Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26/06/2022, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
Resource
win10v2004-20220414-en
General
-
Target
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
-
Size
344KB
-
MD5
54a1ca99363f3f777841416acc597cd5
-
SHA1
1f24ad129b53307b679d797145ab0f17b19927b4
-
SHA256
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
-
SHA512
a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\Recovery+etpft.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A92EFD85BD3DBC5
http://tes543berda73i48fsdfsd.keratadze.at/A92EFD85BD3DBC5
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/A92EFD85BD3DBC5
http://xlowfznrg4wf7dli.ONION/A92EFD85BD3DBC5
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 4616 etoooqbusihj.exe 2320 etoooqbusihj.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation etoooqbusihj.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run etoooqbusihj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vyvbbvmxxrmw = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\etoooqbusihj.exe\"" etoooqbusihj.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1844 set thread context of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 4616 set thread context of 2320 4616 etoooqbusihj.exe 95 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\AugLoop\bundle.js etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-80.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ru\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt etoooqbusihj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sk.pak etoooqbusihj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Document Parts\1033\16\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.scale-100.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\hu\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\assembly\GAC_MSIL\Microsoft.AnalysisServices.SPClient.Interfaces\13.0.0.0__89845DCD8080CC91\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\lv\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png etoooqbusihj.exe File opened for modification C:\Program Files\Common Files\System\de-DE\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\PCHEALTH\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Internet Explorer\images\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\lt\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATER\THMBNAIL.PNG etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\41C6BC7E-B7DF-49B4-8B0C-7BBB37A0E0FB\root\vfs\Windows\assembly\GAC_MSIL\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\lt.pak etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\Office16\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\de.pak etoooqbusihj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-140.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Office Setup Controller\Office.en-us\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt etoooqbusihj.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\Recovery+etpft.html etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\loc\Recovery+etpft.txt etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\Recovery+etpft.png etoooqbusihj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\Recovery+etpft.html etoooqbusihj.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\etoooqbusihj.exe 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe File opened for modification C:\Windows\etoooqbusihj.exe 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe 2320 etoooqbusihj.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2924 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe Token: SeDebugPrivilege 2320 etoooqbusihj.exe Token: SeIncreaseQuotaPrivilege 3744 WMIC.exe Token: SeSecurityPrivilege 3744 WMIC.exe Token: SeTakeOwnershipPrivilege 3744 WMIC.exe Token: SeLoadDriverPrivilege 3744 WMIC.exe Token: SeSystemProfilePrivilege 3744 WMIC.exe Token: SeSystemtimePrivilege 3744 WMIC.exe Token: SeProfSingleProcessPrivilege 3744 WMIC.exe Token: SeIncBasePriorityPrivilege 3744 WMIC.exe Token: SeCreatePagefilePrivilege 3744 WMIC.exe Token: SeBackupPrivilege 3744 WMIC.exe Token: SeRestorePrivilege 3744 WMIC.exe Token: SeShutdownPrivilege 3744 WMIC.exe Token: SeDebugPrivilege 3744 WMIC.exe Token: SeSystemEnvironmentPrivilege 3744 WMIC.exe Token: SeRemoteShutdownPrivilege 3744 WMIC.exe Token: SeUndockPrivilege 3744 WMIC.exe Token: SeManageVolumePrivilege 3744 WMIC.exe Token: 33 3744 WMIC.exe Token: 34 3744 WMIC.exe Token: 35 3744 WMIC.exe Token: 36 3744 WMIC.exe Token: SeIncreaseQuotaPrivilege 3744 WMIC.exe Token: SeSecurityPrivilege 3744 WMIC.exe Token: SeTakeOwnershipPrivilege 3744 WMIC.exe Token: SeLoadDriverPrivilege 3744 WMIC.exe Token: SeSystemProfilePrivilege 3744 WMIC.exe Token: SeSystemtimePrivilege 3744 WMIC.exe Token: SeProfSingleProcessPrivilege 3744 WMIC.exe Token: SeIncBasePriorityPrivilege 3744 WMIC.exe Token: SeCreatePagefilePrivilege 3744 WMIC.exe Token: SeBackupPrivilege 3744 WMIC.exe Token: SeRestorePrivilege 3744 WMIC.exe Token: SeShutdownPrivilege 3744 WMIC.exe Token: SeDebugPrivilege 3744 WMIC.exe Token: SeSystemEnvironmentPrivilege 3744 WMIC.exe Token: SeRemoteShutdownPrivilege 3744 WMIC.exe Token: SeUndockPrivilege 3744 WMIC.exe Token: SeManageVolumePrivilege 3744 WMIC.exe Token: 33 3744 WMIC.exe Token: 34 3744 WMIC.exe Token: 35 3744 WMIC.exe Token: 36 3744 WMIC.exe Token: SeBackupPrivilege 980 vssvc.exe Token: SeRestorePrivilege 980 vssvc.exe Token: SeAuditPrivilege 980 vssvc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 1844 wrote to memory of 2924 1844 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 91 PID 2924 wrote to memory of 4616 2924 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 92 PID 2924 wrote to memory of 4616 2924 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 92 PID 2924 wrote to memory of 4616 2924 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 92 PID 2924 wrote to memory of 4680 2924 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 93 PID 2924 wrote to memory of 4680 2924 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 93 PID 2924 wrote to memory of 4680 2924 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 93 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 4616 wrote to memory of 2320 4616 etoooqbusihj.exe 95 PID 2320 wrote to memory of 3744 2320 etoooqbusihj.exe 96 PID 2320 wrote to memory of 3744 2320 etoooqbusihj.exe 96 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System etoooqbusihj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" etoooqbusihj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\etoooqbusihj.exeC:\Windows\etoooqbusihj.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\etoooqbusihj.exeC:\Windows\etoooqbusihj.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2320 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\37327C~1.EXE3⤵PID:4680
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD554a1ca99363f3f777841416acc597cd5
SHA11f24ad129b53307b679d797145ab0f17b19927b4
SHA25637327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
SHA512a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
-
Filesize
344KB
MD554a1ca99363f3f777841416acc597cd5
SHA11f24ad129b53307b679d797145ab0f17b19927b4
SHA25637327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
SHA512a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
-
Filesize
344KB
MD554a1ca99363f3f777841416acc597cd5
SHA11f24ad129b53307b679d797145ab0f17b19927b4
SHA25637327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
SHA512a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155