Analysis
-
max time kernel
172s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-06-2022 00:14
Static task
static1
Behavioral task
behavioral1
Sample
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe
Resource
win10v2004-20220414-en
General
-
Target
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe
-
Size
372KB
-
MD5
6de3b59f26dda2c66e22365020580483
-
SHA1
60ca0323a0fa7f0846e4250b2915590546b6b224
-
SHA256
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04
-
SHA512
3eac93a917aedc5a4b3ea4f69b8ab6099fe8bffc2de9dc43b1e5d5f4dce7e01e95d4076a8e23cabaa758f6a9c954482539af9d268205ea8c59b66238b9b1633f
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\Recovery+pguwy.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/6CD94D8E257E9055
http://b4youfred5485jgsa3453f.italazudda.com/6CD94D8E257E9055
http://5rport45vcdef345adfkksawe.bematvocal.at/6CD94D8E257E9055
http://fwgrhsao3aoml7ej.onion/6CD94D8E257E9055
http://fwgrhsao3aoml7ej.ONION/6CD94D8E257E9055
Signatures
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
yuctortivmxw.exeyuctortivmxw.exepid process 1448 yuctortivmxw.exe 1544 yuctortivmxw.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
yuctortivmxw.exe2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation yuctortivmxw.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
yuctortivmxw.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\glrqtqyyhgiv = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\yuctortivmxw.exe\"" yuctortivmxw.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run yuctortivmxw.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exeyuctortivmxw.exedescription pid process target process PID 3080 set thread context of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 1448 set thread context of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe -
Drops file in Program Files directory 64 IoCs
Processes:
yuctortivmxw.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\br.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\History.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt yuctortivmxw.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt yuctortivmxw.exe -
Drops file in Windows directory 2 IoCs
Processes:
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exedescription ioc process File created C:\Windows\yuctortivmxw.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe File opened for modification C:\Windows\yuctortivmxw.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
yuctortivmxw.exepid process 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe 1544 yuctortivmxw.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exeyuctortivmxw.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 2104 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe Token: SeDebugPrivilege 1544 yuctortivmxw.exe Token: SeIncreaseQuotaPrivilege 3640 WMIC.exe Token: SeSecurityPrivilege 3640 WMIC.exe Token: SeTakeOwnershipPrivilege 3640 WMIC.exe Token: SeLoadDriverPrivilege 3640 WMIC.exe Token: SeSystemProfilePrivilege 3640 WMIC.exe Token: SeSystemtimePrivilege 3640 WMIC.exe Token: SeProfSingleProcessPrivilege 3640 WMIC.exe Token: SeIncBasePriorityPrivilege 3640 WMIC.exe Token: SeCreatePagefilePrivilege 3640 WMIC.exe Token: SeBackupPrivilege 3640 WMIC.exe Token: SeRestorePrivilege 3640 WMIC.exe Token: SeShutdownPrivilege 3640 WMIC.exe Token: SeDebugPrivilege 3640 WMIC.exe Token: SeSystemEnvironmentPrivilege 3640 WMIC.exe Token: SeRemoteShutdownPrivilege 3640 WMIC.exe Token: SeUndockPrivilege 3640 WMIC.exe Token: SeManageVolumePrivilege 3640 WMIC.exe Token: 33 3640 WMIC.exe Token: 34 3640 WMIC.exe Token: 35 3640 WMIC.exe Token: 36 3640 WMIC.exe Token: SeIncreaseQuotaPrivilege 3640 WMIC.exe Token: SeSecurityPrivilege 3640 WMIC.exe Token: SeTakeOwnershipPrivilege 3640 WMIC.exe Token: SeLoadDriverPrivilege 3640 WMIC.exe Token: SeSystemProfilePrivilege 3640 WMIC.exe Token: SeSystemtimePrivilege 3640 WMIC.exe Token: SeProfSingleProcessPrivilege 3640 WMIC.exe Token: SeIncBasePriorityPrivilege 3640 WMIC.exe Token: SeCreatePagefilePrivilege 3640 WMIC.exe Token: SeBackupPrivilege 3640 WMIC.exe Token: SeRestorePrivilege 3640 WMIC.exe Token: SeShutdownPrivilege 3640 WMIC.exe Token: SeDebugPrivilege 3640 WMIC.exe Token: SeSystemEnvironmentPrivilege 3640 WMIC.exe Token: SeRemoteShutdownPrivilege 3640 WMIC.exe Token: SeUndockPrivilege 3640 WMIC.exe Token: SeManageVolumePrivilege 3640 WMIC.exe Token: 33 3640 WMIC.exe Token: 34 3640 WMIC.exe Token: 35 3640 WMIC.exe Token: 36 3640 WMIC.exe Token: SeBackupPrivilege 60 vssvc.exe Token: SeRestorePrivilege 60 vssvc.exe Token: SeAuditPrivilege 60 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exeyuctortivmxw.exepid process 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 1448 yuctortivmxw.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exeyuctortivmxw.exeyuctortivmxw.exedescription pid process target process PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 3080 wrote to memory of 2104 3080 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe PID 2104 wrote to memory of 1448 2104 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe yuctortivmxw.exe PID 2104 wrote to memory of 1448 2104 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe yuctortivmxw.exe PID 2104 wrote to memory of 1448 2104 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe yuctortivmxw.exe PID 2104 wrote to memory of 884 2104 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe cmd.exe PID 2104 wrote to memory of 884 2104 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe cmd.exe PID 2104 wrote to memory of 884 2104 2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe cmd.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1448 wrote to memory of 1544 1448 yuctortivmxw.exe yuctortivmxw.exe PID 1544 wrote to memory of 3640 1544 yuctortivmxw.exe WMIC.exe PID 1544 wrote to memory of 3640 1544 yuctortivmxw.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
yuctortivmxw.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yuctortivmxw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" yuctortivmxw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe"C:\Users\Admin\AppData\Local\Temp\2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe"C:\Users\Admin\AppData\Local\Temp\2f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\yuctortivmxw.exeC:\Windows\yuctortivmxw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\yuctortivmxw.exeC:\Windows\yuctortivmxw.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1544 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\2F0810~1.EXE3⤵PID:884
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:60
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD56de3b59f26dda2c66e22365020580483
SHA160ca0323a0fa7f0846e4250b2915590546b6b224
SHA2562f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04
SHA5123eac93a917aedc5a4b3ea4f69b8ab6099fe8bffc2de9dc43b1e5d5f4dce7e01e95d4076a8e23cabaa758f6a9c954482539af9d268205ea8c59b66238b9b1633f
-
Filesize
372KB
MD56de3b59f26dda2c66e22365020580483
SHA160ca0323a0fa7f0846e4250b2915590546b6b224
SHA2562f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04
SHA5123eac93a917aedc5a4b3ea4f69b8ab6099fe8bffc2de9dc43b1e5d5f4dce7e01e95d4076a8e23cabaa758f6a9c954482539af9d268205ea8c59b66238b9b1633f
-
Filesize
372KB
MD56de3b59f26dda2c66e22365020580483
SHA160ca0323a0fa7f0846e4250b2915590546b6b224
SHA2562f0810867bfe800a8b8028b43570a6ee4147c611deadf90a51167590bb7a2e04
SHA5123eac93a917aedc5a4b3ea4f69b8ab6099fe8bffc2de9dc43b1e5d5f4dce7e01e95d4076a8e23cabaa758f6a9c954482539af9d268205ea8c59b66238b9b1633f