Analysis
-
max time kernel
158s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 02:15
Static task
static1
Behavioral task
behavioral1
Sample
45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe
Resource
win10v2004-en-20220112
General
-
Target
45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe
-
Size
644KB
-
MD5
3f0f88f7b35eaa5d34fddb6928866d08
-
SHA1
b7d63fbc6bb0ab24b42f8d041346cec7988c9342
-
SHA256
45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4
-
SHA512
bdc295d02a7686e879ed3f3e17fb059146c6cef35c6f16fdc12c2355c1501f35c164fe8a8ceeb5733aac2a7fff3fc76a16622e022c096552aec86e48ddc6fa71
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\scoped_dir4852_1606327479\CRX_INSTALL\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 1580 wbadmin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe\"" 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3588 set thread context of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3484 set thread context of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSplashLogo.scale-150.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser_5.5.0.165303.jar 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\MixerBranding\x_logo.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MediumTile.scale-125_contrast-white.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-ae\readme-warning.txt 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-150_contrast-white.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-execution.xml 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupSmallTile.scale-125.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-60_altform-unplated.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxAccountsSplashLogo.scale-100.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\pl-pl\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-200_contrast-white.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-options-api.jar 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\1851_24x24x32.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-256.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hu-hu\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\css\main.css 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-24.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Milk Glass.eftx 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\PREVIEW.GIF 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-100.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription3-ul-oob.xrm-ms 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-256.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\EmptyShare.scale-100.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ro-ro\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupWideTile.scale-100.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fi-fi\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_OEM_Perp-pl.xrm-ms 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\license.html 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks_VP9.winmd 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_altform-unplated_contrast-black.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Light.scale-125.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxAccountsStoreLogo.scale-100.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\ImagingDevices.exe.mui 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msdaremr.dll.mui 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-40_altform-unplated.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\BadgeLogo.scale-150_contrast-white.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-80.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL001.XML 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\YellowAbstractNote.scale-100.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\resources.7a43ec75.pri 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-32_altform-lightunplated.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\cs-cz\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\empty.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_ja.jar 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-48_contrast-white.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteMedTile.scale-125.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Programmer.targetsize-32_contrast-white.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-64_altform-unplated.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\en-gb\locimages\offsymxb.ttf 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeMediumTile.scale-100.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\MedTile.scale-200.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ui-strings.js 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp-ppd.xrm-ms 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\SmallTile.scale-200.png 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1184 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2948 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 2948 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeBackupPrivilege 112 vssvc.exe Token: SeRestorePrivilege 112 vssvc.exe Token: SeAuditPrivilege 112 vssvc.exe Token: SeBackupPrivilege 1920 wbengine.exe Token: SeRestorePrivilege 1920 wbengine.exe Token: SeSecurityPrivilege 1920 wbengine.exe Token: SeIncreaseQuotaPrivilege 3088 WMIC.exe Token: SeSecurityPrivilege 3088 WMIC.exe Token: SeTakeOwnershipPrivilege 3088 WMIC.exe Token: SeLoadDriverPrivilege 3088 WMIC.exe Token: SeSystemProfilePrivilege 3088 WMIC.exe Token: SeSystemtimePrivilege 3088 WMIC.exe Token: SeProfSingleProcessPrivilege 3088 WMIC.exe Token: SeIncBasePriorityPrivilege 3088 WMIC.exe Token: SeCreatePagefilePrivilege 3088 WMIC.exe Token: SeBackupPrivilege 3088 WMIC.exe Token: SeRestorePrivilege 3088 WMIC.exe Token: SeShutdownPrivilege 3088 WMIC.exe Token: SeDebugPrivilege 3088 WMIC.exe Token: SeSystemEnvironmentPrivilege 3088 WMIC.exe Token: SeRemoteShutdownPrivilege 3088 WMIC.exe Token: SeUndockPrivilege 3088 WMIC.exe Token: SeManageVolumePrivilege 3088 WMIC.exe Token: 33 3088 WMIC.exe Token: 34 3088 WMIC.exe Token: 35 3088 WMIC.exe Token: 36 3088 WMIC.exe Token: SeIncreaseQuotaPrivilege 3088 WMIC.exe Token: SeSecurityPrivilege 3088 WMIC.exe Token: SeTakeOwnershipPrivilege 3088 WMIC.exe Token: SeLoadDriverPrivilege 3088 WMIC.exe Token: SeSystemProfilePrivilege 3088 WMIC.exe Token: SeSystemtimePrivilege 3088 WMIC.exe Token: SeProfSingleProcessPrivilege 3088 WMIC.exe Token: SeIncBasePriorityPrivilege 3088 WMIC.exe Token: SeCreatePagefilePrivilege 3088 WMIC.exe Token: SeBackupPrivilege 3088 WMIC.exe Token: SeRestorePrivilege 3088 WMIC.exe Token: SeShutdownPrivilege 3088 WMIC.exe Token: SeDebugPrivilege 3088 WMIC.exe Token: SeSystemEnvironmentPrivilege 3088 WMIC.exe Token: SeRemoteShutdownPrivilege 3088 WMIC.exe Token: SeUndockPrivilege 3088 WMIC.exe Token: SeManageVolumePrivilege 3088 WMIC.exe Token: 33 3088 WMIC.exe Token: 34 3088 WMIC.exe Token: 35 3088 WMIC.exe Token: 36 3088 WMIC.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 3588 wrote to memory of 2948 3588 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 65 PID 2948 wrote to memory of 2544 2948 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 67 PID 2948 wrote to memory of 2544 2948 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 67 PID 2544 wrote to memory of 1184 2544 cmd.exe 69 PID 2544 wrote to memory of 1184 2544 cmd.exe 69 PID 2544 wrote to memory of 1580 2544 cmd.exe 72 PID 2544 wrote to memory of 1580 2544 cmd.exe 72 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 3484 wrote to memory of 1564 3484 45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe 74 PID 2544 wrote to memory of 3088 2544 cmd.exe 77 PID 2544 wrote to memory of 3088 2544 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe"C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe"C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe"C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe" n29483⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe"C:\Users\Admin\AppData\Local\Temp\45f51b31a00c9ce48e8aba64482b953186fbe57431e383297a83000255fb0bb4.exe"4⤵PID:1564
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1184
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1580
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:112
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1808
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3144