Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05-03-2022 15:07
Static task
static1
Behavioral task
behavioral1
Sample
4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe
Resource
win10v2004-en-20220112
General
-
Target
4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe
-
Size
35KB
-
MD5
7fa0fa3cf6864208cd4ba695c4a52643
-
SHA1
3c2e1758364feeb2c4ef571970228fbfb930f66f
-
SHA256
4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f
-
SHA512
9049a686db21a107c1ca361e9ea5c5789429b3019666a629f8a1b04befa5389c66155e657ea47bc31fe6ab39f22f44a2b551057d6becc4b1492dd462e5a9e396
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\scoped_dir4852_1606327479\CRX_INSTALL\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 2752 wbadmin.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CheckpointUnblock.tiff 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Users\Admin\Pictures\SwitchSend.tiff 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe\"" 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionSmallTile.scale-125.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.targetsize-256_altform-lightunplated.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pl-pl\ui-strings.js 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\ui-strings.js 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\SmallTile.scale-125.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\AppxSignature.p7x 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\EmptyShare.scale-125.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\x.cur 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTrial-ul-oob.xrm-ms 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ro-ro\readme-warning.txt 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\readme-warning.txt 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-36_altform-unplated.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\EmptyShare.scale-400.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\es-es\readme-warning.txt 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-30_altform-unplated.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\Controls\ErrorControl.xaml 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\adojavas.inc 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SliderHandle.xbf 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-125.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\WorldClockSmallTile.contrast-black_scale-200.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\selection-actions.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_EyeLashEye.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\bun.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-black_targetsize-24.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-32_altform-fullcolor.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\readme-warning.txt 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\readme-warning.txt 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-phn.xrm-ms 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-30.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jvm_zh_CN.jar 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\189.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\AppxSignature.p7x 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-72_altform-lightunplated.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\LargeTile.scale-200.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-32_contrast-white.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-il\ui-strings.js 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee100.tlb 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\readme-warning.txt 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNotePageMedTile.scale-200.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailLargeTile.scale-400.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ja-jp\ui-strings.js 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\it-it\readme-warning.txt 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ClassicPhotoAlbum.potx 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\icons.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\onboarding\contacts_variant1_v3.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-ul-oob.xrm-ms 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\BadgeLogo.scale-400_contrast-white.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-24_altform-lightunplated.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\AppxManifest.xml 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia.api 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hu-hu\ui-strings.js 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019DemoR_BypassTrial180-ul-oob.xrm-ms 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\PAPYRUS.INF 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-72_altform-unplated.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailLargeTile.scale-150.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\LargeTile.scale-200.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pt-br\ui-strings.js 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-core-kit.xml 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarLargeTile.scale-400.png 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3564 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3752 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe 3752 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeBackupPrivilege 1656 vssvc.exe Token: SeRestorePrivilege 1656 vssvc.exe Token: SeAuditPrivilege 1656 vssvc.exe Token: SeBackupPrivilege 1856 wbengine.exe Token: SeRestorePrivilege 1856 wbengine.exe Token: SeSecurityPrivilege 1856 wbengine.exe Token: SeIncreaseQuotaPrivilege 3736 WMIC.exe Token: SeSecurityPrivilege 3736 WMIC.exe Token: SeTakeOwnershipPrivilege 3736 WMIC.exe Token: SeLoadDriverPrivilege 3736 WMIC.exe Token: SeSystemProfilePrivilege 3736 WMIC.exe Token: SeSystemtimePrivilege 3736 WMIC.exe Token: SeProfSingleProcessPrivilege 3736 WMIC.exe Token: SeIncBasePriorityPrivilege 3736 WMIC.exe Token: SeCreatePagefilePrivilege 3736 WMIC.exe Token: SeBackupPrivilege 3736 WMIC.exe Token: SeRestorePrivilege 3736 WMIC.exe Token: SeShutdownPrivilege 3736 WMIC.exe Token: SeDebugPrivilege 3736 WMIC.exe Token: SeSystemEnvironmentPrivilege 3736 WMIC.exe Token: SeRemoteShutdownPrivilege 3736 WMIC.exe Token: SeUndockPrivilege 3736 WMIC.exe Token: SeManageVolumePrivilege 3736 WMIC.exe Token: 33 3736 WMIC.exe Token: 34 3736 WMIC.exe Token: 35 3736 WMIC.exe Token: 36 3736 WMIC.exe Token: SeIncreaseQuotaPrivilege 3736 WMIC.exe Token: SeSecurityPrivilege 3736 WMIC.exe Token: SeTakeOwnershipPrivilege 3736 WMIC.exe Token: SeLoadDriverPrivilege 3736 WMIC.exe Token: SeSystemProfilePrivilege 3736 WMIC.exe Token: SeSystemtimePrivilege 3736 WMIC.exe Token: SeProfSingleProcessPrivilege 3736 WMIC.exe Token: SeIncBasePriorityPrivilege 3736 WMIC.exe Token: SeCreatePagefilePrivilege 3736 WMIC.exe Token: SeBackupPrivilege 3736 WMIC.exe Token: SeRestorePrivilege 3736 WMIC.exe Token: SeShutdownPrivilege 3736 WMIC.exe Token: SeDebugPrivilege 3736 WMIC.exe Token: SeSystemEnvironmentPrivilege 3736 WMIC.exe Token: SeRemoteShutdownPrivilege 3736 WMIC.exe Token: SeUndockPrivilege 3736 WMIC.exe Token: SeManageVolumePrivilege 3736 WMIC.exe Token: 33 3736 WMIC.exe Token: 34 3736 WMIC.exe Token: 35 3736 WMIC.exe Token: 36 3736 WMIC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3752 wrote to memory of 3408 3752 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe 57 PID 3752 wrote to memory of 3408 3752 4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe 57 PID 3408 wrote to memory of 3564 3408 cmd.exe 59 PID 3408 wrote to memory of 3564 3408 cmd.exe 59 PID 3408 wrote to memory of 2752 3408 cmd.exe 62 PID 3408 wrote to memory of 2752 3408 cmd.exe 62 PID 3408 wrote to memory of 3736 3408 cmd.exe 66 PID 3408 wrote to memory of 3736 3408 cmd.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe"C:\Users\Admin\AppData\Local\Temp\4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe"C:\Users\Admin\AppData\Local\Temp\4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe" n37522⤵PID:3248
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3564
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:2752
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe"C:\Users\Admin\AppData\Local\Temp\4563abb9d806132249083fe8254fac79a54c2d8d7d3bfe0c313f01976bc6d90f.exe" n37522⤵PID:3616
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3368
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:2460