Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 07:20
Behavioral task
behavioral1
Sample
4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe
Resource
win10v2004-20220812-en
General
-
Target
4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe
-
Size
159KB
-
MD5
14de179afe8e29f828080ad79d523a3f
-
SHA1
5d56729c8a80c738c05d5e10bb10664c40186c4b
-
SHA256
4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267
-
SHA512
fb8ea8c95d1dd6551787528dd2bfeece2543ba0c59347005b63282ed4a5ef6d6c3c8fcdb31af3d409a78d15fef206d637568ae1131521739abfc1b99fd9c3d31
-
SSDEEP
3072:4ZpcABtMGjkIuuWxCwfKp8vdjwOYvGCbY0oTZRz35cRttX2laYZliyQkV:4ZpcvwNweMwdvTLAZJit9y3V
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\RECOVERY FILES.txt
https://twitter.com/mallox_leaks
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\FindUnprotect.png => C:\Users\Admin\Pictures\FindUnprotect.png.FARGO3 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File renamed C:\Users\Admin\Pictures\SkipEnter.crw => C:\Users\Admin\Pictures\SkipEnter.crw.FARGO3 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File renamed C:\Users\Admin\Pictures\SplitConvertFrom.crw => C:\Users\Admin\Pictures\SplitConvertFrom.crw.FARGO3 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File renamed C:\Users\Admin\Pictures\StopEnable.crw => C:\Users\Admin\Pictures\StopEnable.crw.FARGO3 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File renamed C:\Users\Admin\Pictures\WatchCheckpoint.raw => C:\Users\Admin\Pictures\WatchCheckpoint.raw.FARGO3 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File renamed C:\Users\Admin\Pictures\BackupSync.raw => C:\Users\Admin\Pictures\BackupSync.raw.FARGO3 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\W: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\X: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\A: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\B: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\R: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\U: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\L: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\T: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\J: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\N: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\O: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\P: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\E: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\F: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\H: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\I: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\Z: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\S: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\Y: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\G: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\K: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\M: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened (read-only) \??\Q: 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\script\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-oob.xrm-ms 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\vlc.mo 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-400_contrast-white.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-left.gif 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ro-ro\ui-strings.js 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\1033\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sampler_ja.jar 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\SmallTile.scale-125.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptySearch-Dark.scale-100.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\files_icons.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\IC_WelcomeBanner.scale-100.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-ae\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-sl\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\ContactPhoto.scale-180.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\PeopleSmallTile.scale-100.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSplashLogo.scale-250.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_invite_18.svg 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\PreviewMailList.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\files_icons2x.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_KMS_ClientC2R-ul.xrm-ms 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\pt-br\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupSmallTile.scale-125.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core_0.10.100.v20140424-2042.jar 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Calibri.xml 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\1033\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\VideoLAN\VLC\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\people\kennethMarchand.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-16_altform-unplated.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BOLDSTRI\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\StoreLogo.scale-150_contrast-black.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-48_altform-unplated_contrast-black.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\fr-FR.mail.config 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\distribute_form.gif 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reportabuse-default_18.svg 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\accessibilitychecker\index.html 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubMedTile.scale-200_contrast-black.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xe7cf.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-30.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-64_contrast-black.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\WideLogo.scale-200_contrast-white.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\ExploreButtonGradientLight.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\RECOVERY FILES.txt 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.nl_ja_4.4.0.v20140623020002.jar 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.office32ww.msi.16.x-none.xml 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\AppxSignature.p7x 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MixedRealityPortalSplashScreen.scale-200_contrast-black.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\meetings-chat-upsell.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\ui-strings.js 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setNetworkServerCP 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository.nl_ja_4.4.0.v20140623020002.jar 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-80.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleWideTile.scale-200.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarSplashLogo.scale-300.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\selection-actions.png 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1008 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3596 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe Token: SeDebugPrivilege 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe Token: SeBackupPrivilege 2552 vssvc.exe Token: SeRestorePrivilege 2552 vssvc.exe Token: SeAuditPrivilege 2552 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3596 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 77 PID 2656 wrote to memory of 4760 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 79 PID 2656 wrote to memory of 3596 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 77 PID 2656 wrote to memory of 4760 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 79 PID 2656 wrote to memory of 4760 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 79 PID 2656 wrote to memory of 3524 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 78 PID 2656 wrote to memory of 3524 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 78 PID 2656 wrote to memory of 3524 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 78 PID 2656 wrote to memory of 1520 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 81 PID 2656 wrote to memory of 1520 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 81 PID 2656 wrote to memory of 1520 2656 4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe 81 PID 4760 wrote to memory of 1008 4760 cmd.exe 86 PID 4760 wrote to memory of 1008 4760 cmd.exe 86 PID 4760 wrote to memory of 1008 4760 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe"C:\Users\Admin\AppData\Local\Temp\4db69a0643f6ec795e5450a0563605e91293f233aa60715ae09ed8effa3b7267.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\vssadmin.exe"C:\Windows\sysnative\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵PID:3524
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc delete MsDtsServer100&&sc delete MSSQL$SOPHOS&&sc delete MSSQLFDLauncher&&sc delete MSSQLSERVER&&sc delete MSSQLServerADHelper100&&sc delete MSSQLServerOLAPService&&sc delete ReportServer&&sc delete SQLAgent$SOPHOS&&sc delete "SQLANYs_sem5"&&sc delete SQLBrowser&&sc delete SQLSERVERAGENT&&sc delete SQLWriter&&sc delete B1LicenseService&&sc delete b1s50000&&sc delete b1s50001&&sc delete b1s50002&&sc delete B1ServerTools&&sc delete B1ServerTools64&&sc delete B1Workflow&&sc delete COMSysApp&&sc delete Gatekeeper64&&sc delete isapnp&&sc delete "SAP Business One RSP Agent Service"&&sc delete SBOClientAgent&&sc delete "SBODI_Server"&&sc delete SBOMail&&sc delete SBOWFDataAccess&&taskkill /f /im db*&&taskkill /f /im apache*&&taskkill /f /im mysql*&&taskkill /f /im Notifier*&&taskkill /f /im IBM*&&taskkill /f /im copy*&&taskkill /f /im store*&&taskkill /f /im sql*&&taskkill /f /im vee*&&taskkill /f /im wrsa*&&taskkill /f /im postg*&&taskkill /f /im sage*&&taskkill /f /im msdt*&&taskkill /f /im ora*&&taskkill /f /im microsoft*&&taskkill /f /im backup*&&taskkill /f /im http*&&taskkill /f /im office*&&taskkill /f /im cube*&&taskkill /f /im team*&&taskkill /f /im b1*&&taskkill /f /im sbo*&&taskkill /f /im reporting*&&taskkill /f /im sav*&&taskkill /f /im fd*&&taskkill /f /im microsoft*&&net stop MSSQLFDLauncher&&net stop MSSQLServerOLAPService&&net stop ReportServer2⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\sc.exesc delete MsDtsServer1003⤵
- Launches sc.exe
PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵PID:1520
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2552