Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 18:04
Behavioral task
behavioral1
Sample
996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe
Resource
win10v2004-20220901-en
General
-
Target
996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe
-
Size
82KB
-
MD5
d0fab02106121f74a3b1a436ef2795b0
-
SHA1
19ccb8075c36ed4eafa3d2d59654918d4e510140
-
SHA256
996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c
-
SHA512
710118197ff280d5ddfbb02dc29d013ad8014efbe4a474d405df6655f3cdd7ca4b65ee56d9f2042efb78b9f8d7e92696bc7d55b79f9d3b547e48baff121a470c
-
SSDEEP
1536:JxqjQ+P04wsmJCA155S1FKnDtkuImiwiDY4sXn:sr85CAb5S1FqtkuImAYvn
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\+README-WARNING+.txt
Signatures
-
MAKOP ransomware payload 4 IoCs
resource yara_rule behavioral1/files/0x000b000000012301-55.dat family_makop behavioral1/files/0x000b000000012301-56.dat family_makop behavioral1/files/0x000b000000012301-58.dat family_makop behavioral1/files/0x000b000000012301-60.dat family_makop -
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
pid Process 1076 wbadmin.exe -
Executes dropped EXE 2 IoCs
pid Process 1120 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 2028 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe -
Loads dropped DLL 3 IoCs
pid Process 1444 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 1444 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 1444 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipRes.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkObj.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IpsMigrationPlugin.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IpsMigrationPlugin.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InputPersonalization.exe.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipBand.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IPSEventLogMsg.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\descript.ion 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkObj.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresmlm.dat 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkWatson.exe.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1920 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1120 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 880 vssvc.exe Token: SeRestorePrivilege 880 vssvc.exe Token: SeAuditPrivilege 880 vssvc.exe Token: SeBackupPrivilege 784 wbengine.exe Token: SeRestorePrivilege 784 wbengine.exe Token: SeSecurityPrivilege 784 wbengine.exe Token: SeIncreaseQuotaPrivilege 2024 WMIC.exe Token: SeSecurityPrivilege 2024 WMIC.exe Token: SeTakeOwnershipPrivilege 2024 WMIC.exe Token: SeLoadDriverPrivilege 2024 WMIC.exe Token: SeSystemProfilePrivilege 2024 WMIC.exe Token: SeSystemtimePrivilege 2024 WMIC.exe Token: SeProfSingleProcessPrivilege 2024 WMIC.exe Token: SeIncBasePriorityPrivilege 2024 WMIC.exe Token: SeCreatePagefilePrivilege 2024 WMIC.exe Token: SeBackupPrivilege 2024 WMIC.exe Token: SeRestorePrivilege 2024 WMIC.exe Token: SeShutdownPrivilege 2024 WMIC.exe Token: SeDebugPrivilege 2024 WMIC.exe Token: SeSystemEnvironmentPrivilege 2024 WMIC.exe Token: SeRemoteShutdownPrivilege 2024 WMIC.exe Token: SeUndockPrivilege 2024 WMIC.exe Token: SeManageVolumePrivilege 2024 WMIC.exe Token: 33 2024 WMIC.exe Token: 34 2024 WMIC.exe Token: 35 2024 WMIC.exe Token: SeIncreaseQuotaPrivilege 2024 WMIC.exe Token: SeSecurityPrivilege 2024 WMIC.exe Token: SeTakeOwnershipPrivilege 2024 WMIC.exe Token: SeLoadDriverPrivilege 2024 WMIC.exe Token: SeSystemProfilePrivilege 2024 WMIC.exe Token: SeSystemtimePrivilege 2024 WMIC.exe Token: SeProfSingleProcessPrivilege 2024 WMIC.exe Token: SeIncBasePriorityPrivilege 2024 WMIC.exe Token: SeCreatePagefilePrivilege 2024 WMIC.exe Token: SeBackupPrivilege 2024 WMIC.exe Token: SeRestorePrivilege 2024 WMIC.exe Token: SeShutdownPrivilege 2024 WMIC.exe Token: SeDebugPrivilege 2024 WMIC.exe Token: SeSystemEnvironmentPrivilege 2024 WMIC.exe Token: SeRemoteShutdownPrivilege 2024 WMIC.exe Token: SeUndockPrivilege 2024 WMIC.exe Token: SeManageVolumePrivilege 2024 WMIC.exe Token: 33 2024 WMIC.exe Token: 34 2024 WMIC.exe Token: 35 2024 WMIC.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1120 1444 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 27 PID 1444 wrote to memory of 1120 1444 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 27 PID 1444 wrote to memory of 1120 1444 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 27 PID 1444 wrote to memory of 1120 1444 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 27 PID 1120 wrote to memory of 1724 1120 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 29 PID 1120 wrote to memory of 1724 1120 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 29 PID 1120 wrote to memory of 1724 1120 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 29 PID 1120 wrote to memory of 1724 1120 996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe 29 PID 1724 wrote to memory of 1920 1724 cmd.exe 31 PID 1724 wrote to memory of 1920 1724 cmd.exe 31 PID 1724 wrote to memory of 1920 1724 cmd.exe 31 PID 1724 wrote to memory of 1076 1724 cmd.exe 34 PID 1724 wrote to memory of 1076 1724 cmd.exe 34 PID 1724 wrote to memory of 1076 1724 cmd.exe 34 PID 1724 wrote to memory of 2024 1724 cmd.exe 38 PID 1724 wrote to memory of 2024 1724 cmd.exe 38 PID 1724 wrote to memory of 2024 1724 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe"C:\Users\Admin\AppData\Local\Temp\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe" n11203⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1920
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1076
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:880
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:784
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1168
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1800
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe
Filesize42KB
MD565b228bf3272e41025480c9780f7cdd3
SHA1e29ba9d7767fbdf686e231701b6b3a329f1a0484
SHA25673772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
SHA512e0e0ef81048f4053942c69c9a8192b644962bdd092498f027598377249f283925f3fb60987feafbf46ae4cced229d34fa0152c7b2cbde1dff4fe3beece744d54
-
C:\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe
Filesize42KB
MD565b228bf3272e41025480c9780f7cdd3
SHA1e29ba9d7767fbdf686e231701b6b3a329f1a0484
SHA25673772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
SHA512e0e0ef81048f4053942c69c9a8192b644962bdd092498f027598377249f283925f3fb60987feafbf46ae4cced229d34fa0152c7b2cbde1dff4fe3beece744d54
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe
Filesize42KB
MD565b228bf3272e41025480c9780f7cdd3
SHA1e29ba9d7767fbdf686e231701b6b3a329f1a0484
SHA25673772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
SHA512e0e0ef81048f4053942c69c9a8192b644962bdd092498f027598377249f283925f3fb60987feafbf46ae4cced229d34fa0152c7b2cbde1dff4fe3beece744d54
-
\Users\Admin\AppData\Local\Temp\3582-490\996a8019a8deb5f1636e0236d07ba4b17d1cd50aff3ede5dd2be736d66d6160c.exe
Filesize42KB
MD565b228bf3272e41025480c9780f7cdd3
SHA1e29ba9d7767fbdf686e231701b6b3a329f1a0484
SHA25673772c5eaaee1322aa761ccd9f261e41532461ba927e8c6f2d96e52a1e6606d0
SHA512e0e0ef81048f4053942c69c9a8192b644962bdd092498f027598377249f283925f3fb60987feafbf46ae4cced229d34fa0152c7b2cbde1dff4fe3beece744d54