Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 04:29
Static task
static1
Behavioral task
behavioral1
Sample
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe
Resource
win10v2004-en-20220113
General
-
Target
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe
-
Size
171KB
-
MD5
567407d941d99abeff20a1b836570d30
-
SHA1
e8866fda01f91c6d4bf8c51cf4cbc7f103e87b0b
-
SHA256
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510
-
SHA512
514cc28f8da0e8bf054bf0a0963c4253a16df1d5cb8e87dd09294ab97d8e1b5b5fc18c54920a3829d40b0bdda5837567a73b39b4d1839ab919d672ceaf32989b
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
15FC73BdkpDMUWmxo7e7gtLRtM8gQgXyb4
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\ReceiveRequest.tiff a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe" reg.exe -
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc Process File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe -
Drops file in Program Files directory 64 IoCs
Processes:
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exedescription ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Austin.xml a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormToolImages.jpg a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate.css a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guyana a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Miquelon a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01242_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01253_.GIF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendtoOneNoteFilter.gpd a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AssemblyInfoInternal.zip a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0093905.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01294_.GIF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\DELETE.GIF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGREPFRM.DPV a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-heapdump_ja.jar a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SPANISH.LNG a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Google\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_zh_4.4.0.v20140623020002.jar a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable_1.4.1.v20140210-1835.jar a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01163_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152570.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jre7\lib\management-agent.jar a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Havana a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00269_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\CONTACT.JPG a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BRCHUR98.POC a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeAUM_rootCert.cer a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00942_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14982_.GIF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\SATIN.ELM a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196142.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285822.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_zh_4.4.0.v20140623020002.jar a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00686_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099150.JPG a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\SUBMIT.JS a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPWMI.MOF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Chicago a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santo_Domingo a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\RyukReadMe.txt a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_ButtonGraphic.png a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00076_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18213_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CharSetTable.chr a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD10289_.GIF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLMAILR.FAE a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-applemenu.xml a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\end_review.gif a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02075_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107288.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kathmandu a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\EVRGREEN.ELM a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238983.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00145_.WMF a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\VeriSignLogo.jpg a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\SplashScreen.zip a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 528 1228 WerFault.exe 15 1224 1312 WerFault.exe 14 -
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid Process 1104 vssadmin.exe 892 vssadmin.exe 816 vssadmin.exe 1752 vssadmin.exe 1064 vssadmin.exe 1640 vssadmin.exe 1600 vssadmin.exe 852 vssadmin.exe 70612 vssadmin.exe 1716 vssadmin.exe 1548 vssadmin.exe 1932 vssadmin.exe 1740 vssadmin.exe 1288 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exepid Process 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe Token: SeBackupPrivilege 36108 vssvc.exe Token: SeRestorePrivilege 36108 vssvc.exe Token: SeAuditPrivilege 36108 vssvc.exe -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.execmd.exetaskhost.exeDwm.execmd.exedescription pid Process procid_target PID 1648 wrote to memory of 612 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 27 PID 1648 wrote to memory of 612 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 27 PID 1648 wrote to memory of 612 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 27 PID 1648 wrote to memory of 1228 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 15 PID 612 wrote to memory of 684 612 cmd.exe 29 PID 612 wrote to memory of 684 612 cmd.exe 29 PID 612 wrote to memory of 684 612 cmd.exe 29 PID 1228 wrote to memory of 528 1228 taskhost.exe 30 PID 1228 wrote to memory of 528 1228 taskhost.exe 30 PID 1228 wrote to memory of 528 1228 taskhost.exe 30 PID 1648 wrote to memory of 1312 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 14 PID 1312 wrote to memory of 1224 1312 Dwm.exe 31 PID 1312 wrote to memory of 1224 1312 Dwm.exe 31 PID 1312 wrote to memory of 1224 1312 Dwm.exe 31 PID 1648 wrote to memory of 70632 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 36 PID 1648 wrote to memory of 70632 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 36 PID 1648 wrote to memory of 70632 1648 a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe 36 PID 70632 wrote to memory of 70612 70632 cmd.exe 39 PID 70632 wrote to memory of 70612 70632 cmd.exe 39 PID 70632 wrote to memory of 70612 70632 cmd.exe 39 PID 70632 wrote to memory of 1752 70632 cmd.exe 43 PID 70632 wrote to memory of 1752 70632 cmd.exe 43 PID 70632 wrote to memory of 1752 70632 cmd.exe 43 PID 70632 wrote to memory of 1064 70632 cmd.exe 44 PID 70632 wrote to memory of 1064 70632 cmd.exe 44 PID 70632 wrote to memory of 1064 70632 cmd.exe 44 PID 70632 wrote to memory of 1548 70632 cmd.exe 45 PID 70632 wrote to memory of 1548 70632 cmd.exe 45 PID 70632 wrote to memory of 1548 70632 cmd.exe 45 PID 70632 wrote to memory of 1740 70632 cmd.exe 46 PID 70632 wrote to memory of 1740 70632 cmd.exe 46 PID 70632 wrote to memory of 1740 70632 cmd.exe 46 PID 70632 wrote to memory of 1716 70632 cmd.exe 47 PID 70632 wrote to memory of 1716 70632 cmd.exe 47 PID 70632 wrote to memory of 1716 70632 cmd.exe 47 PID 70632 wrote to memory of 1640 70632 cmd.exe 48 PID 70632 wrote to memory of 1640 70632 cmd.exe 48 PID 70632 wrote to memory of 1640 70632 cmd.exe 48 PID 70632 wrote to memory of 1104 70632 cmd.exe 49 PID 70632 wrote to memory of 1104 70632 cmd.exe 49 PID 70632 wrote to memory of 1104 70632 cmd.exe 49 PID 70632 wrote to memory of 1288 70632 cmd.exe 50 PID 70632 wrote to memory of 1288 70632 cmd.exe 50 PID 70632 wrote to memory of 1288 70632 cmd.exe 50 PID 70632 wrote to memory of 892 70632 cmd.exe 51 PID 70632 wrote to memory of 892 70632 cmd.exe 51 PID 70632 wrote to memory of 892 70632 cmd.exe 51 PID 70632 wrote to memory of 1932 70632 cmd.exe 52 PID 70632 wrote to memory of 1932 70632 cmd.exe 52 PID 70632 wrote to memory of 1932 70632 cmd.exe 52 PID 70632 wrote to memory of 1600 70632 cmd.exe 53 PID 70632 wrote to memory of 1600 70632 cmd.exe 53 PID 70632 wrote to memory of 1600 70632 cmd.exe 53 PID 70632 wrote to memory of 852 70632 cmd.exe 54 PID 70632 wrote to memory of 852 70632 cmd.exe 54 PID 70632 wrote to memory of 852 70632 cmd.exe 54 PID 70632 wrote to memory of 816 70632 cmd.exe 55 PID 70632 wrote to memory of 816 70632 cmd.exe 55 PID 70632 wrote to memory of 816 70632 cmd.exe 55
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1312 -s 3482⤵
- Program crash
PID:1224
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1228 -s 2482⤵
- Program crash
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe"C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe" /f3⤵
- Adds Run key to start application
PID:684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\users\Public\window.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:70632 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:70612
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1752
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1064
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1548
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1740
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1716
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1640
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1104
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1288
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:892
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1932
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1600
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:852
-
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:816
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1080
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:36108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d2aba3e1af80edd77e206cd43cfd3129
SHA13116da65d097708fad63a3b73d1c39bffa94cb01
SHA2568940135a58d28338ce4ea9b9933e6780507c56ab37a2f2e3a1a98c6564548a12
SHA5120059bd4cc02c52a219a0a2e1836bf04c11e2693446648dd4d92a2f38ed060ecd6c0f835e542ff8cfef8903873c01b8de2b38ed6ed2131a131bdd17887c11d0ec
-
MD5
eeaaa298e7b59a78cd106fd245399811
SHA1ae44044dc3e12053af5a655db33166e4b28d23e0
SHA256052f2c360749275747b94ff1547f24ac03647f239b87bb32139306077a2d339c
SHA512fe16e3c1065d6324664d44c3aacd9c6a6c6cdebc4ad7997d372e11591edb3e6912fc43ee9de5bd0b662f2b9600ac27fb0a89db1ef5fab331bfd00aa59793f855
-
MD5
55e7a50d4c49de6dae51903f2dbc88b7
SHA1c413273c32a2de7043cef453b5d8874113c3c07d
SHA256fc3abdf69ff62ee0907424771f96738262149ec9215c05a7a012513c1f6835e9
SHA512a3ff97f4be28dda6504ba4d1178010ac35665a1fc08e037f9af9c78bf4ec16217d786940cac6a1e765c0a3c550a8196670125384731547543d0761517fbf67c3
-
MD5
cb085c4e2d798d24d36346588b685dc4
SHA15e8677d2592747088b7804305a060aa0c0d6f0c3
SHA2565b1fa992ff7951e286bb17cb55d91ab12ad7732c92542d73e45d342bcc4c640b
SHA512fb0a3669c829660170961a31a77b12523a25c0c2f2f47c0b037c867f0290e92f7a4100d4bcb58cf39fd39bae3f943b0d2f6e0e126d284b7d5002b30b491f3060
-
MD5
4713d40baf2738ca0b4ea64c8bcc51aa
SHA16780f6db644d6b2e47f39c1f549e13bcbf98d6dc
SHA2569d30bc240f0296f1d9a46a28232be4bf948fda1765ca1247f35ba98c4eb379f0
SHA51284f8a6ce353ab82d91d5bbb45045f1f9f612a4f6fca2dbef71b96db734165356583c2e482ba83a19df3ed159ba0ce106edc21ca140f0612557ffe8df8ec1d173