Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 00:31
Static task
static1
Behavioral task
behavioral1
Sample
54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe
Resource
win10v2004-en-20220112
General
-
Target
54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe
-
Size
446KB
-
MD5
567204cbb8d1c5908a5316f9dfdcb353
-
SHA1
cc7eca3c24883a3b563288c08cfab7cc248a0315
-
SHA256
54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371
-
SHA512
ec4e2a03a525ae5150449d5403f2fc72b88d1cd977c503f4943b0889b82c543e46c35cd204fe27c5c03d4817bcc9413ec467637a038d2d7cd164d59d2b377f3b
Malware Config
Extracted
C:\!!! HOW TO BACK YOUR FILES !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1648 spoolsv.exe 840 spoolsv.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\PingEnter.tiff spoolsv.exe -
Loads dropped DLL 2 IoCs
pid Process 1264 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe 1648 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\spoolsv.exe\" -start" 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: spoolsv.exe File opened (read-only) \??\X: spoolsv.exe File opened (read-only) \??\U: spoolsv.exe File opened (read-only) \??\Q: spoolsv.exe File opened (read-only) \??\P: spoolsv.exe File opened (read-only) \??\N: spoolsv.exe File opened (read-only) \??\J: spoolsv.exe File opened (read-only) \??\E: spoolsv.exe File opened (read-only) \??\A: spoolsv.exe File opened (read-only) \??\Y: spoolsv.exe File opened (read-only) \??\L: spoolsv.exe File opened (read-only) \??\W: spoolsv.exe File opened (read-only) \??\T: spoolsv.exe File opened (read-only) \??\S: spoolsv.exe File opened (read-only) \??\R: spoolsv.exe File opened (read-only) \??\G: spoolsv.exe File opened (read-only) \??\Z: spoolsv.exe File opened (read-only) \??\V: spoolsv.exe File opened (read-only) \??\O: spoolsv.exe File opened (read-only) \??\M: spoolsv.exe File opened (read-only) \??\K: spoolsv.exe File opened (read-only) \??\I: spoolsv.exe File opened (read-only) \??\H: spoolsv.exe File opened (read-only) \??\F: spoolsv.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00810_.WMF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LOGO98.POC.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187829.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Hardcover.xml.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0136865.WMF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\TAB_ON.GIF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00956_.WMF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152430.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-autoupdate-services.jar spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CG1606.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101860.BMP.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_bullets.gif.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7FR.LEX spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaSansRegular.ttf.11E-ED2-55F spoolsv.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\!!! HOW TO BACK YOUR FILES !!!.TXT spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152590.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21306_.GIF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21335_.GIF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSIDEBR.XML spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FS3BOX.POC.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.zh_CN_5.5.0.165303.jar.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01866_.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR30F.GIF.11E-ED2-55F spoolsv.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\!!! HOW TO BACK YOUR FILES !!!.TXT spoolsv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_SelectionSubpicture.png spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\contbig.gif spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151041.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187819.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Origin.thmx spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_ja_4.4.0.v20140623020002.jar spoolsv.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\equalizer_window.html.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.el_2.2.0.v201303151357.jar spoolsv.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\01_googleimage.luac spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0149407.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21423_.GIF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_ON.GIF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-execution_ja.jar spoolsv.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe spoolsv.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Nicosia spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232393.WMF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DigitalInk.jpg spoolsv.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\setup.ini.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Dawson_Creek.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200273.WMF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0400005.PNG.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKACC.CFG spoolsv.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02743G.GIF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mspub.exe.manifest spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\InformationIcon.jpg spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\WSSFilesToolHomePageBackground.jpg.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_es.jar.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-nodes_zh_CN.jar.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285750.WMF spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR19F.GIF.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views_3.7.0.v20140408-0703.jar.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_zh_CN.jar.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\vlc.mo.11E-ED2-55F spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101858.BMP spoolsv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0390072.JPG spoolsv.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\!!! HOW TO BACK YOUR FILES !!!.TXT spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1684 936 WerFault.exe 50 -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1596 vssadmin.exe 552 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 1160 vssvc.exe Token: SeRestorePrivilege 1160 vssvc.exe Token: SeAuditPrivilege 1160 vssvc.exe Token: SeIncreaseQuotaPrivilege 1688 WMIC.exe Token: SeSecurityPrivilege 1688 WMIC.exe Token: SeTakeOwnershipPrivilege 1688 WMIC.exe Token: SeLoadDriverPrivilege 1688 WMIC.exe Token: SeSystemProfilePrivilege 1688 WMIC.exe Token: SeSystemtimePrivilege 1688 WMIC.exe Token: SeProfSingleProcessPrivilege 1688 WMIC.exe Token: SeIncBasePriorityPrivilege 1688 WMIC.exe Token: SeCreatePagefilePrivilege 1688 WMIC.exe Token: SeBackupPrivilege 1688 WMIC.exe Token: SeRestorePrivilege 1688 WMIC.exe Token: SeShutdownPrivilege 1688 WMIC.exe Token: SeDebugPrivilege 1688 WMIC.exe Token: SeSystemEnvironmentPrivilege 1688 WMIC.exe Token: SeRemoteShutdownPrivilege 1688 WMIC.exe Token: SeUndockPrivilege 1688 WMIC.exe Token: SeManageVolumePrivilege 1688 WMIC.exe Token: 33 1688 WMIC.exe Token: 34 1688 WMIC.exe Token: 35 1688 WMIC.exe Token: SeIncreaseQuotaPrivilege 1472 WMIC.exe Token: SeSecurityPrivilege 1472 WMIC.exe Token: SeTakeOwnershipPrivilege 1472 WMIC.exe Token: SeLoadDriverPrivilege 1472 WMIC.exe Token: SeSystemProfilePrivilege 1472 WMIC.exe Token: SeSystemtimePrivilege 1472 WMIC.exe Token: SeProfSingleProcessPrivilege 1472 WMIC.exe Token: SeIncBasePriorityPrivilege 1472 WMIC.exe Token: SeCreatePagefilePrivilege 1472 WMIC.exe Token: SeBackupPrivilege 1472 WMIC.exe Token: SeRestorePrivilege 1472 WMIC.exe Token: SeShutdownPrivilege 1472 WMIC.exe Token: SeDebugPrivilege 1472 WMIC.exe Token: SeSystemEnvironmentPrivilege 1472 WMIC.exe Token: SeRemoteShutdownPrivilege 1472 WMIC.exe Token: SeUndockPrivilege 1472 WMIC.exe Token: SeManageVolumePrivilege 1472 WMIC.exe Token: 33 1472 WMIC.exe Token: 34 1472 WMIC.exe Token: 35 1472 WMIC.exe Token: SeIncreaseQuotaPrivilege 1688 WMIC.exe Token: SeSecurityPrivilege 1688 WMIC.exe Token: SeTakeOwnershipPrivilege 1688 WMIC.exe Token: SeLoadDriverPrivilege 1688 WMIC.exe Token: SeSystemProfilePrivilege 1688 WMIC.exe Token: SeSystemtimePrivilege 1688 WMIC.exe Token: SeProfSingleProcessPrivilege 1688 WMIC.exe Token: SeIncBasePriorityPrivilege 1688 WMIC.exe Token: SeCreatePagefilePrivilege 1688 WMIC.exe Token: SeBackupPrivilege 1688 WMIC.exe Token: SeRestorePrivilege 1688 WMIC.exe Token: SeShutdownPrivilege 1688 WMIC.exe Token: SeDebugPrivilege 1688 WMIC.exe Token: SeSystemEnvironmentPrivilege 1688 WMIC.exe Token: SeRemoteShutdownPrivilege 1688 WMIC.exe Token: SeUndockPrivilege 1688 WMIC.exe Token: SeManageVolumePrivilege 1688 WMIC.exe Token: 33 1688 WMIC.exe Token: 34 1688 WMIC.exe Token: 35 1688 WMIC.exe Token: SeIncreaseQuotaPrivilege 1472 WMIC.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1648 1264 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe 27 PID 1264 wrote to memory of 1648 1264 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe 27 PID 1264 wrote to memory of 1648 1264 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe 27 PID 1264 wrote to memory of 1648 1264 54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe 27 PID 1648 wrote to memory of 576 1648 spoolsv.exe 28 PID 1648 wrote to memory of 576 1648 spoolsv.exe 28 PID 1648 wrote to memory of 576 1648 spoolsv.exe 28 PID 1648 wrote to memory of 576 1648 spoolsv.exe 28 PID 1648 wrote to memory of 608 1648 spoolsv.exe 29 PID 1648 wrote to memory of 608 1648 spoolsv.exe 29 PID 1648 wrote to memory of 608 1648 spoolsv.exe 29 PID 1648 wrote to memory of 608 1648 spoolsv.exe 29 PID 1648 wrote to memory of 988 1648 spoolsv.exe 31 PID 1648 wrote to memory of 988 1648 spoolsv.exe 31 PID 1648 wrote to memory of 988 1648 spoolsv.exe 31 PID 1648 wrote to memory of 988 1648 spoolsv.exe 31 PID 1648 wrote to memory of 1832 1648 spoolsv.exe 40 PID 1648 wrote to memory of 1832 1648 spoolsv.exe 40 PID 1648 wrote to memory of 1832 1648 spoolsv.exe 40 PID 1648 wrote to memory of 1832 1648 spoolsv.exe 40 PID 1648 wrote to memory of 1656 1648 spoolsv.exe 33 PID 1648 wrote to memory of 1656 1648 spoolsv.exe 33 PID 1648 wrote to memory of 1656 1648 spoolsv.exe 33 PID 1648 wrote to memory of 1656 1648 spoolsv.exe 33 PID 1648 wrote to memory of 1092 1648 spoolsv.exe 38 PID 1648 wrote to memory of 1092 1648 spoolsv.exe 38 PID 1648 wrote to memory of 1092 1648 spoolsv.exe 38 PID 1648 wrote to memory of 1092 1648 spoolsv.exe 38 PID 1648 wrote to memory of 840 1648 spoolsv.exe 36 PID 1648 wrote to memory of 840 1648 spoolsv.exe 36 PID 1648 wrote to memory of 840 1648 spoolsv.exe 36 PID 1648 wrote to memory of 840 1648 spoolsv.exe 36 PID 1656 wrote to memory of 1596 1656 cmd.exe 41 PID 1656 wrote to memory of 1596 1656 cmd.exe 41 PID 1656 wrote to memory of 1596 1656 cmd.exe 41 PID 1656 wrote to memory of 1596 1656 cmd.exe 41 PID 576 wrote to memory of 1472 576 cmd.exe 42 PID 576 wrote to memory of 1472 576 cmd.exe 42 PID 576 wrote to memory of 1472 576 cmd.exe 42 PID 576 wrote to memory of 1472 576 cmd.exe 42 PID 1092 wrote to memory of 1688 1092 cmd.exe 43 PID 1092 wrote to memory of 1688 1092 cmd.exe 43 PID 1092 wrote to memory of 1688 1092 cmd.exe 43 PID 1092 wrote to memory of 1688 1092 cmd.exe 43 PID 1092 wrote to memory of 552 1092 cmd.exe 46 PID 1092 wrote to memory of 552 1092 cmd.exe 46 PID 1092 wrote to memory of 552 1092 cmd.exe 46 PID 1092 wrote to memory of 552 1092 cmd.exe 46 PID 1648 wrote to memory of 936 1648 spoolsv.exe 50 PID 1648 wrote to memory of 936 1648 spoolsv.exe 50 PID 1648 wrote to memory of 936 1648 spoolsv.exe 50 PID 1648 wrote to memory of 936 1648 spoolsv.exe 50 PID 1648 wrote to memory of 936 1648 spoolsv.exe 50 PID 1648 wrote to memory of 936 1648 spoolsv.exe 50 PID 1648 wrote to memory of 936 1648 spoolsv.exe 50 PID 936 wrote to memory of 1684 936 notepad.exe 51 PID 936 wrote to memory of 1684 936 notepad.exe 51 PID 936 wrote to memory of 1684 936 notepad.exe 51 PID 936 wrote to memory of 1684 936 notepad.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe"C:\Users\Admin\AppData\Local\Temp\54f6ec27eb7526c439d33e7592e4864842fccf950d828fe14ef7c8eb080ee371.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -start2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1596
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -agent 03⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
- Drops file in Windows directory
PID:840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:552
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:1832
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 1964⤵
- Program crash
PID:1684
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1160