Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-03-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe
Resource
win10v2004-en-20220113
General
-
Target
84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe
-
Size
265KB
-
MD5
346915c9e393a448042500d680c90b06
-
SHA1
f79d53e8462279b7a35e11eab63980d5ce8fa38a
-
SHA256
84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03
-
SHA512
5b1c2109bd11d86130623fe03c1725d807f828539d56fc9b956f50df6abc4c2b637763e0b650e361003b6a0321827045cce30a0ba7add27408c715ae0586a883
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 1528 wbadmin.exe -
Loads dropped DLL 3 IoCs
pid Process 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe\"" 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 968 set thread context of 976 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 27 PID 776 set thread context of 1700 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 40 PID 1796 set thread context of 1744 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 47 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115867.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_SelectionSubpicture.png 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Funafuti 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\picturePuzzle.js 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_docked.png 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0252629.WMF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14578_.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\TAB_ON.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\MENUS.JS 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861261279.profile.gz 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Oblique.otf.[AD498F56].[[email protected]].moloch 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\MSB1ENFR.ITS 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107316.WMF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145669.JPG 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239951.WMF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\CHEVRON.ICO 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\gadget.xml 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\VideoLAN\VLC\README.txt 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider_left.png 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\PREVIEW.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\RSSFeeds.css 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdate.cer 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285750.WMF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL110.XML 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jre7\lib\flavormap.properties 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\readme-warning.txt 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Stanley 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\feature.properties 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File created C:\Program Files\Java\jre7\lib\zi\readme-warning.txt 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-gibbous.png 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\mshwLatin.dll.mui 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis.css 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7fr.kic 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_hover.png 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\CodeFile.zip 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_ja.jar 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00297_.WMF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00555_.WMF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21323_.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLLIBR.REST.IDX_DLL 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR9B.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+9 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\readme-warning.txt 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\handsafe.reg 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-modules-appui.xml 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santo_Domingo 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR36F.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_de.properties 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Winnipeg 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01607U.BMP 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115841.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\readme-warning.txt 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0298897.WMF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\chkrzm.exe.mui 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01748_.GIF 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageHistoryIconImages.jpg 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\tipresx.dll.mui 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\vocaroo.luac 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1072 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 976 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 1388 vssvc.exe Token: SeRestorePrivilege 1388 vssvc.exe Token: SeAuditPrivilege 1388 vssvc.exe Token: SeBackupPrivilege 936 wbengine.exe Token: SeRestorePrivilege 936 wbengine.exe Token: SeSecurityPrivilege 936 wbengine.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe Token: SeIncreaseQuotaPrivilege 2012 WMIC.exe Token: SeSecurityPrivilege 2012 WMIC.exe Token: SeTakeOwnershipPrivilege 2012 WMIC.exe Token: SeLoadDriverPrivilege 2012 WMIC.exe Token: SeSystemProfilePrivilege 2012 WMIC.exe Token: SeSystemtimePrivilege 2012 WMIC.exe Token: SeProfSingleProcessPrivilege 2012 WMIC.exe Token: SeIncBasePriorityPrivilege 2012 WMIC.exe Token: SeCreatePagefilePrivilege 2012 WMIC.exe Token: SeBackupPrivilege 2012 WMIC.exe Token: SeRestorePrivilege 2012 WMIC.exe Token: SeShutdownPrivilege 2012 WMIC.exe Token: SeDebugPrivilege 2012 WMIC.exe Token: SeSystemEnvironmentPrivilege 2012 WMIC.exe Token: SeRemoteShutdownPrivilege 2012 WMIC.exe Token: SeUndockPrivilege 2012 WMIC.exe Token: SeManageVolumePrivilege 2012 WMIC.exe Token: 33 2012 WMIC.exe Token: 34 2012 WMIC.exe Token: 35 2012 WMIC.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 968 wrote to memory of 976 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 27 PID 968 wrote to memory of 976 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 27 PID 968 wrote to memory of 976 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 27 PID 968 wrote to memory of 976 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 27 PID 968 wrote to memory of 976 968 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 27 PID 976 wrote to memory of 992 976 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 29 PID 976 wrote to memory of 992 976 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 29 PID 976 wrote to memory of 992 976 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 29 PID 976 wrote to memory of 992 976 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 29 PID 992 wrote to memory of 1072 992 cmd.exe 31 PID 992 wrote to memory of 1072 992 cmd.exe 31 PID 992 wrote to memory of 1072 992 cmd.exe 31 PID 992 wrote to memory of 1528 992 cmd.exe 34 PID 992 wrote to memory of 1528 992 cmd.exe 34 PID 992 wrote to memory of 1528 992 cmd.exe 34 PID 992 wrote to memory of 2012 992 cmd.exe 38 PID 992 wrote to memory of 2012 992 cmd.exe 38 PID 992 wrote to memory of 2012 992 cmd.exe 38 PID 776 wrote to memory of 1700 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 40 PID 776 wrote to memory of 1700 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 40 PID 776 wrote to memory of 1700 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 40 PID 776 wrote to memory of 1700 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 40 PID 776 wrote to memory of 1700 776 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 40 PID 1796 wrote to memory of 1744 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 47 PID 1796 wrote to memory of 1744 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 47 PID 1796 wrote to memory of 1744 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 47 PID 1796 wrote to memory of 1744 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 47 PID 1796 wrote to memory of 1744 1796 84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe" n9763⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe" n9764⤵PID:1700
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1072
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1528
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe" n9763⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe"C:\Users\Admin\AppData\Local\Temp\84720cda294b3151756701683b8e39fe3a0b00f2646f772693557c25fad02d03.exe" n9764⤵PID:1744
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:936
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1644
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1916