Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05-03-2022 19:30
Static task
static1
Behavioral task
behavioral1
Sample
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe
Resource
win10v2004-en-20220112
General
-
Target
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe
-
Size
35KB
-
MD5
592aafb1e6e8d972cf5b32ab96e0b9bc
-
SHA1
012c542b7ee058edb72f9ce0fc738ff34561e043
-
SHA256
84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1
-
SHA512
f97cc86f2b92be722573258ee45ffcd662e4ef30ef7f3476ed877d52d4a08d5aed4aec635b1fbd7a44f9e45d01fc0375e47b1d801fbd37116a02aac6b3dee87c
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\scoped_dir4852_1606327479\CRX_INSTALL\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 936 wbadmin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe\"" 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\feature.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Archive.zip 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.targetsize-24_altform-unplated.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupWideTile.scale-200.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaprsr.dll.mui 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\derby_common.bat 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-sampler.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\TellMeExcel.nrr 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-180.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial-pl.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-80.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-40_contrast-white.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-search.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office15\pkeyconfig-office.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\6445_48x48x32.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-ul-oob.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\catalog.json 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EXPEDITN\EXPEDITN.INF 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\3px.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SplashScreen.scale-100.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-modules-appui.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSO.ACL 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\officemui.msi.16.en-us.vreg.dat 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteSmallTile.scale-150.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-40_altform-unplated.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_ja_4.4.0.v20140623020002.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_MAK-ul-oob.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTrial-ul-oob.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\GetHelpOffline2.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteMediumTile.scale-150.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_ja.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue Green.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ppd.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\7739_20x20x32.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.zh_CN_5.5.0.165303.jar 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\ISO690Nmerical.XSL 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7wre_fr.dub 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Fonts\BroMDL2.2.33.ttf 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fr-FR\View3d\3DViewerProductDescription-universal.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSplashLogo.scale-300.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_OEM_Perp-ul-phn.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Background_RoomTracing_02.jpg 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-140.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupWideTile.scale-400.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-pl.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.ini 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\WideTile.scale-125.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_2019.904.1644.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_KMS_Client-ppd.xrm-ms 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\readme-warning.txt 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\clearkey.dll.sig 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-36_altform-unplated_contrast-white.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msth8EN.LEX 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.scale-150.png 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1164 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2504 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe 2504 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeBackupPrivilege 3148 vssvc.exe Token: SeRestorePrivilege 3148 vssvc.exe Token: SeAuditPrivilege 3148 vssvc.exe Token: SeBackupPrivilege 2200 wbengine.exe Token: SeRestorePrivilege 2200 wbengine.exe Token: SeSecurityPrivilege 2200 wbengine.exe Token: SeIncreaseQuotaPrivilege 560 WMIC.exe Token: SeSecurityPrivilege 560 WMIC.exe Token: SeTakeOwnershipPrivilege 560 WMIC.exe Token: SeLoadDriverPrivilege 560 WMIC.exe Token: SeSystemProfilePrivilege 560 WMIC.exe Token: SeSystemtimePrivilege 560 WMIC.exe Token: SeProfSingleProcessPrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 560 WMIC.exe Token: SeBackupPrivilege 560 WMIC.exe Token: SeRestorePrivilege 560 WMIC.exe Token: SeShutdownPrivilege 560 WMIC.exe Token: SeDebugPrivilege 560 WMIC.exe Token: SeSystemEnvironmentPrivilege 560 WMIC.exe Token: SeRemoteShutdownPrivilege 560 WMIC.exe Token: SeUndockPrivilege 560 WMIC.exe Token: SeManageVolumePrivilege 560 WMIC.exe Token: 33 560 WMIC.exe Token: 34 560 WMIC.exe Token: 35 560 WMIC.exe Token: 36 560 WMIC.exe Token: SeIncreaseQuotaPrivilege 560 WMIC.exe Token: SeSecurityPrivilege 560 WMIC.exe Token: SeTakeOwnershipPrivilege 560 WMIC.exe Token: SeLoadDriverPrivilege 560 WMIC.exe Token: SeSystemProfilePrivilege 560 WMIC.exe Token: SeSystemtimePrivilege 560 WMIC.exe Token: SeProfSingleProcessPrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 560 WMIC.exe Token: SeBackupPrivilege 560 WMIC.exe Token: SeRestorePrivilege 560 WMIC.exe Token: SeShutdownPrivilege 560 WMIC.exe Token: SeDebugPrivilege 560 WMIC.exe Token: SeSystemEnvironmentPrivilege 560 WMIC.exe Token: SeRemoteShutdownPrivilege 560 WMIC.exe Token: SeUndockPrivilege 560 WMIC.exe Token: SeManageVolumePrivilege 560 WMIC.exe Token: 33 560 WMIC.exe Token: 34 560 WMIC.exe Token: 35 560 WMIC.exe Token: 36 560 WMIC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1000 2504 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe 61 PID 2504 wrote to memory of 1000 2504 84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe 61 PID 1000 wrote to memory of 1164 1000 cmd.exe 63 PID 1000 wrote to memory of 1164 1000 cmd.exe 63 PID 1000 wrote to memory of 936 1000 cmd.exe 66 PID 1000 wrote to memory of 936 1000 cmd.exe 66 PID 1000 wrote to memory of 560 1000 cmd.exe 73 PID 1000 wrote to memory of 560 1000 cmd.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe"C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe"C:\Users\Admin\AppData\Local\Temp\84750bd7b2d5a6ddd15c00f9d4193b19f468cc5714529ab46d127b70df65f3d1.exe" n25042⤵PID:2972
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1164
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:936
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3444