Analysis
-
max time kernel
183s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
02-04-2022 04:07
Static task
static1
Behavioral task
behavioral1
Sample
72ad5cebf69de22b971997bb261ef519.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
72ad5cebf69de22b971997bb261ef519.exe
Resource
win10v2004-20220331-en
General
-
Target
72ad5cebf69de22b971997bb261ef519.exe
-
Size
8.1MB
-
MD5
72ad5cebf69de22b971997bb261ef519
-
SHA1
27aef0b7214b93b44cbeab76af1dd39db3d938fd
-
SHA256
1b9a300d4e882a59e4bb15f7aa7069df6cc48057d1f89a71fff6df4e70d483f1
-
SHA512
a4879dae60d580b3fad31311ae64acdc92604164cc95bd721a4a789c66791c5586eac3922e621c33aab5f919ad92e68ef6cbbc43b3d4857b547e627855bcefe8
Malware Config
Signatures
-
Babadeda Crypter 3 IoCs
resource yara_rule behavioral2/files/0x0006000000021e6d-141.dat family_babadeda behavioral2/memory/5072-155-0x0000000002EA0000-0x00000000060A0000-memory.dmp family_babadeda behavioral2/memory/3532-160-0x0000000002D60000-0x0000000005F60000-memory.dmp family_babadeda -
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 844 created 5072 844 svchost.exe 76 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2228 bcdedit.exe 3600 bcdedit.exe -
pid Process 4484 wbadmin.exe -
Executes dropped EXE 2 IoCs
pid Process 5072 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe -
Modifies Windows Firewall 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Control Panel\International\Geo\Nation 72ad5cebf69de22b971997bb261ef519.exe -
Drops startup file 1 IoCs
description ioc Process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\AdobeIPCBroker.exe AdobeIPCBroker.exe -
Loads dropped DLL 14 IoCs
pid Process 4340 72ad5cebf69de22b971997bb261ef519.exe 4340 72ad5cebf69de22b971997bb261ef519.exe 5072 AdobeIPCBroker.exe 5072 AdobeIPCBroker.exe 5072 AdobeIPCBroker.exe 5072 AdobeIPCBroker.exe 5072 AdobeIPCBroker.exe 5072 AdobeIPCBroker.exe 5072 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeIPCBroker = "C:\\Users\\Admin\\AppData\\Local\\AdobeIPCBroker.exe" AdobeIPCBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeIPCBroker = "C:\\Users\\Admin\\AppData\\Local\\AdobeIPCBroker.exe" AdobeIPCBroker.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1082102374-1487407228-1886994731-1000\desktop.ini AdobeIPCBroker.exe File opened for modification C:\Program Files\desktop.ini AdobeIPCBroker.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.et-ee.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe AdobeIPCBroker.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_de_DE.jar AdobeIPCBroker.exe File created C:\Program Files\7-Zip\Lang\is.txt.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.uk-ua.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Internet Explorer\sqmapi.dll AdobeIPCBroker.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt AdobeIPCBroker.exe File created C:\Program Files\7-Zip\Lang\sk.txt.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml AdobeIPCBroker.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\mojo_core.dll AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyrun.jar.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\7-Zip\Lang\fr.txt.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hi-in.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui AdobeIPCBroker.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\sqloledb.rll.mui AdobeIPCBroker.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mshwLatin.dll AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tipskins.dll AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqlxmlx.rll.mui AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ar.pak AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ja_JP.jar.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ru.jar.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome.exe.sig.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ko_KR.jar.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hr-hr.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\resources.pak.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe AdobeIPCBroker.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-BR.pak.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui AdobeIPCBroker.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt AdobeIPCBroker.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_elf.dll AdobeIPCBroker.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe AdobeIPCBroker.exe File created C:\Program Files\7-Zip\Lang\fur.txt.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\StreamServer.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe AdobeIPCBroker.exe File created C:\Program Files\7-Zip\Lang\mr.txt.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Common Files\DESIGNER\MSADDNDR.OLB.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\TipRes.dll.mui AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt AdobeIPCBroker.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\System\ado\msado27.tlb AdobeIPCBroker.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\ieinstal.exe.mui AdobeIPCBroker.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt AdobeIPCBroker.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-localization-l1-2-0.dll.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man AdobeIPCBroker.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_de_DE.jar.id[7143FFAC-2686].[[email protected]].Devos AdobeIPCBroker.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\classfile_constants.h AdobeIPCBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2144 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe 3532 AdobeIPCBroker.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5072 AdobeIPCBroker.exe Token: SeTcbPrivilege 844 svchost.exe Token: SeTcbPrivilege 844 svchost.exe Token: SeDebugPrivilege 3532 AdobeIPCBroker.exe Token: SeBackupPrivilege 4984 vssvc.exe Token: SeRestorePrivilege 4984 vssvc.exe Token: SeAuditPrivilege 4984 vssvc.exe Token: SeIncreaseQuotaPrivilege 4120 WMIC.exe Token: SeSecurityPrivilege 4120 WMIC.exe Token: SeTakeOwnershipPrivilege 4120 WMIC.exe Token: SeLoadDriverPrivilege 4120 WMIC.exe Token: SeSystemProfilePrivilege 4120 WMIC.exe Token: SeSystemtimePrivilege 4120 WMIC.exe Token: SeProfSingleProcessPrivilege 4120 WMIC.exe Token: SeIncBasePriorityPrivilege 4120 WMIC.exe Token: SeCreatePagefilePrivilege 4120 WMIC.exe Token: SeBackupPrivilege 4120 WMIC.exe Token: SeRestorePrivilege 4120 WMIC.exe Token: SeShutdownPrivilege 4120 WMIC.exe Token: SeDebugPrivilege 4120 WMIC.exe Token: SeSystemEnvironmentPrivilege 4120 WMIC.exe Token: SeRemoteShutdownPrivilege 4120 WMIC.exe Token: SeUndockPrivilege 4120 WMIC.exe Token: SeManageVolumePrivilege 4120 WMIC.exe Token: SeImpersonatePrivilege 4120 WMIC.exe Token: 33 4120 WMIC.exe Token: 34 4120 WMIC.exe Token: 35 4120 WMIC.exe Token: 36 4120 WMIC.exe Token: SeIncreaseQuotaPrivilege 4120 WMIC.exe Token: SeSecurityPrivilege 4120 WMIC.exe Token: SeTakeOwnershipPrivilege 4120 WMIC.exe Token: SeLoadDriverPrivilege 4120 WMIC.exe Token: SeSystemProfilePrivilege 4120 WMIC.exe Token: SeSystemtimePrivilege 4120 WMIC.exe Token: SeProfSingleProcessPrivilege 4120 WMIC.exe Token: SeIncBasePriorityPrivilege 4120 WMIC.exe Token: SeCreatePagefilePrivilege 4120 WMIC.exe Token: SeBackupPrivilege 4120 WMIC.exe Token: SeRestorePrivilege 4120 WMIC.exe Token: SeShutdownPrivilege 4120 WMIC.exe Token: SeDebugPrivilege 4120 WMIC.exe Token: SeSystemEnvironmentPrivilege 4120 WMIC.exe Token: SeRemoteShutdownPrivilege 4120 WMIC.exe Token: SeUndockPrivilege 4120 WMIC.exe Token: SeManageVolumePrivilege 4120 WMIC.exe Token: SeImpersonatePrivilege 4120 WMIC.exe Token: 33 4120 WMIC.exe Token: 34 4120 WMIC.exe Token: 35 4120 WMIC.exe Token: 36 4120 WMIC.exe Token: SeBackupPrivilege 5092 wbengine.exe Token: SeRestorePrivilege 5092 wbengine.exe Token: SeSecurityPrivilege 5092 wbengine.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4340 wrote to memory of 5072 4340 72ad5cebf69de22b971997bb261ef519.exe 76 PID 4340 wrote to memory of 5072 4340 72ad5cebf69de22b971997bb261ef519.exe 76 PID 4340 wrote to memory of 5072 4340 72ad5cebf69de22b971997bb261ef519.exe 76 PID 844 wrote to memory of 3532 844 svchost.exe 78 PID 844 wrote to memory of 3532 844 svchost.exe 78 PID 844 wrote to memory of 3532 844 svchost.exe 78 PID 3532 wrote to memory of 4208 3532 AdobeIPCBroker.exe 80 PID 3532 wrote to memory of 4208 3532 AdobeIPCBroker.exe 80 PID 3532 wrote to memory of 2632 3532 AdobeIPCBroker.exe 79 PID 3532 wrote to memory of 2632 3532 AdobeIPCBroker.exe 79 PID 2632 wrote to memory of 1844 2632 cmd.exe 83 PID 2632 wrote to memory of 1844 2632 cmd.exe 83 PID 4208 wrote to memory of 2144 4208 cmd.exe 84 PID 4208 wrote to memory of 2144 4208 cmd.exe 84 PID 4208 wrote to memory of 4120 4208 cmd.exe 87 PID 4208 wrote to memory of 4120 4208 cmd.exe 87 PID 2632 wrote to memory of 3196 2632 cmd.exe 88 PID 2632 wrote to memory of 3196 2632 cmd.exe 88 PID 4208 wrote to memory of 2228 4208 cmd.exe 91 PID 4208 wrote to memory of 2228 4208 cmd.exe 91 PID 4208 wrote to memory of 3600 4208 cmd.exe 92 PID 4208 wrote to memory of 3600 4208 cmd.exe 92 PID 4208 wrote to memory of 4484 4208 cmd.exe 93 PID 4208 wrote to memory of 4484 4208 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ad5cebf69de22b971997bb261ef519.exe"C:\Users\Admin\AppData\Local\Temp\72ad5cebf69de22b971997bb261ef519.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Roaming\GreatSim\Milling\AdobeIPCBroker.exe"C:\Users\Admin\AppData\Roaming\GreatSim\Milling\AdobeIPCBroker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Users\Admin\AppData\Roaming\GreatSim\Milling\AdobeIPCBroker.exeC:\Users\Admin\AppData\Roaming\GreatSim\Milling\AdobeIPCBroker.exe "-relaunchedForIntegrityLevel -launchedbyvulcan-5072 C:\Users\Admin\AppData\Roaming\GreatSim\Milling\AdobeIPCBroker.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off5⤵PID:1844
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable5⤵PID:3196
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2144
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:2228
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:3600
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:4484
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1276
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5142bc2bb269b896cc0f11f9021dcbc52
SHA175b09b25f8f6b3b0fc94fcdcc61d932f303ac418
SHA2565da7da9abb77790ddbb87d86b9ea4b01a4f375035827e30fa879dab8c2a737db
SHA512150ffd4e66ee126912c6a5071bec750e4b5e603af9cc79b26c63e482f7d5d0aafcae1c995f10b60ba2da138effb19c668e1515f35db3b8b7a508ef34f59d134a
-
Filesize
444KB
MD5bf34ceda78a3ff4016e8eca82337ec06
SHA138966df0f48da3ee15e2a44545c982693d6f552a
SHA2563b4e89de9ccb5b1beba22030e29e921460b375bcbe5364115cc093f329596889
SHA512b5d4af43a78e8c061c823778786fa53db2736543ed2513a033b93302328f4af10d565a7ce4116ee6580400a02e23694eb2183ccfbc9c3d8132fef3e63ae58cae
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
4.6MB
MD525d5826c1136dde91cb8ed3b9319c50d
SHA1627b989677c7d3d7431ca2d1c591fee095197a1e
SHA256098467cdf594b08bd6643592f24745f6f37132ab794da2d0263919d5d131bc81
SHA51273bf5a1b8371bd70df4fb40ed1c08e2ad0db72722634de0167c8bcca7423b0f7fec9fa20bea66521aa051d842442432c623d440873d448af07b85914dbdf532e
-
Filesize
839KB
MD508abdf28c00df306cb339fc1324f2f43
SHA1e54e1a1c009b3f6d94c0a9731ab3a1b54e8d50c6
SHA256874f47e7f82114b68f443ef80a0188553dcba74356ccc579ffb41ecea606dde8
SHA512e14e83356dc5f4c741d9479b33abac65dd365865605973c5b10b477bccab89b836bd41677e015c894c81c642ab582bb3f75e85374b44efde0f4acacbbb848027
-
Filesize
839KB
MD508abdf28c00df306cb339fc1324f2f43
SHA1e54e1a1c009b3f6d94c0a9731ab3a1b54e8d50c6
SHA256874f47e7f82114b68f443ef80a0188553dcba74356ccc579ffb41ecea606dde8
SHA512e14e83356dc5f4c741d9479b33abac65dd365865605973c5b10b477bccab89b836bd41677e015c894c81c642ab582bb3f75e85374b44efde0f4acacbbb848027
-
Filesize
839KB
MD508abdf28c00df306cb339fc1324f2f43
SHA1e54e1a1c009b3f6d94c0a9731ab3a1b54e8d50c6
SHA256874f47e7f82114b68f443ef80a0188553dcba74356ccc579ffb41ecea606dde8
SHA512e14e83356dc5f4c741d9479b33abac65dd365865605973c5b10b477bccab89b836bd41677e015c894c81c642ab582bb3f75e85374b44efde0f4acacbbb848027
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
1KB
MD5dcd02122ff75c24cee25500ad3a3d812
SHA176e733331554e9aaff6ccf0df22931db9ca852a4
SHA256059280e2b72f31d15fe6b83b9362be359ebd2f16a5de4763a21d0885183854ba
SHA512e7fb7605a3d46b302a977b21e14743a5d367ffd50a9ab339108a356894b5d75c7c2693609c9aed84cb8aeaddeb041dc018428ce20f7bc9bbc984b431db58ff21
-
Filesize
196KB
MD55766b7a2fd2431d5fd95e7dfe53e9059
SHA1d59d571b7ea52a1cc08d734794825e19bbb8c5da
SHA25658e6af41baa0b14777ee3daa03e1ed021e80c8a7b773efebb532b1225bf821b9
SHA5126ddae690f205b81e58eab38a93c504ff18903bc58e10620f8a8ef2d17a862cded1f6654ffbd8803f1473a265a10b3b1f5ae2b80c39b4542fe428a914f8a5b017
-
Filesize
196KB
MD55766b7a2fd2431d5fd95e7dfe53e9059
SHA1d59d571b7ea52a1cc08d734794825e19bbb8c5da
SHA25658e6af41baa0b14777ee3daa03e1ed021e80c8a7b773efebb532b1225bf821b9
SHA5126ddae690f205b81e58eab38a93c504ff18903bc58e10620f8a8ef2d17a862cded1f6654ffbd8803f1473a265a10b3b1f5ae2b80c39b4542fe428a914f8a5b017
-
Filesize
196KB
MD55766b7a2fd2431d5fd95e7dfe53e9059
SHA1d59d571b7ea52a1cc08d734794825e19bbb8c5da
SHA25658e6af41baa0b14777ee3daa03e1ed021e80c8a7b773efebb532b1225bf821b9
SHA5126ddae690f205b81e58eab38a93c504ff18903bc58e10620f8a8ef2d17a862cded1f6654ffbd8803f1473a265a10b3b1f5ae2b80c39b4542fe428a914f8a5b017
-
Filesize
196KB
MD55766b7a2fd2431d5fd95e7dfe53e9059
SHA1d59d571b7ea52a1cc08d734794825e19bbb8c5da
SHA25658e6af41baa0b14777ee3daa03e1ed021e80c8a7b773efebb532b1225bf821b9
SHA5126ddae690f205b81e58eab38a93c504ff18903bc58e10620f8a8ef2d17a862cded1f6654ffbd8803f1473a265a10b3b1f5ae2b80c39b4542fe428a914f8a5b017
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
393KB
MD5996c12ac07c7955fe018b68ac29ff8fb
SHA1a88d9543aaa0f748a1997162b0e7e67249ba7cfa
SHA25694f19678077f95de2f8200fa32dbc538cd8ec839a0513741613e35a86a2ad3e2
SHA5128271c0aa844b4b5598690bb44012d3597edb347c3e171835a340d66d5874f5e6bd2d76fda0e62b0e28967fcb479e227d95d67d120ab4977ea1e029890dd1cf21
-
Filesize
125KB
MD5a43453dc3f04860653ff23db54f91f0d
SHA117877adc35e03eb2e7f7a90281a97067a839b70d
SHA25655135de67a5816c6622ae671c934d5a2bfac1b8f3f09083f64a3ae5997bfbfdf
SHA5128b97417f00175408eaf348cd2315f954609b98434337c2d822b9e0f11d2d249c584ef8e58fc33ffbd107ef56581964735a62801096779a9f43899e69fd8d9a66
-
Filesize
125KB
MD5a43453dc3f04860653ff23db54f91f0d
SHA117877adc35e03eb2e7f7a90281a97067a839b70d
SHA25655135de67a5816c6622ae671c934d5a2bfac1b8f3f09083f64a3ae5997bfbfdf
SHA5128b97417f00175408eaf348cd2315f954609b98434337c2d822b9e0f11d2d249c584ef8e58fc33ffbd107ef56581964735a62801096779a9f43899e69fd8d9a66
-
Filesize
125KB
MD5a43453dc3f04860653ff23db54f91f0d
SHA117877adc35e03eb2e7f7a90281a97067a839b70d
SHA25655135de67a5816c6622ae671c934d5a2bfac1b8f3f09083f64a3ae5997bfbfdf
SHA5128b97417f00175408eaf348cd2315f954609b98434337c2d822b9e0f11d2d249c584ef8e58fc33ffbd107ef56581964735a62801096779a9f43899e69fd8d9a66
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356