Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 09:56
Behavioral task
behavioral1
Sample
2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe
Resource
win10v2004-20220812-en
General
-
Target
2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe
-
Size
69KB
-
MD5
80372de850597bd9e7e021a94f13f0a1
-
SHA1
037db820c8dee94ae25a439b758a2b89f527cbb4
-
SHA256
2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8
-
SHA512
f43db3569ac60d6ed55b9a3a24dcb459e14b0bd944e9405a8cb2bfb686eaeff31c82ffcd6c477d6a6affe9014ae8ed7d8af174e8ceebbcf00b64ad293901a77a
-
SSDEEP
1536:juCWRxL7hbUiQfovecnXUU+hhOZuIWiFp+ZfaBZebC33O+Pd71vb:KCWf7VJQfmeMXvkhOZu1iFBBZebC3F7t
Malware Config
Extracted
C:\ProgramData\Microsoft\User Account Pictures\F9DC6D-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\LimitImport.tiff 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\UninstallLock.raw => C:\Users\Admin\Pictures\UninstallLock.raw.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\UnpublishStart.tif => C:\Users\Admin\Pictures\UnpublishStart.tif.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\FindRead.tif => C:\Users\Admin\Pictures\FindRead.tif.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\RegisterSplit.tif => C:\Users\Admin\Pictures\RegisterSplit.tif.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Users\Admin\Pictures\ConnectAssert.tiff 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Users\Admin\Pictures\OpenWatch.tiff 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\LimitImport.tiff => C:\Users\Admin\Pictures\LimitImport.tiff.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\OpenWatch.tiff => C:\Users\Admin\Pictures\OpenWatch.tiff.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\RenameSet.raw => C:\Users\Admin\Pictures\RenameSet.raw.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\UnblockLock.crw => C:\Users\Admin\Pictures\UnblockLock.crw.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\UndoRegister.png => C:\Users\Admin\Pictures\UndoRegister.png.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\ConnectAssert.tiff => C:\Users\Admin\Pictures\ConnectAssert.tiff.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\ImportLimit.raw => C:\Users\Admin\Pictures\ImportLimit.raw.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\SyncOpen.crw => C:\Users\Admin\Pictures\SyncOpen.crw.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\UninstallRename.tiff => C:\Users\Admin\Pictures\UninstallRename.tiff.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Users\Admin\Pictures\UninstallRename.tiff 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File renamed C:\Users\Admin\Pictures\EnterWrite.raw => C:\Users\Admin\Pictures\EnterWrite.raw.f9dc6d 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SLERROR.XML 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Thule 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Angles.xml 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Anadyr 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodicon.gif 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.HTM 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\F9DC6D-Readme.txt 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\F9DC6D-Readme.txt 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR1B.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Discussion.css 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10336_.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14531_.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dhaka 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299125.WMF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Tashkent 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\New_York 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.workbench.nl_ja_4.4.0.v20140623020002.jar 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLNOTER.FAE 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_F_COL.HXK 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Saipan 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\DenyCompress.wax 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB5B.BDR 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18187_.WMF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\vlc.mo 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-views.xml 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC.HXS 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Choibalsan 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\LATIN1.SHP 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jre7\lib\security\trusted.libraries 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\F9DC6D-Readme.txt 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_zh_CN.jar 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\VideoLAN\VLC\NEWS.txt 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\DELETE.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Darwin 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME13.CSS 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBPQT.XML 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.nl_ja_4.4.0.v20140623020002.jar 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00004_.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\vlc-48.png 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00932_.WMF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue.css 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-output2.jar 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Fiji 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT_K_COL.HXK 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR14F.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACC.OLB 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Vostok 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_VelvetRose.gif 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-profiler.jar 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Module.eftx 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-utilities.xml 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactLow.jpg 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.ja_5.5.0.165303.jar 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\TAB_ON.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Manaus 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD10972_.GIF 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\ACWZUSR12.ACCDU 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\WARN.WAV 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach.zh_CN_5.5.0.165303.jar 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Slate.css 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.DEV_COL.HXC 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1892 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe Token: SeImpersonatePrivilege 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe Token: SeBackupPrivilege 7560 vssvc.exe Token: SeRestorePrivilege 7560 vssvc.exe Token: SeAuditPrivilege 7560 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1892 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 26 PID 2032 wrote to memory of 1892 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 26 PID 2032 wrote to memory of 1892 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 26 PID 2032 wrote to memory of 1892 2032 2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe"C:\Users\Admin\AppData\Local\Temp\2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1892
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:7560