Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 21:22
Behavioral task
behavioral1
Sample
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe
Resource
win10v2004-20220812-en
General
-
Target
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe
-
Size
669KB
-
MD5
cfa482b23fa7a59641a6b816d56a3c58
-
SHA1
0cd9753113e29fd460dcdcffb21f364b3c5a14aa
-
SHA256
ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387
-
SHA512
c13bb3b4463cffd39fc556fd5e0d4286a4da6eb04cbbf5d20675d819085a07dc7f616f586e30eeaea285ca81fb89acae56124fdd3f19dba5a7eca1fec9b8d9c7
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DhKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWMKrKe
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\how_to_back_files.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 2 IoCs
resource yara_rule behavioral1/files/0x00140000000054ab-61.dat family_medusalocker behavioral1/files/0x00140000000054ab-63.dat family_medusalocker -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 984 svhost.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RedoMount.raw => C:\Users\Admin\Pictures\RedoMount.raw.deadfiles ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File renamed C:\Users\Admin\Pictures\CompressSave.png => C:\Users\Admin\Pictures\CompressSave.png.deadfiles ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File renamed C:\Users\Admin\Pictures\JoinPop.png => C:\Users\Admin\Pictures\JoinPop.png.deadfiles ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File renamed C:\Users\Admin\Pictures\ReadStart.raw => C:\Users\Admin\Pictures\ReadStart.raw.deadfiles ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-2292972927-2705560509-2768824231-1000\desktop.ini ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\X: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\Y: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\A: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\G: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\H: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\L: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\O: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\P: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\S: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\T: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\B: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\E: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\F: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\V: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\W: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\Z: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\K: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\Q: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\R: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\U: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\J: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\M: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe File opened (read-only) \??\N: ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1176 vssadmin.exe 328 vssadmin.exe 1720 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeBackupPrivilege 2028 vssvc.exe Token: SeRestorePrivilege 2028 vssvc.exe Token: SeAuditPrivilege 2028 vssvc.exe Token: SeIncreaseQuotaPrivilege 780 wmic.exe Token: SeSecurityPrivilege 780 wmic.exe Token: SeTakeOwnershipPrivilege 780 wmic.exe Token: SeLoadDriverPrivilege 780 wmic.exe Token: SeSystemProfilePrivilege 780 wmic.exe Token: SeSystemtimePrivilege 780 wmic.exe Token: SeProfSingleProcessPrivilege 780 wmic.exe Token: SeIncBasePriorityPrivilege 780 wmic.exe Token: SeCreatePagefilePrivilege 780 wmic.exe Token: SeBackupPrivilege 780 wmic.exe Token: SeRestorePrivilege 780 wmic.exe Token: SeShutdownPrivilege 780 wmic.exe Token: SeDebugPrivilege 780 wmic.exe Token: SeSystemEnvironmentPrivilege 780 wmic.exe Token: SeRemoteShutdownPrivilege 780 wmic.exe Token: SeUndockPrivilege 780 wmic.exe Token: SeManageVolumePrivilege 780 wmic.exe Token: 33 780 wmic.exe Token: 34 780 wmic.exe Token: 35 780 wmic.exe Token: SeIncreaseQuotaPrivilege 1312 wmic.exe Token: SeSecurityPrivilege 1312 wmic.exe Token: SeTakeOwnershipPrivilege 1312 wmic.exe Token: SeLoadDriverPrivilege 1312 wmic.exe Token: SeSystemProfilePrivilege 1312 wmic.exe Token: SeSystemtimePrivilege 1312 wmic.exe Token: SeProfSingleProcessPrivilege 1312 wmic.exe Token: SeIncBasePriorityPrivilege 1312 wmic.exe Token: SeCreatePagefilePrivilege 1312 wmic.exe Token: SeBackupPrivilege 1312 wmic.exe Token: SeRestorePrivilege 1312 wmic.exe Token: SeShutdownPrivilege 1312 wmic.exe Token: SeDebugPrivilege 1312 wmic.exe Token: SeSystemEnvironmentPrivilege 1312 wmic.exe Token: SeRemoteShutdownPrivilege 1312 wmic.exe Token: SeUndockPrivilege 1312 wmic.exe Token: SeManageVolumePrivilege 1312 wmic.exe Token: 33 1312 wmic.exe Token: 34 1312 wmic.exe Token: 35 1312 wmic.exe Token: SeIncreaseQuotaPrivilege 1756 wmic.exe Token: SeSecurityPrivilege 1756 wmic.exe Token: SeTakeOwnershipPrivilege 1756 wmic.exe Token: SeLoadDriverPrivilege 1756 wmic.exe Token: SeSystemProfilePrivilege 1756 wmic.exe Token: SeSystemtimePrivilege 1756 wmic.exe Token: SeProfSingleProcessPrivilege 1756 wmic.exe Token: SeIncBasePriorityPrivilege 1756 wmic.exe Token: SeCreatePagefilePrivilege 1756 wmic.exe Token: SeBackupPrivilege 1756 wmic.exe Token: SeRestorePrivilege 1756 wmic.exe Token: SeShutdownPrivilege 1756 wmic.exe Token: SeDebugPrivilege 1756 wmic.exe Token: SeSystemEnvironmentPrivilege 1756 wmic.exe Token: SeRemoteShutdownPrivilege 1756 wmic.exe Token: SeUndockPrivilege 1756 wmic.exe Token: SeManageVolumePrivilege 1756 wmic.exe Token: 33 1756 wmic.exe Token: 34 1756 wmic.exe Token: 35 1756 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 912 wrote to memory of 1176 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 27 PID 912 wrote to memory of 1176 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 27 PID 912 wrote to memory of 1176 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 27 PID 912 wrote to memory of 1176 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 27 PID 912 wrote to memory of 780 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 30 PID 912 wrote to memory of 780 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 30 PID 912 wrote to memory of 780 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 30 PID 912 wrote to memory of 780 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 30 PID 912 wrote to memory of 328 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 32 PID 912 wrote to memory of 328 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 32 PID 912 wrote to memory of 328 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 32 PID 912 wrote to memory of 328 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 32 PID 912 wrote to memory of 1312 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 34 PID 912 wrote to memory of 1312 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 34 PID 912 wrote to memory of 1312 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 34 PID 912 wrote to memory of 1312 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 34 PID 912 wrote to memory of 1720 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 36 PID 912 wrote to memory of 1720 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 36 PID 912 wrote to memory of 1720 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 36 PID 912 wrote to memory of 1720 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 36 PID 912 wrote to memory of 1756 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 38 PID 912 wrote to memory of 1756 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 38 PID 912 wrote to memory of 1756 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 38 PID 912 wrote to memory of 1756 912 ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe 38 PID 1704 wrote to memory of 984 1704 taskeng.exe 41 PID 1704 wrote to memory of 984 1704 taskeng.exe 41 PID 1704 wrote to memory of 984 1704 taskeng.exe 41 PID 1704 wrote to memory of 984 1704 taskeng.exe 41 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe"C:\Users\Admin\AppData\Local\Temp\ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387.exe"1⤵
- UAC bypass
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:912 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1176
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:328
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1720
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
C:\Windows\system32\taskeng.exetaskeng.exe {D7AB5BAB-C8D7-4D1D-A781-B5B5F836F7E5} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
PID:984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD5cfa482b23fa7a59641a6b816d56a3c58
SHA10cd9753113e29fd460dcdcffb21f364b3c5a14aa
SHA256ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387
SHA512c13bb3b4463cffd39fc556fd5e0d4286a4da6eb04cbbf5d20675d819085a07dc7f616f586e30eeaea285ca81fb89acae56124fdd3f19dba5a7eca1fec9b8d9c7
-
Filesize
669KB
MD5cfa482b23fa7a59641a6b816d56a3c58
SHA10cd9753113e29fd460dcdcffb21f364b3c5a14aa
SHA256ba87d97a4c7dec4e2eef997190f5f875c8564395bf3c95bd95055f447c495387
SHA512c13bb3b4463cffd39fc556fd5e0d4286a4da6eb04cbbf5d20675d819085a07dc7f616f586e30eeaea285ca81fb89acae56124fdd3f19dba5a7eca1fec9b8d9c7