cmd.exe 138 PID 1132 wrote to memory of 2832 1132 cmd.exe 138 PID 1600 wrote to memory of 3828 1600 [email protected] 139 PID 1600 wrote to memory of 3828 1600 [email protected] 139 PID 1600 wrote to memory of 3828 1600 [email protected] 139 PID 1600 wrote to memory of 2192 1600 [email protected] 142 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2440 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
PID:2440
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 89241644765470.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exePID:1508
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:2832
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "isljbgsxj479" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "isljbgsxj479" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:956
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:804
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵PID:4720
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Opened.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3580
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\UndoUse.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:32
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4688
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\Documents\WriteSync.ppt" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:212
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:2720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffa3094f50,0x7fffa3094f60,0x7fffa3094f702⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1696 /prefetch:22⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2348 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4336 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,14539229053706899186,6121942955338577149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3120 /prefetch:82⤵PID:3388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488