Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-03-2022 16:21
Static task
static1
Behavioral task
behavioral1
Sample
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
Resource
win10v2004-en-20220113
General
-
Target
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe
-
Size
217KB
-
MD5
cffe48eed73a2006503d1094dd7e07bf
-
SHA1
2484ea7e8661d7f21aadb7fb4d79748bc7baae73
-
SHA256
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
-
SHA512
959cd0e7ad00e019301747b0eb4f080f1e2227d360f01f6095c7fc2a8876158b1fbe644f9fc5156c290bbf756a62df26244cc3a94f811cdd9f6ef67c422af5eb
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
_______________
_______________
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
taskeng.exetaskeng.exepid process 4404 taskeng.exe 360 taskeng.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskeng.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\taskeng.exe\" -start" 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
taskeng.exedescription ioc process File opened (read-only) \??\H: taskeng.exe File opened (read-only) \??\X: taskeng.exe File opened (read-only) \??\W: taskeng.exe File opened (read-only) \??\V: taskeng.exe File opened (read-only) \??\U: taskeng.exe File opened (read-only) \??\S: taskeng.exe File opened (read-only) \??\Q: taskeng.exe File opened (read-only) \??\L: taskeng.exe File opened (read-only) \??\Y: taskeng.exe File opened (read-only) \??\R: taskeng.exe File opened (read-only) \??\N: taskeng.exe File opened (read-only) \??\M: taskeng.exe File opened (read-only) \??\G: taskeng.exe File opened (read-only) \??\E: taskeng.exe File opened (read-only) \??\T: taskeng.exe File opened (read-only) \??\J: taskeng.exe File opened (read-only) \??\I: taskeng.exe File opened (read-only) \??\B: taskeng.exe File opened (read-only) \??\Z: taskeng.exe File opened (read-only) \??\P: taskeng.exe File opened (read-only) \??\O: taskeng.exe File opened (read-only) \??\K: taskeng.exe File opened (read-only) \??\F: taskeng.exe File opened (read-only) \??\A: taskeng.exe -
Drops file in Program Files directory 64 IoCs
Processes:
taskeng.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\apple-touch-icon-57x57-precomposed.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-phn.xrm-ms taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxSmallTile.scale-200.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsStoreLogo.scale-100.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Scan_R_RHP.aapp taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-100.png.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Store.Purchase\Resources\XboxResourceDictionary.xaml taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-256_altform-unplated.png taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.zh_CN_5.5.0.165303.jar.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorWideTile.contrast-black_scale-200.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-48_altform-unplated.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\MedTile.scale-200.png taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.sun.el_2.2.0.v201303151357.jar taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-64_contrast-black.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\ui-strings.js taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNewNoteWideTile.scale-125.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\duplicate.svg.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-queries.xml taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-ui.xml.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-phn.xrm-ms taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Checkmark.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\SuccessDot.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\FetchingMail-Dark.scale-125.png taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_TW.properties.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp5-ul-oob.xrm-ms.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\ATPVBAEN.XLAM taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.osgi.services_3.4.0.v20140312-2051.jar.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-white\MedTile.scale-100.png taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Light.scale-400.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\ui-strings.js taskeng.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-windows_ja.jar.664-2E4-EF9 taskeng.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-fr\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Franklin Gothic.xml taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\ui-strings.js taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_altform-unplated_contrast-white.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupLargeTile.scale-150.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderLogoExtensions.targetsize-128.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\resources.pri taskeng.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0409-1000-0000000FF1CE.xml taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-pl.xrm-ms taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] taskeng.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorSplashScreen.contrast-white_scale-125.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_fr.json taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\adobe_spinner.gif taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected] taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\az_get.svg taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.ibm.icu_52.1.0.v201404241930.jar.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-ul-phn.xrm-ms.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\LargeTile.scale-125.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\Json\EmailAction-AdaptiveCard.json taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.scale-200.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\adc_logo.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\AppStore_icon.svg.664-2E4-EF9 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfxswt.jar taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Grace-ppd.xrm-ms taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-180.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\SplashScreen.scale-100.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_bg.json taskeng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe Token: SeDebugPrivilege 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe Token: SeIncreaseQuotaPrivilege 1864 WMIC.exe Token: SeSecurityPrivilege 1864 WMIC.exe Token: SeTakeOwnershipPrivilege 1864 WMIC.exe Token: SeLoadDriverPrivilege 1864 WMIC.exe Token: SeSystemProfilePrivilege 1864 WMIC.exe Token: SeSystemtimePrivilege 1864 WMIC.exe Token: SeProfSingleProcessPrivilege 1864 WMIC.exe Token: SeIncBasePriorityPrivilege 1864 WMIC.exe Token: SeCreatePagefilePrivilege 1864 WMIC.exe Token: SeBackupPrivilege 1864 WMIC.exe Token: SeRestorePrivilege 1864 WMIC.exe Token: SeShutdownPrivilege 1864 WMIC.exe Token: SeDebugPrivilege 1864 WMIC.exe Token: SeSystemEnvironmentPrivilege 1864 WMIC.exe Token: SeRemoteShutdownPrivilege 1864 WMIC.exe Token: SeUndockPrivilege 1864 WMIC.exe Token: SeManageVolumePrivilege 1864 WMIC.exe Token: 33 1864 WMIC.exe Token: 34 1864 WMIC.exe Token: 35 1864 WMIC.exe Token: 36 1864 WMIC.exe Token: SeIncreaseQuotaPrivilege 3952 WMIC.exe Token: SeSecurityPrivilege 3952 WMIC.exe Token: SeTakeOwnershipPrivilege 3952 WMIC.exe Token: SeLoadDriverPrivilege 3952 WMIC.exe Token: SeSystemProfilePrivilege 3952 WMIC.exe Token: SeSystemtimePrivilege 3952 WMIC.exe Token: SeProfSingleProcessPrivilege 3952 WMIC.exe Token: SeIncBasePriorityPrivilege 3952 WMIC.exe Token: SeCreatePagefilePrivilege 3952 WMIC.exe Token: SeBackupPrivilege 3952 WMIC.exe Token: SeRestorePrivilege 3952 WMIC.exe Token: SeShutdownPrivilege 3952 WMIC.exe Token: SeDebugPrivilege 3952 WMIC.exe Token: SeSystemEnvironmentPrivilege 3952 WMIC.exe Token: SeRemoteShutdownPrivilege 3952 WMIC.exe Token: SeUndockPrivilege 3952 WMIC.exe Token: SeManageVolumePrivilege 3952 WMIC.exe Token: 33 3952 WMIC.exe Token: 34 3952 WMIC.exe Token: 35 3952 WMIC.exe Token: 36 3952 WMIC.exe Token: SeIncreaseQuotaPrivilege 3952 WMIC.exe Token: SeSecurityPrivilege 3952 WMIC.exe Token: SeTakeOwnershipPrivilege 3952 WMIC.exe Token: SeLoadDriverPrivilege 3952 WMIC.exe Token: SeSystemProfilePrivilege 3952 WMIC.exe Token: SeSystemtimePrivilege 3952 WMIC.exe Token: SeProfSingleProcessPrivilege 3952 WMIC.exe Token: SeIncBasePriorityPrivilege 3952 WMIC.exe Token: SeCreatePagefilePrivilege 3952 WMIC.exe Token: SeBackupPrivilege 3952 WMIC.exe Token: SeRestorePrivilege 3952 WMIC.exe Token: SeShutdownPrivilege 3952 WMIC.exe Token: SeDebugPrivilege 3952 WMIC.exe Token: SeSystemEnvironmentPrivilege 3952 WMIC.exe Token: SeRemoteShutdownPrivilege 3952 WMIC.exe Token: SeUndockPrivilege 3952 WMIC.exe Token: SeManageVolumePrivilege 3952 WMIC.exe Token: 33 3952 WMIC.exe Token: 34 3952 WMIC.exe Token: 35 3952 WMIC.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exetaskeng.execmd.execmd.exedescription pid process target process PID 2564 wrote to memory of 4404 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe taskeng.exe PID 2564 wrote to memory of 4404 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe taskeng.exe PID 2564 wrote to memory of 4404 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe taskeng.exe PID 2564 wrote to memory of 5076 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe notepad.exe PID 2564 wrote to memory of 5076 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe notepad.exe PID 2564 wrote to memory of 5076 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe notepad.exe PID 2564 wrote to memory of 5076 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe notepad.exe PID 2564 wrote to memory of 5076 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe notepad.exe PID 2564 wrote to memory of 5076 2564 4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe notepad.exe PID 4404 wrote to memory of 4316 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4316 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4316 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4332 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4332 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4332 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4396 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4396 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4396 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4616 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4616 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4616 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4620 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4620 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4620 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4284 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4284 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 4284 4404 taskeng.exe cmd.exe PID 4404 wrote to memory of 360 4404 taskeng.exe taskeng.exe PID 4404 wrote to memory of 360 4404 taskeng.exe taskeng.exe PID 4404 wrote to memory of 360 4404 taskeng.exe taskeng.exe PID 4316 wrote to memory of 1864 4316 cmd.exe WMIC.exe PID 4316 wrote to memory of 1864 4316 cmd.exe WMIC.exe PID 4316 wrote to memory of 1864 4316 cmd.exe WMIC.exe PID 4284 wrote to memory of 3952 4284 cmd.exe WMIC.exe PID 4284 wrote to memory of 3952 4284 cmd.exe WMIC.exe PID 4284 wrote to memory of 3952 4284 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe"C:\Users\Admin\AppData\Local\Temp\4f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\~temp001.batMD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exeMD5
cffe48eed73a2006503d1094dd7e07bf
SHA12484ea7e8661d7f21aadb7fb4d79748bc7baae73
SHA2564f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
SHA512959cd0e7ad00e019301747b0eb4f080f1e2227d360f01f6095c7fc2a8876158b1fbe644f9fc5156c290bbf756a62df26244cc3a94f811cdd9f6ef67c422af5eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exeMD5
cffe48eed73a2006503d1094dd7e07bf
SHA12484ea7e8661d7f21aadb7fb4d79748bc7baae73
SHA2564f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
SHA512959cd0e7ad00e019301747b0eb4f080f1e2227d360f01f6095c7fc2a8876158b1fbe644f9fc5156c290bbf756a62df26244cc3a94f811cdd9f6ef67c422af5eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exeMD5
cffe48eed73a2006503d1094dd7e07bf
SHA12484ea7e8661d7f21aadb7fb4d79748bc7baae73
SHA2564f7f151c4baa92b192d53da2d3338b7111653ed4bd8e61f6e0696164068f7144
SHA512959cd0e7ad00e019301747b0eb4f080f1e2227d360f01f6095c7fc2a8876158b1fbe644f9fc5156c290bbf756a62df26244cc3a94f811cdd9f6ef67c422af5eb
-
memory/5076-132-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB