Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2022 07:29
Behavioral task
behavioral1
Sample
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe
Resource
win10v2004-20220812-en
General
-
Target
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe
-
Size
215KB
-
MD5
a58d761d66e5045c1b5d10b823b90afe
-
SHA1
1fd48eabec99f127231deab1c36abd640e93f226
-
SHA256
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501
-
SHA512
4ff1a1229c6bbb1a54e52d79486cbb66b4d62ee56d5161b96805dd5f2e386100db3cc49245e32aab7a0b2e0542cc1d6c96e42fe9c7f982fa70aef7b1f7d2a94e
-
SSDEEP
6144:PyJE1yd7WEJmcyf70PWna4DQFu/U3buRKlemZ9DnGAevIX+:PU/d7WRvIPWa4DQFu/U3buRKlemZ9DnI
Malware Config
Extracted
C:\ALL YOUR FILES ARE ENCRYPTED.txt
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\T: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\H: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\G: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\Z: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\W: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\R: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\O: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\M: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\I: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\F: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\E: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\V: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\S: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\Q: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\P: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\L: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\A: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\B: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\X: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\U: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\N: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\K: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\J: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.preferences_3.5.200.v20140224-1527.jar 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\URLREDIR.DLL 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\vlc.mo.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\vlc.mo 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libaudiobargraph_a_plugin.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GKWord.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\WindowsApps\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fonts\LucidaSansDemiBold.ttf 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial-ul-oob.xrm-ms.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTrial-ppd.xrm-ms.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_MAK-ul-oob.xrm-ms.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ul-phn.xrm-ms.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\GRINTL32.DLL 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-addtotable-dark.png 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SyncFusion.Grid.Windows.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_mosaic_bridge_plugin.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\7z.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_ja.jar 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ExcelNaiveBayesCommandRanker.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Portal\1033\PortalConnect.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_ja_4.4.0.v20140623020002.jar.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Grace-ppd.xrm-ms 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\+Connect to New Data Source.odc 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\skin.dtd 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\powerpointmui.msi.16.en-us.tree.dat 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\api-ms-win-crt-process-l1-1-0.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\applet\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-explorer.xml.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_F_COL.HXK 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\MLASeventhEditionOfficeOnline.xsl 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\concrt140.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\PCHEALTH\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\Windows Sidebar\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\VideoLAN\VLC\locale\da\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\.sys 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\resources.jar.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_zh_CN.jar.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\TellMeExcel.nrr 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ul-phn.xrm-ms.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\POWERPNT_COL.HXT.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\api-ms-win-crt-private-l1-1-0.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\lcms.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_ja.properties.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_zh_4.4.0.v20140623020002.jar 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-pl.xrm-ms 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SyncFusion.Tools.Windows.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\VideoLAN\VLC\locale\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libxml_plugin.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_dirac_plugin.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcroppadd_plugin.dll.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-sendopts.xml 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_ja.jar.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms.bbd2.2D1-22D-A5B 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2316 WMIC.exe Token: SeSecurityPrivilege 2316 WMIC.exe Token: SeTakeOwnershipPrivilege 2316 WMIC.exe Token: SeLoadDriverPrivilege 2316 WMIC.exe Token: SeSystemProfilePrivilege 2316 WMIC.exe Token: SeSystemtimePrivilege 2316 WMIC.exe Token: SeProfSingleProcessPrivilege 2316 WMIC.exe Token: SeIncBasePriorityPrivilege 2316 WMIC.exe Token: SeCreatePagefilePrivilege 2316 WMIC.exe Token: SeBackupPrivilege 2316 WMIC.exe Token: SeRestorePrivilege 2316 WMIC.exe Token: SeShutdownPrivilege 2316 WMIC.exe Token: SeDebugPrivilege 2316 WMIC.exe Token: SeSystemEnvironmentPrivilege 2316 WMIC.exe Token: SeRemoteShutdownPrivilege 2316 WMIC.exe Token: SeUndockPrivilege 2316 WMIC.exe Token: SeManageVolumePrivilege 2316 WMIC.exe Token: 33 2316 WMIC.exe Token: 34 2316 WMIC.exe Token: 35 2316 WMIC.exe Token: 36 2316 WMIC.exe Token: SeIncreaseQuotaPrivilege 2868 WMIC.exe Token: SeSecurityPrivilege 2868 WMIC.exe Token: SeTakeOwnershipPrivilege 2868 WMIC.exe Token: SeLoadDriverPrivilege 2868 WMIC.exe Token: SeSystemProfilePrivilege 2868 WMIC.exe Token: SeSystemtimePrivilege 2868 WMIC.exe Token: SeProfSingleProcessPrivilege 2868 WMIC.exe Token: SeIncBasePriorityPrivilege 2868 WMIC.exe Token: SeCreatePagefilePrivilege 2868 WMIC.exe Token: SeBackupPrivilege 2868 WMIC.exe Token: SeRestorePrivilege 2868 WMIC.exe Token: SeShutdownPrivilege 2868 WMIC.exe Token: SeDebugPrivilege 2868 WMIC.exe Token: SeSystemEnvironmentPrivilege 2868 WMIC.exe Token: SeRemoteShutdownPrivilege 2868 WMIC.exe Token: SeUndockPrivilege 2868 WMIC.exe Token: SeManageVolumePrivilege 2868 WMIC.exe Token: 33 2868 WMIC.exe Token: 34 2868 WMIC.exe Token: 35 2868 WMIC.exe Token: 36 2868 WMIC.exe Token: SeIncreaseQuotaPrivilege 2316 WMIC.exe Token: SeSecurityPrivilege 2316 WMIC.exe Token: SeTakeOwnershipPrivilege 2316 WMIC.exe Token: SeLoadDriverPrivilege 2316 WMIC.exe Token: SeSystemProfilePrivilege 2316 WMIC.exe Token: SeSystemtimePrivilege 2316 WMIC.exe Token: SeProfSingleProcessPrivilege 2316 WMIC.exe Token: SeIncBasePriorityPrivilege 2316 WMIC.exe Token: SeCreatePagefilePrivilege 2316 WMIC.exe Token: SeBackupPrivilege 2316 WMIC.exe Token: SeRestorePrivilege 2316 WMIC.exe Token: SeShutdownPrivilege 2316 WMIC.exe Token: SeDebugPrivilege 2316 WMIC.exe Token: SeSystemEnvironmentPrivilege 2316 WMIC.exe Token: SeRemoteShutdownPrivilege 2316 WMIC.exe Token: SeUndockPrivilege 2316 WMIC.exe Token: SeManageVolumePrivilege 2316 WMIC.exe Token: 33 2316 WMIC.exe Token: 34 2316 WMIC.exe Token: 35 2316 WMIC.exe Token: 36 2316 WMIC.exe Token: SeIncreaseQuotaPrivilege 2868 WMIC.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3900 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 89 PID 4844 wrote to memory of 3900 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 89 PID 4844 wrote to memory of 3900 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 89 PID 4844 wrote to memory of 3728 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 90 PID 4844 wrote to memory of 3728 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 90 PID 4844 wrote to memory of 3728 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 90 PID 4844 wrote to memory of 3776 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 100 PID 4844 wrote to memory of 3776 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 100 PID 4844 wrote to memory of 3776 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 100 PID 4844 wrote to memory of 1944 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 97 PID 4844 wrote to memory of 1944 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 97 PID 4844 wrote to memory of 1944 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 97 PID 4844 wrote to memory of 1084 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 93 PID 4844 wrote to memory of 1084 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 93 PID 4844 wrote to memory of 1084 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 93 PID 4844 wrote to memory of 1908 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 96 PID 4844 wrote to memory of 1908 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 96 PID 4844 wrote to memory of 1908 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 96 PID 4844 wrote to memory of 2680 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 98 PID 4844 wrote to memory of 2680 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 98 PID 4844 wrote to memory of 2680 4844 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 98 PID 3900 wrote to memory of 2316 3900 cmd.exe 102 PID 3900 wrote to memory of 2316 3900 cmd.exe 102 PID 3900 wrote to memory of 2316 3900 cmd.exe 102 PID 1908 wrote to memory of 2868 1908 cmd.exe 103 PID 1908 wrote to memory of 2868 1908 cmd.exe 103 PID 1908 wrote to memory of 2868 1908 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe"C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete2⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵PID:3728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵PID:1084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe"C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe" -agent 02⤵
- Drops file in Program Files directory
PID:2680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:3776
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406B
MD5ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9