Analysis
-
max time kernel
4294192s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
05/03/2022, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
Resource
win10v2004-en-20220113
General
-
Target
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
-
Size
217KB
-
MD5
cffe48eed73a2006503d1094dd7e07bf
-
SHA1
2484ea7e8661d7f21aadb7fb4d79748bc7baae73
-
SHA256
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
-
SHA512
959cd0e7ad00e019301747b0eb4f080f1e2227d360f01f6095c7fc2a8876158b1fbe644f9fc5156c290bbf756a62df26244cc3a94f811cdd9f6ef67c422af5eb
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
_______________
_______________
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1808 explorer.exe 1536 explorer.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\DebugUnlock.tiff explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\explorer.exe\" -start" 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\A: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\W: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\B: explorer.exe File opened (read-only) \??\Y: explorer.exe File opened (read-only) \??\Q: explorer.exe File opened (read-only) \??\K: explorer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-masterfs.jar.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\2d.x3d.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WING1.WMF explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\plugin.xml.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0202045.JPG.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18205_.WMF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART2.BDR explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\jmxremote.password.template explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\dnsns.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0281638.WMF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe explorer.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\appletrailers.luac explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\viewDblClick.js explorer.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\FreeCell.exe.mui explorer.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\Solitaire.exe.mui explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02746U.BMP.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-coredump_ja.jar.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04191_.WMF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.DEV_COL.HXC.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR29B.GIF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\GB.XSL.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\El_Salvador.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-13.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Flash.mpp.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable_1.4.1.v20140210-1835.jar explorer.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\J0115875.GIF explorer.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt explorer.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata.ja_5.5.0.165303.jar explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099158.WMF explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382926.JPG explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKACCL.ICO.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\MINUS.GIF explorer.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\ParentMenuButtonIcon.png explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jsse.jar explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_ja_4.4.0.v20140623020002.jar explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00914_.WMF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21427_.GIF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Glace_Bay explorer.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313965.JPG.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_zh_CN.jar.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL104.XML.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\La_Rioja explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21313_.GIF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Earthy.css explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\REC.CFG.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEBCALSO.POC.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\MST explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Adelaide.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341561.JPG.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\dummy.luac.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105336.WMF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PULQOT98.POC explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00668_.WMF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN110.XML.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Managua.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\MANIFEST.MF.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.RSA.664-2E4-EF9 explorer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\currency.data.664-2E4-EF9 explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 576 588 WerFault.exe 28 624 1764 WerFault.exe 52 -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1000 vssadmin.exe 1564 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe Token: SeDebugPrivilege 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe Token: SeIncreaseQuotaPrivilege 1928 WMIC.exe Token: SeSecurityPrivilege 1928 WMIC.exe Token: SeTakeOwnershipPrivilege 1928 WMIC.exe Token: SeLoadDriverPrivilege 1928 WMIC.exe Token: SeSystemProfilePrivilege 1928 WMIC.exe Token: SeSystemtimePrivilege 1928 WMIC.exe Token: SeProfSingleProcessPrivilege 1928 WMIC.exe Token: SeIncBasePriorityPrivilege 1928 WMIC.exe Token: SeCreatePagefilePrivilege 1928 WMIC.exe Token: SeBackupPrivilege 1928 WMIC.exe Token: SeRestorePrivilege 1928 WMIC.exe Token: SeShutdownPrivilege 1928 WMIC.exe Token: SeDebugPrivilege 1928 WMIC.exe Token: SeSystemEnvironmentPrivilege 1928 WMIC.exe Token: SeRemoteShutdownPrivilege 1928 WMIC.exe Token: SeUndockPrivilege 1928 WMIC.exe Token: SeManageVolumePrivilege 1928 WMIC.exe Token: 33 1928 WMIC.exe Token: 34 1928 WMIC.exe Token: 35 1928 WMIC.exe Token: SeIncreaseQuotaPrivilege 1632 WMIC.exe Token: SeSecurityPrivilege 1632 WMIC.exe Token: SeTakeOwnershipPrivilege 1632 WMIC.exe Token: SeLoadDriverPrivilege 1632 WMIC.exe Token: SeSystemProfilePrivilege 1632 WMIC.exe Token: SeSystemtimePrivilege 1632 WMIC.exe Token: SeProfSingleProcessPrivilege 1632 WMIC.exe Token: SeIncBasePriorityPrivilege 1632 WMIC.exe Token: SeCreatePagefilePrivilege 1632 WMIC.exe Token: SeBackupPrivilege 1632 WMIC.exe Token: SeRestorePrivilege 1632 WMIC.exe Token: SeShutdownPrivilege 1632 WMIC.exe Token: SeDebugPrivilege 1632 WMIC.exe Token: SeSystemEnvironmentPrivilege 1632 WMIC.exe Token: SeRemoteShutdownPrivilege 1632 WMIC.exe Token: SeUndockPrivilege 1632 WMIC.exe Token: SeManageVolumePrivilege 1632 WMIC.exe Token: 33 1632 WMIC.exe Token: 34 1632 WMIC.exe Token: 35 1632 WMIC.exe Token: SeIncreaseQuotaPrivilege 1632 WMIC.exe Token: SeSecurityPrivilege 1632 WMIC.exe Token: SeTakeOwnershipPrivilege 1632 WMIC.exe Token: SeLoadDriverPrivilege 1632 WMIC.exe Token: SeSystemProfilePrivilege 1632 WMIC.exe Token: SeSystemtimePrivilege 1632 WMIC.exe Token: SeProfSingleProcessPrivilege 1632 WMIC.exe Token: SeIncBasePriorityPrivilege 1632 WMIC.exe Token: SeCreatePagefilePrivilege 1632 WMIC.exe Token: SeBackupPrivilege 1632 WMIC.exe Token: SeRestorePrivilege 1632 WMIC.exe Token: SeShutdownPrivilege 1632 WMIC.exe Token: SeDebugPrivilege 1632 WMIC.exe Token: SeSystemEnvironmentPrivilege 1632 WMIC.exe Token: SeRemoteShutdownPrivilege 1632 WMIC.exe Token: SeUndockPrivilege 1632 WMIC.exe Token: SeManageVolumePrivilege 1632 WMIC.exe Token: 33 1632 WMIC.exe Token: 34 1632 WMIC.exe Token: 35 1632 WMIC.exe Token: SeIncreaseQuotaPrivilege 1928 WMIC.exe Token: SeSecurityPrivilege 1928 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1808 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 27 PID 1668 wrote to memory of 1808 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 27 PID 1668 wrote to memory of 1808 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 27 PID 1668 wrote to memory of 1808 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 27 PID 1668 wrote to memory of 588 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 28 PID 1668 wrote to memory of 588 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 28 PID 1668 wrote to memory of 588 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 28 PID 1668 wrote to memory of 588 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 28 PID 1668 wrote to memory of 588 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 28 PID 1668 wrote to memory of 588 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 28 PID 1668 wrote to memory of 588 1668 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe 28 PID 588 wrote to memory of 576 588 notepad.exe 29 PID 588 wrote to memory of 576 588 notepad.exe 29 PID 588 wrote to memory of 576 588 notepad.exe 29 PID 588 wrote to memory of 576 588 notepad.exe 29 PID 1808 wrote to memory of 432 1808 explorer.exe 30 PID 1808 wrote to memory of 432 1808 explorer.exe 30 PID 1808 wrote to memory of 432 1808 explorer.exe 30 PID 1808 wrote to memory of 432 1808 explorer.exe 30 PID 1808 wrote to memory of 844 1808 explorer.exe 31 PID 1808 wrote to memory of 844 1808 explorer.exe 31 PID 1808 wrote to memory of 844 1808 explorer.exe 31 PID 1808 wrote to memory of 844 1808 explorer.exe 31 PID 1808 wrote to memory of 296 1808 explorer.exe 33 PID 1808 wrote to memory of 296 1808 explorer.exe 33 PID 1808 wrote to memory of 296 1808 explorer.exe 33 PID 1808 wrote to memory of 296 1808 explorer.exe 33 PID 1808 wrote to memory of 2008 1808 explorer.exe 37 PID 1808 wrote to memory of 2008 1808 explorer.exe 37 PID 1808 wrote to memory of 2008 1808 explorer.exe 37 PID 1808 wrote to memory of 2008 1808 explorer.exe 37 PID 1808 wrote to memory of 2000 1808 explorer.exe 35 PID 1808 wrote to memory of 2000 1808 explorer.exe 35 PID 1808 wrote to memory of 2000 1808 explorer.exe 35 PID 1808 wrote to memory of 2000 1808 explorer.exe 35 PID 1808 wrote to memory of 2004 1808 explorer.exe 40 PID 1808 wrote to memory of 2004 1808 explorer.exe 40 PID 1808 wrote to memory of 2004 1808 explorer.exe 40 PID 1808 wrote to memory of 2004 1808 explorer.exe 40 PID 1808 wrote to memory of 1536 1808 explorer.exe 39 PID 1808 wrote to memory of 1536 1808 explorer.exe 39 PID 1808 wrote to memory of 1536 1808 explorer.exe 39 PID 1808 wrote to memory of 1536 1808 explorer.exe 39 PID 432 wrote to memory of 1928 432 cmd.exe 41 PID 432 wrote to memory of 1928 432 cmd.exe 41 PID 432 wrote to memory of 1928 432 cmd.exe 41 PID 432 wrote to memory of 1928 432 cmd.exe 41 PID 2000 wrote to memory of 1000 2000 cmd.exe 44 PID 2000 wrote to memory of 1000 2000 cmd.exe 44 PID 2000 wrote to memory of 1000 2000 cmd.exe 44 PID 2000 wrote to memory of 1000 2000 cmd.exe 44 PID 2004 wrote to memory of 1632 2004 cmd.exe 45 PID 2004 wrote to memory of 1632 2004 cmd.exe 45 PID 2004 wrote to memory of 1632 2004 cmd.exe 45 PID 2004 wrote to memory of 1632 2004 cmd.exe 45 PID 2004 wrote to memory of 1564 2004 cmd.exe 48 PID 2004 wrote to memory of 1564 2004 cmd.exe 48 PID 2004 wrote to memory of 1564 2004 cmd.exe 48 PID 2004 wrote to memory of 1564 2004 cmd.exe 48 PID 1808 wrote to memory of 1764 1808 explorer.exe 52 PID 1808 wrote to memory of 1764 1808 explorer.exe 52 PID 1808 wrote to memory of 1764 1808 explorer.exe 52 PID 1808 wrote to memory of 1764 1808 explorer.exe 52 PID 1808 wrote to memory of 1764 1808 explorer.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe"C:\Users\Admin\AppData\Local\Temp\4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:2008
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" -agent 03⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
PID:1536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1564
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 1964⤵
- Program crash
PID:624
-
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 1963⤵
- Program crash
PID:576
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:804