Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 06:50
Static task
static1
Behavioral task
behavioral1
Sample
64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe
Resource
win10v2004-en-20220112
General
-
Target
64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe
-
Size
185KB
-
MD5
3a3001ecddb08440a659d49e4e29a697
-
SHA1
124d9ce50a4b0dfa0b150b44c77c85cd2589148c
-
SHA256
64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5
-
SHA512
5b08e11eded00c94995c7d1d3e3ad195461dbe978618cdc638099dec8d52d39874b48cdfd4798ad82d3f3dc5cfaa4b5196c127c51a77779e20d6558a46f3275f
Malware Config
Extracted
C:\readme.txt
conti
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.best
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CloseHide.tif => C:\Users\Admin\Pictures\CloseHide.tif.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\PushUndo.tiff => C:\Users\Admin\Pictures\PushUndo.tiff.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\ResolveStop.tif => C:\Users\Admin\Pictures\ResolveStop.tif.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Pictures\RestoreMerge.tiff 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\SuspendCompare.png => C:\Users\Admin\Pictures\SuspendCompare.png.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\AddNew.png => C:\Users\Admin\Pictures\AddNew.png.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Pictures\PushUndo.tiff 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\RedoReceive.png => C:\Users\Admin\Pictures\RedoReceive.png.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\RequestRestore.crw => C:\Users\Admin\Pictures\RequestRestore.crw.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\RestoreMerge.tiff => C:\Users\Admin\Pictures\RestoreMerge.tiff.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\SetUninstall.crw => C:\Users\Admin\Pictures\SetUninstall.crw.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\SplitWait.crw => C:\Users\Admin\Pictures\SplitWait.crw.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File renamed C:\Users\Admin\Pictures\DebugWatch.crw => C:\Users\Admin\Pictures\DebugWatch.crw.PASWV 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe -
Drops desktop.ini file(s) 24 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\Documents\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\Videos\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\Music\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files (x86)\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Links\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Music\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Media Player 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy.jar 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files (x86)\Common Files\Services\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\net.properties 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\System\ado\adovbs.inc 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jconsole.jar 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\CompleteInitialize.ods 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Internet Explorer\fr-FR\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\System\ado\msado28.tlb 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jce.jar 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\VideoLAN\VLC\VideoLAN Website.url 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\COPYRIGHT 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files (x86)\Google\Temp 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\README.html 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Microsoft Office\PackageManifests\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\MountAdd.pub 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Microsoft Office\Office16\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jdwpTransport.h 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\logging.properties 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files (x86)\Google\CrashReports\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Java\jre1.8.0_66\bin\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files (x86)\desktop.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Mozilla Firefox\fonts\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\Content.xml 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\NewDismount.contact 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\ShowUnregister.xltx 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Microsoft Office\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0409-1000-0000000FF1CE.xml 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Microsoft Office 15\ClientX64\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\System\ado\msado60.tlb 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0000-1000-0000000FF1CE.xml 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\crashreporter-override.ini 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Common Files\microsoft shared\Stationery\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Edge.dat.LOG2 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptg.xml 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\readme.txt 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\dt.jar 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe 224 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 2456 vssvc.exe Token: SeRestorePrivilege 2456 vssvc.exe Token: SeAuditPrivilege 2456 vssvc.exe Token: SeIncreaseQuotaPrivilege 2472 WMIC.exe Token: SeSecurityPrivilege 2472 WMIC.exe Token: SeTakeOwnershipPrivilege 2472 WMIC.exe Token: SeLoadDriverPrivilege 2472 WMIC.exe Token: SeSystemProfilePrivilege 2472 WMIC.exe Token: SeSystemtimePrivilege 2472 WMIC.exe Token: SeProfSingleProcessPrivilege 2472 WMIC.exe Token: SeIncBasePriorityPrivilege 2472 WMIC.exe Token: SeCreatePagefilePrivilege 2472 WMIC.exe Token: SeBackupPrivilege 2472 WMIC.exe Token: SeRestorePrivilege 2472 WMIC.exe Token: SeShutdownPrivilege 2472 WMIC.exe Token: SeDebugPrivilege 2472 WMIC.exe Token: SeSystemEnvironmentPrivilege 2472 WMIC.exe Token: SeRemoteShutdownPrivilege 2472 WMIC.exe Token: SeUndockPrivilege 2472 WMIC.exe Token: SeManageVolumePrivilege 2472 WMIC.exe Token: 33 2472 WMIC.exe Token: 34 2472 WMIC.exe Token: 35 2472 WMIC.exe Token: 36 2472 WMIC.exe Token: SeIncreaseQuotaPrivilege 2472 WMIC.exe Token: SeSecurityPrivilege 2472 WMIC.exe Token: SeTakeOwnershipPrivilege 2472 WMIC.exe Token: SeLoadDriverPrivilege 2472 WMIC.exe Token: SeSystemProfilePrivilege 2472 WMIC.exe Token: SeSystemtimePrivilege 2472 WMIC.exe Token: SeProfSingleProcessPrivilege 2472 WMIC.exe Token: SeIncBasePriorityPrivilege 2472 WMIC.exe Token: SeCreatePagefilePrivilege 2472 WMIC.exe Token: SeBackupPrivilege 2472 WMIC.exe Token: SeRestorePrivilege 2472 WMIC.exe Token: SeShutdownPrivilege 2472 WMIC.exe Token: SeDebugPrivilege 2472 WMIC.exe Token: SeSystemEnvironmentPrivilege 2472 WMIC.exe Token: SeRemoteShutdownPrivilege 2472 WMIC.exe Token: SeUndockPrivilege 2472 WMIC.exe Token: SeManageVolumePrivilege 2472 WMIC.exe Token: 33 2472 WMIC.exe Token: 34 2472 WMIC.exe Token: 35 2472 WMIC.exe Token: 36 2472 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 224 wrote to memory of 1628 224 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe 59 PID 224 wrote to memory of 1628 224 64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe 59 PID 1628 wrote to memory of 2472 1628 cmd.exe 61 PID 1628 wrote to memory of 2472 1628 cmd.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe"C:\Users\Admin\AppData\Local\Temp\64f1a2e5f52292fba8f64a851c466d558f1607cac783f30015f6df9e0dbce1c5.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8D84F5DF-167E-44BC-B65F-610B82C3B339}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8D84F5DF-167E-44BC-B65F-610B82C3B339}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2456