Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 05:05
Static task
static1
Behavioral task
behavioral1
Sample
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
Resource
win10v2004-20220812-en
General
-
Target
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
-
Size
301KB
-
MD5
2dc0dad1939edfdf997525bac94cdc21
-
SHA1
e3e398a3eed8ffc0266dbe37c396909eee150cf4
-
SHA256
c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801
-
SHA512
bfab68408e2812a00a114372fc51704ebaa232f63aeb3564769d10af5895957b0bb8a1aefe8ffe09d92fc38e96b807c02dedc9a08d2beda5822ad4ec3d7cefda
-
SSDEEP
6144:DRBvjMHJAGRdMSv+8nMmSIis4WKAra+xZp3AaEHhwnR:lBvjMHJANkMm9v4WKUJEHhwnR
Malware Config
Extracted
\??\A:\!-Recovery_Instructions-!.html
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertToAssert.png => C:\Users\Admin\Pictures\ConvertToAssert.png.bulwark4 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File renamed C:\Users\Admin\Pictures\OpenGrant.crw => C:\Users\Admin\Pictures\OpenGrant.crw.bulwark4 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe -
Overwrites deleted data with Cipher tool 1 TTPs
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\K: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\E: cipher.exe File opened (read-only) \??\G: cipher.exe File opened (read-only) \??\L: cipher.exe File opened (read-only) \??\K: cipher.exe File opened (read-only) \??\W: cipher.exe File opened (read-only) \??\B: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\X: cipher.exe File opened (read-only) \??\G: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Q: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\B: cipher.exe File opened (read-only) \??\H: cipher.exe File opened (read-only) \??\T: cipher.exe File opened (read-only) \??\A: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\U: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\X: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\U: cipher.exe File opened (read-only) \??\M: cipher.exe File opened (read-only) \??\I: cipher.exe File opened (read-only) \??\M: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\J: cipher.exe File opened (read-only) \??\R: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\S: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Y: cipher.exe File opened (read-only) \??\S: cipher.exe File opened (read-only) \??\A: cipher.exe File opened (read-only) \??\Z: cipher.exe File opened (read-only) \??\P: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\R: cipher.exe File opened (read-only) \??\O: cipher.exe File opened (read-only) \??\N: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\H: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\L: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\O: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\W: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Y: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\Z: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\N: cipher.exe File opened (read-only) \??\E: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\V: cipher.exe File opened (read-only) \??\J: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\T: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\V: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe File opened (read-only) \??\F: cipher.exe File opened (read-only) \??\P: cipher.exe File opened (read-only) \??\Q: cipher.exe File opened (read-only) \??\I: c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1640 1200 WerFault.exe 16 -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 284 vssadmin.exe -
Kills process with taskkill 16 IoCs
pid Process 1644 taskkill.exe 664 taskkill.exe 768 taskkill.exe 1988 taskkill.exe 1908 taskkill.exe 1648 taskkill.exe 1752 taskkill.exe 780 taskkill.exe 1008 taskkill.exe 1260 taskkill.exe 1460 taskkill.exe 1168 taskkill.exe 2028 taskkill.exe 1796 taskkill.exe 1632 taskkill.exe 2012 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 2012 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe Token: SeDebugPrivilege 1644 taskkill.exe Token: SeDebugPrivilege 1260 taskkill.exe Token: SeDebugPrivilege 1460 taskkill.exe Token: SeDebugPrivilege 1648 taskkill.exe Token: SeDebugPrivilege 1168 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 1796 taskkill.exe Token: SeDebugPrivilege 664 taskkill.exe Token: SeDebugPrivilege 768 taskkill.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 780 taskkill.exe Token: SeDebugPrivilege 1008 taskkill.exe Token: SeBackupPrivilege 1712 vssvc.exe Token: SeRestorePrivilege 1712 vssvc.exe Token: SeAuditPrivilege 1712 vssvc.exe Token: SeIncreaseQuotaPrivilege 1472 wmic.exe Token: SeSecurityPrivilege 1472 wmic.exe Token: SeTakeOwnershipPrivilege 1472 wmic.exe Token: SeLoadDriverPrivilege 1472 wmic.exe Token: SeSystemProfilePrivilege 1472 wmic.exe Token: SeSystemtimePrivilege 1472 wmic.exe Token: SeProfSingleProcessPrivilege 1472 wmic.exe Token: SeIncBasePriorityPrivilege 1472 wmic.exe Token: SeCreatePagefilePrivilege 1472 wmic.exe Token: SeBackupPrivilege 1472 wmic.exe Token: SeRestorePrivilege 1472 wmic.exe Token: SeShutdownPrivilege 1472 wmic.exe Token: SeDebugPrivilege 1472 wmic.exe Token: SeSystemEnvironmentPrivilege 1472 wmic.exe Token: SeRemoteShutdownPrivilege 1472 wmic.exe Token: SeUndockPrivilege 1472 wmic.exe Token: SeManageVolumePrivilege 1472 wmic.exe Token: 33 1472 wmic.exe Token: 34 1472 wmic.exe Token: 35 1472 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2012 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 28 PID 1512 wrote to memory of 2012 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 28 PID 1512 wrote to memory of 2012 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 28 PID 1512 wrote to memory of 2012 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 28 PID 1512 wrote to memory of 1908 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 31 PID 1512 wrote to memory of 1908 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 31 PID 1512 wrote to memory of 1908 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 31 PID 1512 wrote to memory of 1908 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 31 PID 1512 wrote to memory of 1644 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 33 PID 1512 wrote to memory of 1644 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 33 PID 1512 wrote to memory of 1644 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 33 PID 1512 wrote to memory of 1644 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 33 PID 1512 wrote to memory of 1260 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 35 PID 1512 wrote to memory of 1260 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 35 PID 1512 wrote to memory of 1260 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 35 PID 1512 wrote to memory of 1260 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 35 PID 1512 wrote to memory of 1460 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 37 PID 1512 wrote to memory of 1460 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 37 PID 1512 wrote to memory of 1460 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 37 PID 1512 wrote to memory of 1460 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 37 PID 1512 wrote to memory of 1648 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 39 PID 1512 wrote to memory of 1648 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 39 PID 1512 wrote to memory of 1648 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 39 PID 1512 wrote to memory of 1648 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 39 PID 1512 wrote to memory of 1168 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 41 PID 1512 wrote to memory of 1168 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 41 PID 1512 wrote to memory of 1168 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 41 PID 1512 wrote to memory of 1168 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 41 PID 1512 wrote to memory of 2028 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 43 PID 1512 wrote to memory of 2028 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 43 PID 1512 wrote to memory of 2028 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 43 PID 1512 wrote to memory of 2028 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 43 PID 1512 wrote to memory of 1796 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 45 PID 1512 wrote to memory of 1796 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 45 PID 1512 wrote to memory of 1796 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 45 PID 1512 wrote to memory of 1796 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 45 PID 1512 wrote to memory of 664 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 47 PID 1512 wrote to memory of 664 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 47 PID 1512 wrote to memory of 664 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 47 PID 1512 wrote to memory of 664 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 47 PID 1512 wrote to memory of 768 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 49 PID 1512 wrote to memory of 768 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 49 PID 1512 wrote to memory of 768 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 49 PID 1512 wrote to memory of 768 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 49 PID 1512 wrote to memory of 1632 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 51 PID 1512 wrote to memory of 1632 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 51 PID 1512 wrote to memory of 1632 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 51 PID 1512 wrote to memory of 1632 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 51 PID 1512 wrote to memory of 1988 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 53 PID 1512 wrote to memory of 1988 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 53 PID 1512 wrote to memory of 1988 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 53 PID 1512 wrote to memory of 1988 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 53 PID 1512 wrote to memory of 1752 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 55 PID 1512 wrote to memory of 1752 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 55 PID 1512 wrote to memory of 1752 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 55 PID 1512 wrote to memory of 1752 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 55 PID 1512 wrote to memory of 780 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 57 PID 1512 wrote to memory of 780 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 57 PID 1512 wrote to memory of 780 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 57 PID 1512 wrote to memory of 780 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 57 PID 1512 wrote to memory of 1008 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 59 PID 1512 wrote to memory of 1008 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 59 PID 1512 wrote to memory of 1008 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 59 PID 1512 wrote to memory of 1008 1512 c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe 59 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe"C:\Users\Admin\AppData\Local\Temp\c0c726a23111c220d022fcd01a85f9788249e42baece03f83b6059170453b801.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1512 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlbrowser.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlwriter.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlservr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im msmdsrv.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im MsDtsSrvr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlceip.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im fdlauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im Ssms.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im SQLAGENT.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im fdhost.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im fdlauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im sqlservr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im ReportingServicesService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im msftesql.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im pg_ctl.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im postgres.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper1002⤵PID:272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper1003⤵PID:268
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$ISARS2⤵PID:1164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$ISARS3⤵PID:1868
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$MSFW2⤵PID:1628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$MSFW3⤵PID:552
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$ISARS2⤵PID:1916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$ISARS3⤵PID:1784
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$MSFW2⤵PID:432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$MSFW3⤵PID:1072
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser2⤵PID:1796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser3⤵PID:1776
-
-
-
C:\Windows\SysWOW64\net.exenet stop ReportServer$ISARS2⤵PID:1616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$ISARS3⤵PID:1520
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter2⤵PID:1428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter3⤵PID:1496
-
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:284
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\cipher.execipher /w:A:2⤵
- Enumerates connected drives
PID:2040
-
-
C:\Windows\SysWOW64\cipher.execipher /w:J:2⤵
- Enumerates connected drives
PID:1072
-
-
C:\Windows\SysWOW64\cipher.execipher /w:H:2⤵
- Enumerates connected drives
PID:532
-
-
C:\Windows\SysWOW64\cipher.execipher /w:E:2⤵
- Enumerates connected drives
PID:1576
-
-
C:\Windows\SysWOW64\cipher.execipher /w:G:2⤵
- Enumerates connected drives
PID:1776
-
-
C:\Windows\SysWOW64\cipher.execipher /w:N:2⤵
- Enumerates connected drives
PID:1684
-
-
C:\Windows\SysWOW64\cipher.execipher /w:F:2⤵
- Enumerates connected drives
PID:1688
-
-
C:\Windows\SysWOW64\cipher.execipher /w:I:2⤵
- Enumerates connected drives
PID:864
-
-
C:\Windows\SysWOW64\cipher.execipher /w:M:2⤵
- Enumerates connected drives
PID:1636
-
-
C:\Windows\SysWOW64\cipher.execipher /w:T:2⤵
- Enumerates connected drives
PID:1616
-
-
C:\Windows\SysWOW64\cipher.execipher /w:K:2⤵
- Enumerates connected drives
PID:1992
-
-
C:\Windows\SysWOW64\cipher.execipher /w:X:2⤵
- Enumerates connected drives
PID:2016
-
-
C:\Windows\SysWOW64\cipher.execipher /w:Z:2⤵
- Enumerates connected drives
PID:780
-
-
C:\Windows\SysWOW64\cipher.execipher /w:S:2⤵
- Enumerates connected drives
PID:1968
-
-
C:\Windows\SysWOW64\cipher.execipher /w:W:2⤵
- Enumerates connected drives
PID:364
-
-
C:\Windows\SysWOW64\cipher.execipher /w:Y:2⤵
- Enumerates connected drives
PID:2020
-
-
C:\Windows\SysWOW64\cipher.execipher /w:O:2⤵
- Enumerates connected drives
PID:1556
-
-
C:\Windows\SysWOW64\cipher.execipher /w:U:2⤵
- Enumerates connected drives
PID:1412
-
-
C:\Windows\SysWOW64\cipher.execipher /w:V:2⤵
- Enumerates connected drives
PID:1932
-
-
C:\Windows\SysWOW64\cipher.execipher /w:R:2⤵
- Enumerates connected drives
PID:548
-
-
C:\Windows\SysWOW64\cipher.execipher /w:P:2⤵
- Enumerates connected drives
PID:1508
-
-
C:\Windows\SysWOW64\cipher.execipher /w:C:2⤵PID:1652
-
-
C:\Windows\SysWOW64\cipher.execipher /w:L:2⤵
- Enumerates connected drives
PID:1524
-
-
C:\Windows\SysWOW64\cipher.execipher /w:Q:2⤵
- Enumerates connected drives
PID:664
-
-
C:\Windows\SysWOW64\cipher.execipher /w:B:2⤵
- Enumerates connected drives
PID:2036
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1200 -s 18521⤵
- Program crash
PID:1640