Analysis
-
max time kernel
128s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe
Resource
win10v2004-20220414-en
General
-
Target
a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe
-
Size
62KB
-
MD5
131a20e9f579bc9f7dd9832b4c5f25bd
-
SHA1
83979db718962e3a0b45e5f70320fe5b4f009b7c
-
SHA256
a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154
-
SHA512
92e83892f635efb13d6f268ccab884b2079451a82a1e53a8482c632e126b14d3453c5ab17463d55b4cd2341d6b44034eb523867258932a9cd47deba435494f1c
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
hakbit
Signatures
-
Hakbit
Ransomware which encrypts files using AES, first seen in November 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\InstallRequest.png.crypted a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe File created C:\Users\Admin\Pictures\UnlockSubmit.png.crypted a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe File created C:\Users\Admin\Pictures\SubmitLimit.tiff.crypted a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe File opened for modification C:\Users\Admin\Pictures\SubmitLimit.tiff a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe -
Deletes itself 1 IoCs
pid Process 216 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1064 sc.exe 1504 sc.exe 1512 sc.exe 1352 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1584 vssadmin.exe 1072 vssadmin.exe 232 vssadmin.exe 560 vssadmin.exe 1004 vssadmin.exe 924 vssadmin.exe 1576 vssadmin.exe 1388 vssadmin.exe 1272 vssadmin.exe 1888 vssadmin.exe 1180 vssadmin.exe 828 vssadmin.exe 1988 vssadmin.exe 1760 vssadmin.exe -
Kills process with taskkill 3 IoCs
pid Process 1976 taskkill.exe 564 taskkill.exe 1696 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 224 notepad.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe Token: SeDebugPrivilege 1976 taskkill.exe Token: SeDebugPrivilege 564 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeBackupPrivilege 764 vssvc.exe Token: SeRestorePrivilege 764 vssvc.exe Token: SeAuditPrivilege 764 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 956 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 27 PID 1320 wrote to memory of 956 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 27 PID 1320 wrote to memory of 956 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 27 PID 956 wrote to memory of 1312 956 net.exe 29 PID 956 wrote to memory of 1312 956 net.exe 29 PID 956 wrote to memory of 1312 956 net.exe 29 PID 1320 wrote to memory of 816 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 30 PID 1320 wrote to memory of 816 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 30 PID 1320 wrote to memory of 816 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 30 PID 816 wrote to memory of 1156 816 net.exe 32 PID 816 wrote to memory of 1156 816 net.exe 32 PID 816 wrote to memory of 1156 816 net.exe 32 PID 1320 wrote to memory of 1772 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 35 PID 1320 wrote to memory of 1772 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 35 PID 1320 wrote to memory of 1772 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 35 PID 1772 wrote to memory of 276 1772 net.exe 33 PID 1772 wrote to memory of 276 1772 net.exe 33 PID 1772 wrote to memory of 276 1772 net.exe 33 PID 1320 wrote to memory of 1488 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 37 PID 1320 wrote to memory of 1488 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 37 PID 1320 wrote to memory of 1488 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 37 PID 1488 wrote to memory of 1720 1488 net.exe 38 PID 1488 wrote to memory of 1720 1488 net.exe 38 PID 1488 wrote to memory of 1720 1488 net.exe 38 PID 1320 wrote to memory of 584 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 39 PID 1320 wrote to memory of 584 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 39 PID 1320 wrote to memory of 584 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 39 PID 584 wrote to memory of 840 584 net.exe 41 PID 584 wrote to memory of 840 584 net.exe 41 PID 584 wrote to memory of 840 584 net.exe 41 PID 1320 wrote to memory of 1064 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 42 PID 1320 wrote to memory of 1064 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 42 PID 1320 wrote to memory of 1064 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 42 PID 1320 wrote to memory of 1504 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 44 PID 1320 wrote to memory of 1504 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 44 PID 1320 wrote to memory of 1504 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 44 PID 1320 wrote to memory of 1512 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 46 PID 1320 wrote to memory of 1512 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 46 PID 1320 wrote to memory of 1512 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 46 PID 1320 wrote to memory of 1352 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 48 PID 1320 wrote to memory of 1352 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 48 PID 1320 wrote to memory of 1352 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 48 PID 1320 wrote to memory of 1976 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 50 PID 1320 wrote to memory of 1976 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 50 PID 1320 wrote to memory of 1976 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 50 PID 1320 wrote to memory of 564 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 54 PID 1320 wrote to memory of 564 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 54 PID 1320 wrote to memory of 564 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 54 PID 1320 wrote to memory of 1696 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 55 PID 1320 wrote to memory of 1696 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 55 PID 1320 wrote to memory of 1696 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 55 PID 1320 wrote to memory of 560 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 57 PID 1320 wrote to memory of 560 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 57 PID 1320 wrote to memory of 560 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 57 PID 1320 wrote to memory of 1388 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 61 PID 1320 wrote to memory of 1388 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 61 PID 1320 wrote to memory of 1388 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 61 PID 1320 wrote to memory of 1272 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 63 PID 1320 wrote to memory of 1272 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 63 PID 1320 wrote to memory of 1272 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 63 PID 1320 wrote to memory of 828 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 65 PID 1320 wrote to memory of 828 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 65 PID 1320 wrote to memory of 828 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 65 PID 1320 wrote to memory of 1584 1320 a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe"C:\Users\Admin\AppData\Local\Temp\a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe"1⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\net.exe"net.exe" stop avpsus /y2⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop avpsus /y3⤵PID:1312
-
-
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeDLPAgentService /y2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y3⤵PID:1156
-
-
-
C:\Windows\system32\net.exe"net.exe" stop mfewc /y2⤵
- Suspicious use of WriteProcessMemory
PID:1772
-
-
C:\Windows\system32\net.exe"net.exe" stop BMR Boot Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y3⤵PID:1720
-
-
-
C:\Windows\system32\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y3⤵PID:840
-
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵
- Launches sc.exe
PID:1064
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵
- Launches sc.exe
PID:1504
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵
- Launches sc.exe
PID:1512
-
-
C:\Windows\system32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵
- Launches sc.exe
PID:1352
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:560
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:1388
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:1272
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:828
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1584
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1888
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1988
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1004
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1072
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:924
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:232
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1180
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1760
-
-
C:\Windows\system32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1576
-
-
C:\Windows\system32\arp.exe"arp" -a2⤵PID:1676
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt2⤵
- Opens file in notepad (likely ransom note)
PID:224
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\a8117abc27d70f18eaec3b6569e105edb2604c81b6e33dc81719e3e6247f5154.exe2⤵
- Deletes itself
PID:216 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:632
-
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfewc /y1⤵PID:276
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58eeaf94e5bee22d7d1b45741ca864fea
SHA11ed97386d363f123338777928dcfa16f4e234fcc
SHA25671000bcee4c6a84dfc2bec4d9fc86843e1038cdd10741f44932505883b9706d4
SHA512fa4870a61fd7264ee8c0f8a3957e62c4601b8ddc86b802b8a6909dffde4beaedf4091cea50485ae91371dd5ca343af85a7d1a71566439194de27eb108ca6e4ee