Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2022 08:41
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20220901-en
General
-
Target
1.exe
-
Size
214KB
-
MD5
9df62163926e1801587b0f824add2f1d
-
SHA1
2e4d3b2561e89844f01267bbd26383012931a773
-
SHA256
0e3a28023ba5030fbf2395239b89ca959982bbeec1972aa0adaae6c1fb44e08d
-
SHA512
b0ce0047a488a1df52fa7c0a4d180feeaa806858677f2fc0abe05450228aa3e00498797a7ac7f4fb9dcf442dd5cdd79e09cca42101259f0866f8699f80b4622e
-
SSDEEP
6144:syJE1yd7WHJmcyfjtPWna4DQFu/U3buRKlemZ9DnGAevIhdiMM+:sU/d7WsvBPWa4DQFu/U3buRKlemZ9DnG
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
https://tox.chat/download.html
Signatures
-
Detects Zeppelin payload 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0003000000022dcc-133.dat family_zeppelin behavioral2/files/0x0003000000022dcc-134.dat family_zeppelin behavioral2/files/0x0003000000022dcc-150.dat family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
services.exeservices.exepid Process 2320 services.exe 3500 services.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\services.exe\" -start" 1.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
services.exedescription ioc Process File opened (read-only) \??\F: services.exe File opened (read-only) \??\E: services.exe File opened (read-only) \??\A: services.exe File opened (read-only) \??\S: services.exe File opened (read-only) \??\G: services.exe File opened (read-only) \??\Z: services.exe File opened (read-only) \??\T: services.exe File opened (read-only) \??\U: services.exe File opened (read-only) \??\N: services.exe File opened (read-only) \??\M: services.exe File opened (read-only) \??\L: services.exe File opened (read-only) \??\K: services.exe File opened (read-only) \??\J: services.exe File opened (read-only) \??\Y: services.exe File opened (read-only) \??\W: services.exe File opened (read-only) \??\H: services.exe File opened (read-only) \??\R: services.exe File opened (read-only) \??\Q: services.exe File opened (read-only) \??\P: services.exe File opened (read-only) \??\O: services.exe File opened (read-only) \??\I: services.exe File opened (read-only) \??\B: services.exe File opened (read-only) \??\X: services.exe File opened (read-only) \??\V: services.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 geoiptool.com -
Drops file in Program Files directory 64 IoCs
Processes:
services.exedescription ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-ma\ui-strings.js services.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ar-ae\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\profilePic.png services.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\THMBNAIL.PNG.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\LargeLogo.scale-125_contrast-white.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48.png services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_selectlist_checkmark_18.svg.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sv-se\ui-strings.js.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-fallback.xml services.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler_zh_CN.jar.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial-ppd.xrm-ms services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Background_RoomTracing_06.jpg services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-100_contrast-high.png services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fi-fi\ui-strings.js.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\Close2x.png services.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt.colambia.AFE-8C9-254 services.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hr-hr\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-modules.xml.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-pl.xrm-ms.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-ul-phn.xrm-ms services.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailSmallTile.scale-400.png services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\ui-strings.js.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\editvideoimage.png.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fi-fi\AppStore_icon.svg.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core-multitabs.jar services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.xml services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\MANIFEST.MF.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\ui-strings.js.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\DismountSave.vst services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedStoreLogo.scale-100_contrast-black.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorStoreLogo.contrast-black_scale-100.png services.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeLargeTile.scale-200.png services.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sl-sl\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fi-fi\ui-strings.js services.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\icecast.luac.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\10.jpg services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.scale-100.png services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\mecontrol.png services.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_pt_135x40.svg services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-oob.xrm-ms.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_ja.jar.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60_altform-unplated.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-256_altform-unplated_contrast-black.png services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\ui-strings.js.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\ResumeInvoke.rtf.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml services.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\Assets\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\ui-strings.js services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-de_de_2x.gif.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-gb\ui-strings.js services.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SONORA\THMBNAIL.PNG.colambia.AFE-8C9-254 services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-96_altform-unplated.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\LargeTile.scale-100_contrast-black.png services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MYSL.ICO services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\LockScreenLogo.scale-200.png services.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxBadge.scale-150.png services.exe -
Drops file in Windows directory 1 IoCs
Processes:
services.exedescription ioc Process File created C:\Windows\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 2328 powershell.exe 2328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exevssvc.exepowershell.exeWMIC.exedescription pid Process Token: SeIncreaseQuotaPrivilege 4044 WMIC.exe Token: SeSecurityPrivilege 4044 WMIC.exe Token: SeTakeOwnershipPrivilege 4044 WMIC.exe Token: SeLoadDriverPrivilege 4044 WMIC.exe Token: SeSystemProfilePrivilege 4044 WMIC.exe Token: SeSystemtimePrivilege 4044 WMIC.exe Token: SeProfSingleProcessPrivilege 4044 WMIC.exe Token: SeIncBasePriorityPrivilege 4044 WMIC.exe Token: SeCreatePagefilePrivilege 4044 WMIC.exe Token: SeBackupPrivilege 4044 WMIC.exe Token: SeRestorePrivilege 4044 WMIC.exe Token: SeShutdownPrivilege 4044 WMIC.exe Token: SeDebugPrivilege 4044 WMIC.exe Token: SeSystemEnvironmentPrivilege 4044 WMIC.exe Token: SeRemoteShutdownPrivilege 4044 WMIC.exe Token: SeUndockPrivilege 4044 WMIC.exe Token: SeManageVolumePrivilege 4044 WMIC.exe Token: 33 4044 WMIC.exe Token: 34 4044 WMIC.exe Token: 35 4044 WMIC.exe Token: 36 4044 WMIC.exe Token: SeIncreaseQuotaPrivilege 4044 WMIC.exe Token: SeSecurityPrivilege 4044 WMIC.exe Token: SeTakeOwnershipPrivilege 4044 WMIC.exe Token: SeLoadDriverPrivilege 4044 WMIC.exe Token: SeSystemProfilePrivilege 4044 WMIC.exe Token: SeSystemtimePrivilege 4044 WMIC.exe Token: SeProfSingleProcessPrivilege 4044 WMIC.exe Token: SeIncBasePriorityPrivilege 4044 WMIC.exe Token: SeCreatePagefilePrivilege 4044 WMIC.exe Token: SeBackupPrivilege 4044 WMIC.exe Token: SeRestorePrivilege 4044 WMIC.exe Token: SeShutdownPrivilege 4044 WMIC.exe Token: SeDebugPrivilege 4044 WMIC.exe Token: SeSystemEnvironmentPrivilege 4044 WMIC.exe Token: SeRemoteShutdownPrivilege 4044 WMIC.exe Token: SeUndockPrivilege 4044 WMIC.exe Token: SeManageVolumePrivilege 4044 WMIC.exe Token: 33 4044 WMIC.exe Token: 34 4044 WMIC.exe Token: 35 4044 WMIC.exe Token: 36 4044 WMIC.exe Token: SeBackupPrivilege 4848 vssvc.exe Token: SeRestorePrivilege 4848 vssvc.exe Token: SeAuditPrivilege 4848 vssvc.exe Token: SeDebugPrivilege 2328 powershell.exe Token: SeIncreaseQuotaPrivilege 1668 WMIC.exe Token: SeSecurityPrivilege 1668 WMIC.exe Token: SeTakeOwnershipPrivilege 1668 WMIC.exe Token: SeLoadDriverPrivilege 1668 WMIC.exe Token: SeSystemProfilePrivilege 1668 WMIC.exe Token: SeSystemtimePrivilege 1668 WMIC.exe Token: SeProfSingleProcessPrivilege 1668 WMIC.exe Token: SeIncBasePriorityPrivilege 1668 WMIC.exe Token: SeCreatePagefilePrivilege 1668 WMIC.exe Token: SeBackupPrivilege 1668 WMIC.exe Token: SeRestorePrivilege 1668 WMIC.exe Token: SeShutdownPrivilege 1668 WMIC.exe Token: SeDebugPrivilege 1668 WMIC.exe Token: SeSystemEnvironmentPrivilege 1668 WMIC.exe Token: SeRemoteShutdownPrivilege 1668 WMIC.exe Token: SeUndockPrivilege 1668 WMIC.exe Token: SeManageVolumePrivilege 1668 WMIC.exe Token: 33 1668 WMIC.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
1.exeservices.execmd.execmd.exedescription pid Process procid_target PID 4708 wrote to memory of 2320 4708 1.exe 87 PID 4708 wrote to memory of 2320 4708 1.exe 87 PID 4708 wrote to memory of 2320 4708 1.exe 87 PID 2320 wrote to memory of 2340 2320 services.exe 91 PID 2320 wrote to memory of 2340 2320 services.exe 91 PID 2320 wrote to memory of 2340 2320 services.exe 91 PID 2320 wrote to memory of 5112 2320 services.exe 92 PID 2320 wrote to memory of 5112 2320 services.exe 92 PID 2320 wrote to memory of 5112 2320 services.exe 92 PID 2320 wrote to memory of 2356 2320 services.exe 93 PID 2320 wrote to memory of 2356 2320 services.exe 93 PID 2320 wrote to memory of 2356 2320 services.exe 93 PID 2320 wrote to memory of 4532 2320 services.exe 103 PID 2320 wrote to memory of 4532 2320 services.exe 103 PID 2320 wrote to memory of 4532 2320 services.exe 103 PID 2320 wrote to memory of 768 2320 services.exe 94 PID 2320 wrote to memory of 768 2320 services.exe 94 PID 2320 wrote to memory of 768 2320 services.exe 94 PID 2320 wrote to memory of 3940 2320 services.exe 96 PID 2320 wrote to memory of 3940 2320 services.exe 96 PID 2320 wrote to memory of 3940 2320 services.exe 96 PID 2320 wrote to memory of 3500 2320 services.exe 97 PID 2320 wrote to memory of 3500 2320 services.exe 97 PID 2320 wrote to memory of 3500 2320 services.exe 97 PID 3940 wrote to memory of 2328 3940 cmd.exe 104 PID 3940 wrote to memory of 2328 3940 cmd.exe 104 PID 3940 wrote to memory of 2328 3940 cmd.exe 104 PID 2340 wrote to memory of 4044 2340 cmd.exe 105 PID 2340 wrote to memory of 4044 2340 cmd.exe 105 PID 2340 wrote to memory of 4044 2340 cmd.exe 105 PID 3940 wrote to memory of 1668 3940 cmd.exe 108 PID 3940 wrote to memory of 1668 3940 cmd.exe 108 PID 3940 wrote to memory of 1668 3940 cmd.exe 108 PID 2320 wrote to memory of 3548 2320 services.exe 119 PID 2320 wrote to memory of 3548 2320 services.exe 119 PID 2320 wrote to memory of 3548 2320 services.exe 119 PID 2320 wrote to memory of 3548 2320 services.exe 119 PID 2320 wrote to memory of 3548 2320 services.exe 119 PID 2320 wrote to memory of 3548 2320 services.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:5112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy ByPass -Command "Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC.exe shadowcopy delete /nointeractive4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:4532
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:3548
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize2KB
MD512dbb5eb4ce1ea3942d83f9309151677
SHA119e529c286499b44fa120d9effd8e0fabb1c56a3
SHA256bca95945f5d1a63cb8fd232b3cd7cf857acdb04697b0a8537b6aaf697b1ff34b
SHA51261593564ef6273b4493b8a9ef6669690f5a040c579effa26d44f2ba5977850d6afda17afba5ef80fdb461fbf4d061ec8bfb13cf6a87c5e2ed8c6c9cae3d9e84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_8AE57F9FAAC778EA4099F469BEEE4C46
Filesize472B
MD5e89c3fa7244c0f301da2fb10568f2c1c
SHA1553c49cda8392207c090ce206910ee386b034ebb
SHA25671c7869933d22d4dd6156019ef7f4b872263999a116b97ebed6eff4b174a49e0
SHA51298858dd163a15259d3e1dbb39d1cf4df8a93ead5f0e0230bcc6957b7d3fa5b8032d31d854861793358a06f062cbe45d8efca4e484145b894dfbbd307a12c3cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD50d870ca424457579d4bd345ac1ec6c3c
SHA1fc3d8924e13b4fc5eca7cabd4967eea3d4db1690
SHA256cf9df8d62ec78ca20a50633047af6c913dc2d10f15823795e8d86042c7b05ed0
SHA512a1e731ae03b1a2259f8e1afc86058aabb3b8ce3b0141f08ea18b6c7003c55aeb135d40bba38ebf1f76174eb1ad758fbec10841dee1ed704fb0285e36b2f7d66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize484B
MD5d87b6cace36839d6808e1a959bdfa840
SHA12afe1cd3cef468045d5d96c9f46cf9a178849ae3
SHA2568065aba3d639c1bbbd9058f25c1b47264da85a84fb35dc9be018f0c5f3956f8e
SHA5122a7b3e7f66dc665f54692d2894fa185bf542d40a5c271d895fb897869c38d79550a21a70ad1a7b7c5a18292e47c06e3e85cfb272b2726942765c6d910c83c8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_8AE57F9FAAC778EA4099F469BEEE4C46
Filesize488B
MD5d9aa90f869029e5f061f3e42716486df
SHA1dda4bf074ea9c7c2984bb06259cc393ddbb70176
SHA25695a26f6abde55f8f239909de42c10563a85bfafa6d035d54c8ddba131154fc6b
SHA512571c55bb40b3515162402525574888bf88bf2a8c8abf9a7724259bde2da6ce61664e902427805fc8c77155e5c5b670e5471608444126b18946571cb824f67a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD514852b289237169aa4313492bfa7e887
SHA18fc7b77916ae0406b89fa283272da4029e0a8e7e
SHA256e45f3195b5f26efdda0dca88b9c71e2751f4bbf88052cc9a319c5868174d9de7
SHA512db3e44d09ecd1d24c4c1bda0696adf5b4a9ccf4f8e463723b36cf396771c6b579173e12e3601e32980a200377896e7d29e9a511630bd0b45a87b01463c4403f8
-
Filesize
18KB
MD56b17a59cec1a7783febae9aa55c56556
SHA101d4581e2b3a6348679147a915a0b22b2a66643a
SHA25666987b14b90d41632be98836f9601b12e7f329ffab05595887889c9c5716fbeb
SHA5123337efd12b9c06b7768eb928a78caae243b75257c5aabe7a49e908a2f735af55f7257a40bd2330dc13865ead18ed805b54a6c5105740fdcbbaccacf7997bcbc3
-
Filesize
184B
MD5b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
Filesize
262B
MD5e6545ccb3660f88529716ed4e647c713
SHA1ecd628f29985599a24c5c1d23083c689917dd74e
SHA256e802bf0c4481bef693d4d1f307aba48301e330d3728dd46a4ec97c4a96b4d4a7
SHA512f745e7d5dd006083234e783dd5dc7fb83043a7d0479ea2a91a2ddbc8c20ca47343516efbd155271768c675a22b32e88febdfe51551ec42dfdb64805c62c3188d
-
Filesize
214KB
MD59df62163926e1801587b0f824add2f1d
SHA12e4d3b2561e89844f01267bbd26383012931a773
SHA2560e3a28023ba5030fbf2395239b89ca959982bbeec1972aa0adaae6c1fb44e08d
SHA512b0ce0047a488a1df52fa7c0a4d180feeaa806858677f2fc0abe05450228aa3e00498797a7ac7f4fb9dcf442dd5cdd79e09cca42101259f0866f8699f80b4622e
-
Filesize
214KB
MD59df62163926e1801587b0f824add2f1d
SHA12e4d3b2561e89844f01267bbd26383012931a773
SHA2560e3a28023ba5030fbf2395239b89ca959982bbeec1972aa0adaae6c1fb44e08d
SHA512b0ce0047a488a1df52fa7c0a4d180feeaa806858677f2fc0abe05450228aa3e00498797a7ac7f4fb9dcf442dd5cdd79e09cca42101259f0866f8699f80b4622e
-
Filesize
214KB
MD59df62163926e1801587b0f824add2f1d
SHA12e4d3b2561e89844f01267bbd26383012931a773
SHA2560e3a28023ba5030fbf2395239b89ca959982bbeec1972aa0adaae6c1fb44e08d
SHA512b0ce0047a488a1df52fa7c0a4d180feeaa806858677f2fc0abe05450228aa3e00498797a7ac7f4fb9dcf442dd5cdd79e09cca42101259f0866f8699f80b4622e
-
Filesize
370KB
MD52b029ede9a31013ed942456ba5ff8e58
SHA140055569d057127099f2d4718967a96312a7969f
SHA256074a4060268fcd6dd1c6e7853da60e7a38d32ae0d202e27d7d1e643d669aabfa
SHA51201bc5f2c227a4d486ac2f04e199521fa4a43c71e57decb38d8593c79fa5775b47e8c3ca6f0bc16a99b2fc47c3ed468118c7405f0065dc70b55c32394ea06d3aa
-
Filesize
393KB
MD54e4a8dd13d698990b9845870b07bff5f
SHA13bae2f99bde1977494c65eebf9372a6988744f3c
SHA256a3afe54efc21d91911a606b1a0b06f9a2f6e1436cdfeba13ac954a2226dc7505
SHA5129da9a2f472972230da645143463e8168417a0f8e3f9e54cd8097e29dae24e6589b4ef71a127296b67b723bba42b3a1fb350ceee689704bc700b8916b255ef3e3
-
Filesize
416KB
MD50eb2ed923f30feee22cfa4a46f5ac03f
SHA13419117f4c20f50bf775bfc0302f2e90c3b5f71b
SHA256ce9def82633629dc200548487bfef7dcf1b1c14c36c1f731214a1cad7232da1e
SHA512bca211fe2bb4a476919b316d470f88d4f02b0bdb384ca1bc7573284af0f5bd55aae459a2ae4873a2f6d0d5902d98ecffa42a76ccefd07bdfa322af91f102841e
-
Filesize
301KB
MD5da4b2a1ffc478bc8bcf1aef12eb32b92
SHA1d929de6d1c7edb822c4f3789b551a7a4cf4fba7e
SHA25633499e5d107ea95ed994dff4e0c48ba0d78e616072fa5cb771e03dcdc1e5a0dd
SHA512fa44339e9b25c37492018d2829d1d314ab9c8e2228c898669e5af172ed0fb3b62117a0e84805abdfc7345ff6611f7544b51dfe34ea645a329c730902b5e840ea
-
Filesize
554KB
MD51d1f39fbb3078fb66d5a73e7b6fa804f
SHA1b5e2bffd5aa955879f96268c6284fb9ec48a1877
SHA2565fbf250dc46c47ac47563efd450c7d927a5e04c82bb8bcb65ce9df89cebfe734
SHA5123e2ebcecf954595883f991610ee90ccfeeb2adef7fb89b747282e4733982fb54ff8cb3a4e7ac8611be6044a3321ab938f51afd26db6cce7417dcaf5d6b1e19dd
-
Filesize
600KB
MD5a9a53b9237ec3929c6e2c03ac40371da
SHA1f48c1f6baa97ff3dbc018f7aaa92e62e06bd9526
SHA256ba6f0721bd97c45adfddd242183d3aec472f02af5ddd74c6051994e115df34b5
SHA512f19b72c4849fb07c0965a4e28164ad1be42bdbe4edab648dd2d3a4a741a12fba2619a02cedf787565abb0a6e888023c0cef0bcf81a09a47eadb768092cac99a2
-
Filesize
255KB
MD5d31e3507beb4c0c1bd94434a9272232f
SHA10d976635f9e0521a83dd69e2b46e570323fe2b94
SHA256a7b870c3f3cf1ab6e89ab6d0e36ad2d029c0a98b891890ab6382eeb0a3ceb367
SHA512502e0a5a7dd336003292b9637baedbc2c35cf741b7aaa32cfea6d7a1bc2da4f87e38e2c68e1abea85bf63a9a7406db59077f613c63b861ac46f8190239ea1c4d
-
Filesize
485KB
MD5237f70e0473380b4d59b73b2c29e4396
SHA160f83d55571cb38be9dbcc8bc2c66ed9b6a59a4b
SHA256d262de12bff6bac5e6081dbe52a44d6caef897f68bd3066e4e613b325cd95bbf
SHA5120da0c2578f0fd1b66be10aa4222bb2f057a2a314e020f675954807223b3efa329d2046c62980eda16ed7fee324ec65b9d2013005c3b47e699158c3d03f3771fd
-
Filesize
324KB
MD57ca5d63c86f4075d5c4da40958e4ce46
SHA13f273fe1a224d4eef15f2406613c1e0be8e4f3e1
SHA25671387fcc01992ddb4747165c1ccb5c9878ad2c68573d578254e63430f4038499
SHA5126c9fe5f538f1ec98ba5e2d455ab54b14a81a2e169cd4c8830cfeb7837aee18a989e4fb302705d2927668d69fcee4be08511d2e15475031e90feef41eb3a68f54
-
Filesize
347KB
MD541a2eea6f48109ad8410bae76d4377a0
SHA190cadb82238d875c400ef719fc3391ea9da3153f
SHA25677a76f3f71b72beebbb3158cb7f2988182fd229b77f8fd70fc8a8365e96c493a
SHA512f2d684adc24be82b5785739c6ecfa4a09676b741bb93fe9b928c00ab550bff9cc96956b9b5174c6f41bf6016a644f156bcbb5473f7838fdf4d66d5221a62c407
-
Filesize
462KB
MD5877d56d7a588604060a5124bb0e6aea2
SHA17f15be5134492f2aaaa085e96d306598c8fb5446
SHA2563147eca137b46a63174de4f718f0f78227637f2375e934851fbf40c0a0d5f6e7
SHA5122c02ce4b9d321e5b621800286b68b067dbd8604826cf88897340b62fd3769d81be9ce18f1b7f15b07ae96528b501e40d46f801aa9ed7c518bbe5c503c7a93182
-
Filesize
531KB
MD5fc5e46549afe793374b60f0d7d4b8f93
SHA1a2fb12e473077171b0e0e68dcb2cb30d7693fe61
SHA256b340b2720e1127ce90f518aeacf371c8f8996016946da62d7e29887470fb312e
SHA5125da914f1e75dc3ea94a32e852490e0fb3ecef21fbd82a99b0b0a310128b08c7b6d95ece1bb01ddfbc3c1f2325bbd8178b79c962dff1162dbcd15d6fbff16658c
-
Filesize
439KB
MD58dece5c84269b3bbddf1d5351a8a261d
SHA1968b642dfb723ba93dd867cca4df961991fa93cb
SHA256729ab9d6cea8e0c9bb5138b5a7192c5115a357fba7fd2f5ee13b3042ebf924db
SHA5128e7041320c144ff33f241e336684aba5db7e1c0c4324291d2c3352ee6f97b692745f99671b59549e7f3809ebf39a793fcb9f052869e9baafb0adefcb405e19ba
-
Filesize
646KB
MD5b00aa398a896880045b995209af6976a
SHA14ec496c168a9314c5147fe15d7a06497cc88d717
SHA256322c9560f437eddffc2808b43fc1b6a00675d7918b36788273d0e521dc97c307
SHA51223553ef3f27ab4aa16701b8f4c3c42b026b8e45c468358df0ae41253386d44ba08c674a8899553bf47e463678a0d05f53cf565c6afb1c22a63ed2b6a1dc3e143
-
Filesize
577KB
MD5fcd1b815a224a1eabcfe773f411f9610
SHA1abddcc91b81f8806daf8527c098c0f1c940c3bd6
SHA256b4cb6c5042d245b79c67c6aa4a2b81344ba4288a77bcc4cb3d38fe0d8e6a2db2
SHA512d4fc42e5153133b2bf5f9fbeee2f69bf59ca2de04a7a94b065e7d10d5708d1b15713f8ab019ceeede6b81100ca9cee056bb7d13e8ca3a188621192f5186d4430
-
Filesize
278KB
MD5c95b4184aa0e48b7ebdd181fadbd7c45
SHA17d7098b49f8c5a3da97443ef60539c133944f1d0
SHA256d6eb5d65854ceb6ddd897a1d3ef5130ea57884ee2d2354b55c43a256163f7b15
SHA5123cda32fd0aa29a3ecaa6f7c8c13015a286a10751e5cb96fe148599c39fcf4ef65c82f2ebd647e4f3b346b558c7955e367d78f7b04e0b099ddd1ef83db05fb98c
-
Filesize
623KB
MD5581f948c0d9b708e12e6aecb8e615bf1
SHA1231af86d4b024c323c9f998a8fdc8fdd772f433c
SHA256c565d8422aee60134faa0a3ce49c41042f4219b4f32169dcd6f3aba7bd923c17
SHA51276eded5bab13ed395d6726682a064991697e4900c7440c62921d9c27e19d8f720ed09a0a5e93a5abe815fa445a1029ee8cdfa89b377016048b5618a7cdae7e25
-
Filesize
900KB
MD5b9b9cc9d9d6cbcea77883ff1aff461de
SHA1bc721aec49f5355fa0662994b4db8d7e34fcb9ae
SHA2560fcae12f9ca70c7e144a4a5629812543ea931267869b12b2adcb16210e783c7c
SHA512ab579bf63e6e22dea775eeca71976617e4fe965e781738520c1c1a88a52543a662bbb473755cc50dbc4cdbfb3140fd8b27c9f6ba757ae91c9afae32c0805b69c
-
Filesize
508KB
MD50e0b13a924adec6b8c5cd66d5f633af4
SHA1a2e2b55ad7c94026c0ab9dcb47752dc03cc9eae0
SHA2563571779b78b11ab0e2dca4ddcc3f73f59fcfbbd29f8bf7e8b90bcf5e472a1dd8
SHA5123b9a8f89036015a4bf53f503d05f315191f89b87eef3720027c0bbc18e3d90760969fadfafa458b27e6640d4f6ae18a9f9199a3c66b4d020e4d5fc74337b915d
-
Filesize
232KB
MD5392a345e34f98bf38fee4d568e3ccb93
SHA19a6bd283a760add541c7ea1df40375c3d4f73dc4
SHA2563ead842cf86b708d18ab77333b5322dc2c778b7e8668f74741f60e801b7c29aa
SHA5122019dc5c69ecdd2f444d698b02aa21775a1a842fb33452d9013e07212fbc8dd3fcd78d09fcab38af543aafcb0a141b410be21a603756f994e4bd59ef4af7eca0