Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
02/03/2022, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe
Resource
win10v2004-en-20220113
General
-
Target
0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe
-
Size
798KB
-
MD5
987bcd521229b303fbe384def3b9be24
-
SHA1
81606251ea97a89f483a675bc819d545e7ff515a
-
SHA256
0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36
-
SHA512
d8af7542607e2c9aace36accd594ef41c1334010917c64f7dfba806ca795715cfd967963924f732c2d4ebe7c36282bf8f96f6d971265c2a7b4b94c6d259e99b5
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_60EE3939.txt
1E6EjTqYPHLj1uovPKKRXzMpPCcpAcVuiU
https://tox.chat/download.html
Signatures
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConnectResolve.tiff 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File renamed C:\Users\Admin\Pictures\ConnectResolve.tiff => C:\Users\Admin\Pictures\ConnectResolve.tiff.ragnar_60EE3939 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File renamed C:\Users\Admin\Pictures\LockMerge.crw => C:\Users\Admin\Pictures\LockMerge.crw.ragnar_60EE3939 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File renamed C:\Users\Admin\Pictures\RepairConvertFrom.crw => C:\Users\Admin\Pictures\RepairConvertFrom.crw.ragnar_60EE3939 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nl-nl\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailWideTile.scale-125.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\OutlookMailWideTile.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-64_contrast-white.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\sendforcomments.svg 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\ui-strings.js 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\nb.pak 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\19.jpg 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-80.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\MedTile.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-pl.xrm-ms 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-BOLD.TTF 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsSplashScreen.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\2d.x3d 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\cs-cz\PlayStore_icon.svg 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\ShouldBeLessThan.snippets.ps1xml 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\LockScreenBadgeLogo.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Outlook.scale-125.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNotebookSmallTile.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-execution.xml 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\StopwatchWideTile.contrast-black_scale-125.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-ul-phn.xrm-ms 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeServiceBypassR_PrepidBypass-ul-oob.xrm-ms 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailWideTile.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-64.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\css\main-selector.css 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\upsell-2x.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\plugin.js 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\it-IT\msadcer.dll.mui 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-60_contrast-black.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.scale-100.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Glossy.eftx 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleUtilRT.winmd 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\SmallTile.scale-125.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\resources.pri 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageSmallTile.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_shared_single_filetype.svg 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Grace-ppd.xrm-ms 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedAppList.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\da-dk\ui-strings.js 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\core_icons.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_MAK_AE-pl.xrm-ms 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-24_contrast-black.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-256_altform-unplated_contrast-black_devicefamily-colorfulunplated.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files\Common Files\microsoft shared\ink\nb-NO\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-ul-oob.xrm-ms 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleWideTile.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\css\main-selector.css 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\AppxMetadata\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubAppList.scale-125.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-72_altform-unplated_contrast-white.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-36_altform-unplated_contrast-black.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Light.scale-200.png 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main.css 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files (x86)\Common Files\System\msadc\en-US\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MANIFEST.XML 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-black\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\RGNR_60EE3939.txt 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4676 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3232 notepad.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3096 wmic.exe Token: SeSecurityPrivilege 3096 wmic.exe Token: SeTakeOwnershipPrivilege 3096 wmic.exe Token: SeLoadDriverPrivilege 3096 wmic.exe Token: SeSystemProfilePrivilege 3096 wmic.exe Token: SeSystemtimePrivilege 3096 wmic.exe Token: SeProfSingleProcessPrivilege 3096 wmic.exe Token: SeIncBasePriorityPrivilege 3096 wmic.exe Token: SeCreatePagefilePrivilege 3096 wmic.exe Token: SeBackupPrivilege 3096 wmic.exe Token: SeRestorePrivilege 3096 wmic.exe Token: SeShutdownPrivilege 3096 wmic.exe Token: SeDebugPrivilege 3096 wmic.exe Token: SeSystemEnvironmentPrivilege 3096 wmic.exe Token: SeRemoteShutdownPrivilege 3096 wmic.exe Token: SeUndockPrivilege 3096 wmic.exe Token: SeManageVolumePrivilege 3096 wmic.exe Token: 33 3096 wmic.exe Token: 34 3096 wmic.exe Token: 35 3096 wmic.exe Token: 36 3096 wmic.exe Token: SeBackupPrivilege 1436 vssvc.exe Token: SeRestorePrivilege 1436 vssvc.exe Token: SeAuditPrivilege 1436 vssvc.exe Token: SeIncreaseQuotaPrivilege 3096 wmic.exe Token: SeSecurityPrivilege 3096 wmic.exe Token: SeTakeOwnershipPrivilege 3096 wmic.exe Token: SeLoadDriverPrivilege 3096 wmic.exe Token: SeSystemProfilePrivilege 3096 wmic.exe Token: SeSystemtimePrivilege 3096 wmic.exe Token: SeProfSingleProcessPrivilege 3096 wmic.exe Token: SeIncBasePriorityPrivilege 3096 wmic.exe Token: SeCreatePagefilePrivilege 3096 wmic.exe Token: SeBackupPrivilege 3096 wmic.exe Token: SeRestorePrivilege 3096 wmic.exe Token: SeShutdownPrivilege 3096 wmic.exe Token: SeDebugPrivilege 3096 wmic.exe Token: SeSystemEnvironmentPrivilege 3096 wmic.exe Token: SeRemoteShutdownPrivilege 3096 wmic.exe Token: SeUndockPrivilege 3096 wmic.exe Token: SeManageVolumePrivilege 3096 wmic.exe Token: 33 3096 wmic.exe Token: 34 3096 wmic.exe Token: 35 3096 wmic.exe Token: 36 3096 wmic.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3096 1512 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe 82 PID 1512 wrote to memory of 3096 1512 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe 82 PID 1512 wrote to memory of 4676 1512 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe 84 PID 1512 wrote to memory of 4676 1512 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe 84 PID 1512 wrote to memory of 3232 1512 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe 98 PID 1512 wrote to memory of 3232 1512 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe 98 PID 1512 wrote to memory of 3232 1512 0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe"C:\Users\Admin\AppData\Local\Temp\0aaa7a3596af6b1aae02b6e6ca878045360d467f96b0687363a9dce19ea60a36.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4676
-
-
C:\Windows\SysWOW64\notepad.exeC:\Users\Public\Documents\RGNR_60EE3939.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3232
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1436