Analysis
-
max time kernel
4294210s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe
Resource
win10v2004-en-20220112
General
-
Target
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe
-
Size
1.0MB
-
MD5
c4c8e242b5025104c6f85cb2d2c6f355
-
SHA1
604429eb08ef616d6d0693aa5c208bafb67973f7
-
SHA256
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942
-
SHA512
3f4c1052a3d57b5d806558e73dc4597f53a64d86e7f49e3ae7c8b18c8965e013b3717b3d71d0a95824c3233feb3ffae0fcc7733493662c31f0e7da9eac1cb606
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\498446043\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 956 wbadmin.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\OpenSync.tiff 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Users\Admin\Pictures\SwitchRead.tiff 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe\"" 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1096 set thread context of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 824 set thread context of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 1696 set thread context of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 984 set thread context of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 1592 set thread context of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\currency.data 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Tegucigalpa 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-swing-plaf.jar 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382947.JPG 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC.HXS 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DataListIconImagesMask.bmp 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEBHOME.POC 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.commands_3.6.100.v20140528-1422.jar 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\simplexml.luac 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_dot.png 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_OFF.GIF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_decreaseindent.gif 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\vlc.mo 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151045.WMF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SPRNG_01.MID 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\HEADER.GIF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\settings.js 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02749G.GIF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\1047x576black.png 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.filetransfer_5.0.0.v20140827-1444.jar 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\settings.css 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00668_.WMF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Jamaica 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Amsterdam 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107024.WMF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341645.JPG 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FLY98SP.POC 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.util_1.0.500.v20130404-1337.jar 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\CGMIMP32.FLT 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00260_.WMF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0222015.WMF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GreenTea.css 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\background.gif 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\dial_lrg.png 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\clock.html 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\slideShow.css 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans_1.2.200.v20140214-0004.jar 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\PROFILE.ELM 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\M1033DSK.UDT 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106958.WMF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_FormsHomePageSlice.gif 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\picturePuzzle.js 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CARBN_01.MID 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainBackground_PAL.wmv 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-ui.xml 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files\Mozilla Firefox\fonts\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105412.WMF 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\ACWZTOOL.ACCDE 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets_1.0.0.v20140514-1823.jar 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-lib-uihandler.xml 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\readme-warning.txt 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1332 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 608 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 1608 vssvc.exe Token: SeRestorePrivilege 1608 vssvc.exe Token: SeAuditPrivilege 1608 vssvc.exe Token: SeBackupPrivilege 752 wbengine.exe Token: SeRestorePrivilege 752 wbengine.exe Token: SeSecurityPrivilege 752 wbengine.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeSecurityPrivilege 1588 WMIC.exe Token: SeTakeOwnershipPrivilege 1588 WMIC.exe Token: SeLoadDriverPrivilege 1588 WMIC.exe Token: SeSystemProfilePrivilege 1588 WMIC.exe Token: SeSystemtimePrivilege 1588 WMIC.exe Token: SeProfSingleProcessPrivilege 1588 WMIC.exe Token: SeIncBasePriorityPrivilege 1588 WMIC.exe Token: SeCreatePagefilePrivilege 1588 WMIC.exe Token: SeBackupPrivilege 1588 WMIC.exe Token: SeRestorePrivilege 1588 WMIC.exe Token: SeShutdownPrivilege 1588 WMIC.exe Token: SeDebugPrivilege 1588 WMIC.exe Token: SeSystemEnvironmentPrivilege 1588 WMIC.exe Token: SeRemoteShutdownPrivilege 1588 WMIC.exe Token: SeUndockPrivilege 1588 WMIC.exe Token: SeManageVolumePrivilege 1588 WMIC.exe Token: 33 1588 WMIC.exe Token: 34 1588 WMIC.exe Token: 35 1588 WMIC.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeSecurityPrivilege 1588 WMIC.exe Token: SeTakeOwnershipPrivilege 1588 WMIC.exe Token: SeLoadDriverPrivilege 1588 WMIC.exe Token: SeSystemProfilePrivilege 1588 WMIC.exe Token: SeSystemtimePrivilege 1588 WMIC.exe Token: SeProfSingleProcessPrivilege 1588 WMIC.exe Token: SeIncBasePriorityPrivilege 1588 WMIC.exe Token: SeCreatePagefilePrivilege 1588 WMIC.exe Token: SeBackupPrivilege 1588 WMIC.exe Token: SeRestorePrivilege 1588 WMIC.exe Token: SeShutdownPrivilege 1588 WMIC.exe Token: SeDebugPrivilege 1588 WMIC.exe Token: SeSystemEnvironmentPrivilege 1588 WMIC.exe Token: SeRemoteShutdownPrivilege 1588 WMIC.exe Token: SeUndockPrivilege 1588 WMIC.exe Token: SeManageVolumePrivilege 1588 WMIC.exe Token: 33 1588 WMIC.exe Token: 34 1588 WMIC.exe Token: 35 1588 WMIC.exe Token: SeDebugPrivilege 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 1096 wrote to memory of 608 1096 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 27 PID 608 wrote to memory of 1380 608 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 29 PID 608 wrote to memory of 1380 608 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 29 PID 608 wrote to memory of 1380 608 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 29 PID 608 wrote to memory of 1380 608 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 29 PID 1380 wrote to memory of 1332 1380 cmd.exe 31 PID 1380 wrote to memory of 1332 1380 cmd.exe 31 PID 1380 wrote to memory of 1332 1380 cmd.exe 31 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 824 wrote to memory of 1796 824 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 34 PID 1380 wrote to memory of 956 1380 cmd.exe 35 PID 1380 wrote to memory of 956 1380 cmd.exe 35 PID 1380 wrote to memory of 956 1380 cmd.exe 35 PID 1380 wrote to memory of 1588 1380 cmd.exe 39 PID 1380 wrote to memory of 1588 1380 cmd.exe 39 PID 1380 wrote to memory of 1588 1380 cmd.exe 39 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 1696 wrote to memory of 896 1696 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 47 PID 984 wrote to memory of 988 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 49 PID 984 wrote to memory of 988 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 49 PID 984 wrote to memory of 988 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 49 PID 984 wrote to memory of 988 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 49 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 984 wrote to memory of 1636 984 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 50 PID 1592 wrote to memory of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52 PID 1592 wrote to memory of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52 PID 1592 wrote to memory of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52 PID 1592 wrote to memory of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52 PID 1592 wrote to memory of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52 PID 1592 wrote to memory of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52 PID 1592 wrote to memory of 1588 1592 75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe" n6083⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"4⤵PID:1796
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1332
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:956
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe" n6083⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"4⤵PID:896
-
-
-
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe" n6083⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"4⤵PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"4⤵PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe" n6083⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"C:\Users\Admin\AppData\Local\Temp\75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe"4⤵PID:1588
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:752
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1148
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:880