Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe
Resource
win10v2004-20220812-en
General
-
Target
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe
-
Size
41KB
-
MD5
ad29f77ee86ed9827158347befa8998d
-
SHA1
b3b380be84a7042884f1c9c9f14331faa65c51f2
-
SHA256
e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2
-
SHA512
57d1e4cbfab347a35ea5ed2fa1fc5bfb61c48fd8e2f0b0ee32fbc1bb8693715e15f075e203fb462e70cf2d73e30631f9f605dbf3fd46875d14f72912710065cc
-
SSDEEP
768:NSfdupUQ61pjmEcE1BezWNEEFCRhDAMtCLB+GEI:Odud61lmRBzl5A8CLv
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4880 created 4984 4880 svchost.exe 79 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 4052 wbadmin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe\"" e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\readme-warning.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\snmp.acl.template e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.artifact.repository.prefs e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\hprof-16.png e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_mac.css e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-visual_ja.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-ul-oob.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_Grace-ul-oob.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-pl.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\Client2019_eula.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\readme-warning.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.registry_3.5.400.v20140428-1507.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.webapp.nl_ja_4.4.0.v20140623020002.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-tabcontrol_zh_CN.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-lib-profiler-common.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\readme-warning.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0409-1000-0000000FF1CE.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_MAK-pl.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ppd.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jconsole.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.ui.ja_5.5.0.165303.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-windows_zh_CN.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-dialogs.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-modules-appui.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019DemoR_BypassTrial180-ul-oob.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ul-oob.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_ja_4.4.0.v20140623020002.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.wordmui.msi.16.en-us.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-oob.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial2-ppd.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Retail-ppd.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\readme-warning.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.httpcomponents.httpclient_4.2.6.v201311072007.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.text_3.9.1.v20140827-1810.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Riblet.eftx e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Retail-pl.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.forms.nl_ja_4.4.0.v20140623020002.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_zh_CN.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-autoupdate-ui.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-windows.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-utilities.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\VERSION.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-heapdump.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-attach.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ppd.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_ja_4.4.0.v20140623020002.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-modules-appui_zh_CN.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\org-netbeans-modules-profiler_visualvm.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jvm.hprof.txt e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-pl.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-pl.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-ppd.xrm-ms e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1616 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4984 e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe 4984 e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeTcbPrivilege 4880 svchost.exe Token: SeTcbPrivilege 4880 svchost.exe Token: SeBackupPrivilege 1588 vssvc.exe Token: SeRestorePrivilege 1588 vssvc.exe Token: SeAuditPrivilege 1588 vssvc.exe Token: SeBackupPrivilege 3996 wbengine.exe Token: SeRestorePrivilege 3996 wbengine.exe Token: SeSecurityPrivilege 3996 wbengine.exe Token: SeIncreaseQuotaPrivilege 5036 WMIC.exe Token: SeSecurityPrivilege 5036 WMIC.exe Token: SeTakeOwnershipPrivilege 5036 WMIC.exe Token: SeLoadDriverPrivilege 5036 WMIC.exe Token: SeSystemProfilePrivilege 5036 WMIC.exe Token: SeSystemtimePrivilege 5036 WMIC.exe Token: SeProfSingleProcessPrivilege 5036 WMIC.exe Token: SeIncBasePriorityPrivilege 5036 WMIC.exe Token: SeCreatePagefilePrivilege 5036 WMIC.exe Token: SeBackupPrivilege 5036 WMIC.exe Token: SeRestorePrivilege 5036 WMIC.exe Token: SeShutdownPrivilege 5036 WMIC.exe Token: SeDebugPrivilege 5036 WMIC.exe Token: SeSystemEnvironmentPrivilege 5036 WMIC.exe Token: SeRemoteShutdownPrivilege 5036 WMIC.exe Token: SeUndockPrivilege 5036 WMIC.exe Token: SeManageVolumePrivilege 5036 WMIC.exe Token: 33 5036 WMIC.exe Token: 34 5036 WMIC.exe Token: 35 5036 WMIC.exe Token: 36 5036 WMIC.exe Token: SeIncreaseQuotaPrivilege 5036 WMIC.exe Token: SeSecurityPrivilege 5036 WMIC.exe Token: SeTakeOwnershipPrivilege 5036 WMIC.exe Token: SeLoadDriverPrivilege 5036 WMIC.exe Token: SeSystemProfilePrivilege 5036 WMIC.exe Token: SeSystemtimePrivilege 5036 WMIC.exe Token: SeProfSingleProcessPrivilege 5036 WMIC.exe Token: SeIncBasePriorityPrivilege 5036 WMIC.exe Token: SeCreatePagefilePrivilege 5036 WMIC.exe Token: SeBackupPrivilege 5036 WMIC.exe Token: SeRestorePrivilege 5036 WMIC.exe Token: SeShutdownPrivilege 5036 WMIC.exe Token: SeDebugPrivilege 5036 WMIC.exe Token: SeSystemEnvironmentPrivilege 5036 WMIC.exe Token: SeRemoteShutdownPrivilege 5036 WMIC.exe Token: SeUndockPrivilege 5036 WMIC.exe Token: SeManageVolumePrivilege 5036 WMIC.exe Token: 33 5036 WMIC.exe Token: 34 5036 WMIC.exe Token: 35 5036 WMIC.exe Token: 36 5036 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4132 4880 svchost.exe 81 PID 4880 wrote to memory of 4132 4880 svchost.exe 81 PID 4880 wrote to memory of 4132 4880 svchost.exe 81 PID 4880 wrote to memory of 4132 4880 svchost.exe 81 PID 4880 wrote to memory of 4132 4880 svchost.exe 81 PID 4880 wrote to memory of 4132 4880 svchost.exe 81 PID 4880 wrote to memory of 4132 4880 svchost.exe 81 PID 4984 wrote to memory of 4248 4984 e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe 82 PID 4984 wrote to memory of 4248 4984 e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe 82 PID 4248 wrote to memory of 1616 4248 cmd.exe 84 PID 4248 wrote to memory of 1616 4248 cmd.exe 84 PID 4248 wrote to memory of 4052 4248 cmd.exe 87 PID 4248 wrote to memory of 4052 4248 cmd.exe 87 PID 4248 wrote to memory of 5036 4248 cmd.exe 91 PID 4248 wrote to memory of 5036 4248 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe"C:\Users\Admin\AppData\Local\Temp\e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe"C:\Users\Admin\AppData\Local\Temp\e4133986284c2640065ed2cc5798ee1751479732c169a8728f41536306a42ba2.exe" n49842⤵PID:4132
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1616
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:4052
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1964
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3740