Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19/02/2022, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe
Resource
win10v2004-en-20220113
General
-
Target
ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe
-
Size
114KB
-
MD5
a9b7b3af239126f1ec4e1549076b6f6a
-
SHA1
d26ae4e7aac4529370583bb9e401152746d88a41
-
SHA256
ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2
-
SHA512
572587a2a5ef1fb275c9059e32191399780311dac2d064a211303f87a768c1acdc903a8d966723ff9b2375ec31a985a55f3623a2631d4dcf83d564e6eb7280ce
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 3 IoCs
pid Process 460 XaeZJwIEalan.exe 1308 HQxuGcGkelan.exe 1476 cfdGvSuZOlan.exe -
Loads dropped DLL 6 IoCs
pid Process 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1500 icacls.exe 1552 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\EV = "\ufffeC:\\Users\\Admin\\AppData\\Local\\Temp\\ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\nn.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\License.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\descript.ion ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\7z.sfx ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\readme.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 964 SCHTASKS.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1900 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1948 WMIC.exe Token: SeSecurityPrivilege 1948 WMIC.exe Token: SeTakeOwnershipPrivilege 1948 WMIC.exe Token: SeLoadDriverPrivilege 1948 WMIC.exe Token: SeSystemProfilePrivilege 1948 WMIC.exe Token: SeSystemtimePrivilege 1948 WMIC.exe Token: SeProfSingleProcessPrivilege 1948 WMIC.exe Token: SeIncBasePriorityPrivilege 1948 WMIC.exe Token: SeCreatePagefilePrivilege 1948 WMIC.exe Token: SeBackupPrivilege 1948 WMIC.exe Token: SeRestorePrivilege 1948 WMIC.exe Token: SeShutdownPrivilege 1948 WMIC.exe Token: SeDebugPrivilege 1948 WMIC.exe Token: SeSystemEnvironmentPrivilege 1948 WMIC.exe Token: SeRemoteShutdownPrivilege 1948 WMIC.exe Token: SeUndockPrivilege 1948 WMIC.exe Token: SeManageVolumePrivilege 1948 WMIC.exe Token: 33 1948 WMIC.exe Token: 34 1948 WMIC.exe Token: 35 1948 WMIC.exe Token: SeIncreaseQuotaPrivilege 1948 WMIC.exe Token: SeSecurityPrivilege 1948 WMIC.exe Token: SeTakeOwnershipPrivilege 1948 WMIC.exe Token: SeLoadDriverPrivilege 1948 WMIC.exe Token: SeSystemProfilePrivilege 1948 WMIC.exe Token: SeSystemtimePrivilege 1948 WMIC.exe Token: SeProfSingleProcessPrivilege 1948 WMIC.exe Token: SeIncBasePriorityPrivilege 1948 WMIC.exe Token: SeCreatePagefilePrivilege 1948 WMIC.exe Token: SeBackupPrivilege 1948 WMIC.exe Token: SeRestorePrivilege 1948 WMIC.exe Token: SeShutdownPrivilege 1948 WMIC.exe Token: SeDebugPrivilege 1948 WMIC.exe Token: SeSystemEnvironmentPrivilege 1948 WMIC.exe Token: SeRemoteShutdownPrivilege 1948 WMIC.exe Token: SeUndockPrivilege 1948 WMIC.exe Token: SeManageVolumePrivilege 1948 WMIC.exe Token: 33 1948 WMIC.exe Token: 34 1948 WMIC.exe Token: 35 1948 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 460 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 27 PID 1620 wrote to memory of 460 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 27 PID 1620 wrote to memory of 460 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 27 PID 1620 wrote to memory of 460 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 27 PID 1620 wrote to memory of 1308 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 28 PID 1620 wrote to memory of 1308 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 28 PID 1620 wrote to memory of 1308 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 28 PID 1620 wrote to memory of 1308 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 28 PID 1620 wrote to memory of 1476 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 29 PID 1620 wrote to memory of 1476 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 29 PID 1620 wrote to memory of 1476 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 29 PID 1620 wrote to memory of 1476 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 29 PID 1620 wrote to memory of 1224 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 11 PID 1620 wrote to memory of 1348 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 10 PID 1620 wrote to memory of 964 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 30 PID 1620 wrote to memory of 964 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 30 PID 1620 wrote to memory of 964 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 30 PID 1620 wrote to memory of 964 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 30 PID 1620 wrote to memory of 664 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 32 PID 1620 wrote to memory of 664 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 32 PID 1620 wrote to memory of 664 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 32 PID 1620 wrote to memory of 664 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 32 PID 1620 wrote to memory of 1832 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 34 PID 1620 wrote to memory of 1832 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 34 PID 1620 wrote to memory of 1832 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 34 PID 1620 wrote to memory of 1832 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 34 PID 1620 wrote to memory of 1060 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 35 PID 1620 wrote to memory of 1060 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 35 PID 1620 wrote to memory of 1060 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 35 PID 1620 wrote to memory of 1060 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 35 PID 1620 wrote to memory of 812 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 39 PID 1620 wrote to memory of 812 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 39 PID 1620 wrote to memory of 812 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 39 PID 1620 wrote to memory of 812 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 39 PID 1620 wrote to memory of 1500 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 40 PID 1620 wrote to memory of 1500 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 40 PID 1620 wrote to memory of 1500 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 40 PID 1620 wrote to memory of 1500 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 40 PID 1620 wrote to memory of 1552 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 42 PID 1620 wrote to memory of 1552 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 42 PID 1620 wrote to memory of 1552 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 42 PID 1620 wrote to memory of 1552 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 42 PID 1620 wrote to memory of 1544 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 44 PID 1620 wrote to memory of 1544 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 44 PID 1620 wrote to memory of 1544 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 44 PID 1620 wrote to memory of 1544 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 44 PID 1832 wrote to memory of 1900 1832 cmd.exe 46 PID 1832 wrote to memory of 1900 1832 cmd.exe 46 PID 1832 wrote to memory of 1900 1832 cmd.exe 46 PID 1832 wrote to memory of 1900 1832 cmd.exe 46 PID 1544 wrote to memory of 1744 1544 cmd.exe 47 PID 1544 wrote to memory of 1744 1544 cmd.exe 47 PID 1544 wrote to memory of 1744 1544 cmd.exe 47 PID 1544 wrote to memory of 1744 1544 cmd.exe 47 PID 664 wrote to memory of 1948 664 cmd.exe 48 PID 664 wrote to memory of 1948 664 cmd.exe 48 PID 664 wrote to memory of 1948 664 cmd.exe 48 PID 664 wrote to memory of 1948 664 cmd.exe 48 PID 1620 wrote to memory of 984 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 52 PID 1620 wrote to memory of 984 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 52 PID 1620 wrote to memory of 984 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 52 PID 1620 wrote to memory of 984 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 52 PID 1620 wrote to memory of 1544 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 53 PID 1620 wrote to memory of 1544 1620 ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe 53
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe"C:\Users\Admin\AppData\Local\Temp\ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\XaeZJwIEalan.exe"C:\Users\Admin\AppData\Local\Temp\XaeZJwIEalan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\HQxuGcGkelan.exe"C:\Users\Admin\AppData\Local\Temp\HQxuGcGkelan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\cfdGvSuZOlan.exe"C:\Users\Admin\AppData\Local\Temp\cfdGvSuZOlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1476
-
-
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /CREATE /NP /SC DAILY /TN "PrintZ0" /TR "C:\Windows\System32\cmd.exe /c for /l %x in (1,1,50) do start wordpad.exe /p C:\users\Public\7MUMg.dll" /ST 10:25 /SD 02/21/2022 /ED 02/28/20222⤵
- Creates scheduled task(s)
PID:964
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "WMIC.exe shadowcopy delete"2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "vssadmin.exe Delete Shadows /all /quiet"2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "bcdedit /set {default} recoveryenabled No & bcdedit /set {default}"2⤵PID:1060
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "bootstatuspolicy ignoreallfailures"2⤵PID:812
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1500
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "EV" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe" /f /reg:642⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "EV" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ff90b93b8b79c8fb881b489263d53dd69dd5b98211507a2956885d7c71e086a2.exe" /f /reg:643⤵
- Adds Run key to start application
PID:1744
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1504
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵PID:1544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:604
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1956
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:1172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1256
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1316