Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 10:01
Behavioral task
behavioral1
Sample
medusa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
medusa.exe
Resource
win10v2004-20221111-en
General
-
Target
medusa.exe
-
Size
719KB
-
MD5
8474039d83805eb7b447325c3a8d1ebb
-
SHA1
a07d537f4253745a087709a9a07c449f84deed8d
-
SHA256
b2493a580153291b69ca23190d00a00b1220cd0aadf469b3974fdaa726516649
-
SHA512
3272091bbf123ba5e1592e8b2bd7740cddcb174fa158bc6980b25ee61d92387e94a25284736253f83a6eea78b427f6717e888e843db9d7759cfe9a7676576438
-
SSDEEP
12288:q4UOTYQivI2qZ7aSgLwkFVpzUvest4ZEbjJLuhJVoM7SPd:bRTYVQ2qZ7aSgLwuVfstRJL6YM6
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 6 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\medusa.exe family_medusalocker C:\Users\Admin\AppData\Local\Temp\3582-490\medusa.exe family_medusalocker C:\Users\Admin\AppData\Local\Temp\3582-490\medusa.exe family_medusalocker C:\Users\Admin\AppData\Roaming\svhost.exe family_medusalocker \Users\Admin\AppData\Roaming\svhost.exe family_medusalocker C:\Users\Admin\AppData\Roaming\svhost.exe family_medusalocker -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
medusa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" medusa.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Processes:
medusa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
medusa.exesvhost.exepid process 1888 medusa.exe 904 svhost.exe -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
medusa.exedescription ioc process File renamed C:\Users\Admin\Pictures\RenameAdd.tiff => C:\Users\Admin\Pictures\RenameAdd.tiff.ReadInstructions medusa.exe File renamed C:\Users\Admin\Pictures\SkipDebug.tif => C:\Users\Admin\Pictures\SkipDebug.tif.ReadInstructions medusa.exe File renamed C:\Users\Admin\Pictures\SuspendShow.png => C:\Users\Admin\Pictures\SuspendShow.png.ReadInstructions medusa.exe File renamed C:\Users\Admin\Pictures\UnregisterImport.png => C:\Users\Admin\Pictures\UnregisterImport.png.ReadInstructions medusa.exe File opened for modification C:\Users\Admin\Pictures\DenyConvert.tiff medusa.exe File renamed C:\Users\Admin\Pictures\DenyConvert.tiff => C:\Users\Admin\Pictures\DenyConvert.tiff.ReadInstructions medusa.exe File renamed C:\Users\Admin\Pictures\InvokeReceive.png => C:\Users\Admin\Pictures\InvokeReceive.png.ReadInstructions medusa.exe File opened for modification C:\Users\Admin\Pictures\RenameAdd.tiff medusa.exe File renamed C:\Users\Admin\Pictures\WaitMove.raw => C:\Users\Admin\Pictures\WaitMove.raw.ReadInstructions medusa.exe File renamed C:\Users\Admin\Pictures\CloseUnblock.crw => C:\Users\Admin\Pictures\CloseUnblock.crw.ReadInstructions medusa.exe File renamed C:\Users\Admin\Pictures\HideGrant.crw => C:\Users\Admin\Pictures\HideGrant.crw.ReadInstructions medusa.exe File renamed C:\Users\Admin\Pictures\UseAssert.crw => C:\Users\Admin\Pictures\UseAssert.crw.ReadInstructions medusa.exe -
Loads dropped DLL 3 IoCs
Processes:
medusa.exepid process 1948 medusa.exe 1948 medusa.exe 1948 medusa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
medusa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
medusa.exedescription ioc process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-2292972927-2705560509-2768824231-1000\desktop.ini medusa.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
medusa.exedescription ioc process File opened (read-only) \??\N: medusa.exe File opened (read-only) \??\P: medusa.exe File opened (read-only) \??\T: medusa.exe File opened (read-only) \??\Y: medusa.exe File opened (read-only) \??\H: medusa.exe File opened (read-only) \??\K: medusa.exe File opened (read-only) \??\F: medusa.exe File opened (read-only) \??\L: medusa.exe File opened (read-only) \??\M: medusa.exe File opened (read-only) \??\U: medusa.exe File opened (read-only) \??\W: medusa.exe File opened (read-only) \??\Z: medusa.exe File opened (read-only) \??\B: medusa.exe File opened (read-only) \??\E: medusa.exe File opened (read-only) \??\I: medusa.exe File opened (read-only) \??\J: medusa.exe File opened (read-only) \??\R: medusa.exe File opened (read-only) \??\S: medusa.exe File opened (read-only) \??\V: medusa.exe File opened (read-only) \??\X: medusa.exe File opened (read-only) \??\A: medusa.exe File opened (read-only) \??\G: medusa.exe File opened (read-only) \??\O: medusa.exe File opened (read-only) \??\Q: medusa.exe -
Drops file in Program Files directory 64 IoCs
Processes:
medusa.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE medusa.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe medusa.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE medusa.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE medusa.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe medusa.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE medusa.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe medusa.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe medusa.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE medusa.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe medusa.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe medusa.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE medusa.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe medusa.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe medusa.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE medusa.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE medusa.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE medusa.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe medusa.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE medusa.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE medusa.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE medusa.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe medusa.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe medusa.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE medusa.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE medusa.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE medusa.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE medusa.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE medusa.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE medusa.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe medusa.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE medusa.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE medusa.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE medusa.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe medusa.exe -
Drops file in Windows directory 1 IoCs
Processes:
medusa.exedescription ioc process File opened for modification C:\Windows\svchost.com medusa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 1348 vssadmin.exe 1688 vssadmin.exe 600 vssadmin.exe -
Modifies registry class 1 IoCs
Processes:
medusa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" medusa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
medusa.exepid process 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe 1888 medusa.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
vssvc.exewmic.exewmic.exewmic.exedescription pid process Token: SeBackupPrivilege 700 vssvc.exe Token: SeRestorePrivilege 700 vssvc.exe Token: SeAuditPrivilege 700 vssvc.exe Token: SeIncreaseQuotaPrivilege 848 wmic.exe Token: SeSecurityPrivilege 848 wmic.exe Token: SeTakeOwnershipPrivilege 848 wmic.exe Token: SeLoadDriverPrivilege 848 wmic.exe Token: SeSystemProfilePrivilege 848 wmic.exe Token: SeSystemtimePrivilege 848 wmic.exe Token: SeProfSingleProcessPrivilege 848 wmic.exe Token: SeIncBasePriorityPrivilege 848 wmic.exe Token: SeCreatePagefilePrivilege 848 wmic.exe Token: SeBackupPrivilege 848 wmic.exe Token: SeRestorePrivilege 848 wmic.exe Token: SeShutdownPrivilege 848 wmic.exe Token: SeDebugPrivilege 848 wmic.exe Token: SeSystemEnvironmentPrivilege 848 wmic.exe Token: SeRemoteShutdownPrivilege 848 wmic.exe Token: SeUndockPrivilege 848 wmic.exe Token: SeManageVolumePrivilege 848 wmic.exe Token: 33 848 wmic.exe Token: 34 848 wmic.exe Token: 35 848 wmic.exe Token: SeIncreaseQuotaPrivilege 1044 wmic.exe Token: SeSecurityPrivilege 1044 wmic.exe Token: SeTakeOwnershipPrivilege 1044 wmic.exe Token: SeLoadDriverPrivilege 1044 wmic.exe Token: SeSystemProfilePrivilege 1044 wmic.exe Token: SeSystemtimePrivilege 1044 wmic.exe Token: SeProfSingleProcessPrivilege 1044 wmic.exe Token: SeIncBasePriorityPrivilege 1044 wmic.exe Token: SeCreatePagefilePrivilege 1044 wmic.exe Token: SeBackupPrivilege 1044 wmic.exe Token: SeRestorePrivilege 1044 wmic.exe Token: SeShutdownPrivilege 1044 wmic.exe Token: SeDebugPrivilege 1044 wmic.exe Token: SeSystemEnvironmentPrivilege 1044 wmic.exe Token: SeRemoteShutdownPrivilege 1044 wmic.exe Token: SeUndockPrivilege 1044 wmic.exe Token: SeManageVolumePrivilege 1044 wmic.exe Token: 33 1044 wmic.exe Token: 34 1044 wmic.exe Token: 35 1044 wmic.exe Token: SeIncreaseQuotaPrivilege 284 wmic.exe Token: SeSecurityPrivilege 284 wmic.exe Token: SeTakeOwnershipPrivilege 284 wmic.exe Token: SeLoadDriverPrivilege 284 wmic.exe Token: SeSystemProfilePrivilege 284 wmic.exe Token: SeSystemtimePrivilege 284 wmic.exe Token: SeProfSingleProcessPrivilege 284 wmic.exe Token: SeIncBasePriorityPrivilege 284 wmic.exe Token: SeCreatePagefilePrivilege 284 wmic.exe Token: SeBackupPrivilege 284 wmic.exe Token: SeRestorePrivilege 284 wmic.exe Token: SeShutdownPrivilege 284 wmic.exe Token: SeDebugPrivilege 284 wmic.exe Token: SeSystemEnvironmentPrivilege 284 wmic.exe Token: SeRemoteShutdownPrivilege 284 wmic.exe Token: SeUndockPrivilege 284 wmic.exe Token: SeManageVolumePrivilege 284 wmic.exe Token: 33 284 wmic.exe Token: 34 284 wmic.exe Token: 35 284 wmic.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
medusa.exemedusa.exetaskeng.exedescription pid process target process PID 1948 wrote to memory of 1888 1948 medusa.exe medusa.exe PID 1948 wrote to memory of 1888 1948 medusa.exe medusa.exe PID 1948 wrote to memory of 1888 1948 medusa.exe medusa.exe PID 1948 wrote to memory of 1888 1948 medusa.exe medusa.exe PID 1888 wrote to memory of 1348 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 1348 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 1348 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 1348 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 848 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 848 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 848 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 848 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 1688 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 1688 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 1688 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 1688 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 1044 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 1044 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 1044 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 1044 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 600 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 600 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 600 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 600 1888 medusa.exe vssadmin.exe PID 1888 wrote to memory of 284 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 284 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 284 1888 medusa.exe wmic.exe PID 1888 wrote to memory of 284 1888 medusa.exe wmic.exe PID 1384 wrote to memory of 904 1384 taskeng.exe svhost.exe PID 1384 wrote to memory of 904 1384 taskeng.exe svhost.exe PID 1384 wrote to memory of 904 1384 taskeng.exe svhost.exe PID 1384 wrote to memory of 904 1384 taskeng.exe svhost.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
medusa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" medusa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\medusa.exe"C:\Users\Admin\AppData\Local\Temp\medusa.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\medusa.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\medusa.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1888 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1348
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1688
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:600
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:284
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:700
-
C:\Windows\system32\taskeng.exetaskeng.exe {3CE7722E-98D6-4509-AACB-4CB8D9A0F9D7} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
PID:904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864KB
MD52c1f43649ea7e7bb1c46eba33f38b085
SHA1b0a514764ad8d5dba68e509075f4b84e6b38fcd0
SHA256436d673b1784f0fc5f66b1b6ea03112997f7b629422955a5d7465c1788a8042d
SHA5129638bdeabc285afd3fd1e6cba8b362811fe5cc0a7276a4c12aeb8af65011530b050f7e89af4dda84fff0dcfeb52613a9815d55dea8af347dcedd7765f591b60e
-
Filesize
678KB
MD55aa0a571567f8437556e9b00ae5a3532
SHA145377cb152832c9112db7909219fa87a6e760aae
SHA25673549f6017ad04e475e40e9d306b3e042d080843d8e7c029a5bb6b8ab7e34432
SHA512d320fecef75b4514b9cf154d41c3cc03e2cd8f6bf15ff0d7c97398127c0728cf0b24e5a46435573d38b384b1515876070f28daa7d37e81de10d1db2b27ae51ec
-
Filesize
678KB
MD55aa0a571567f8437556e9b00ae5a3532
SHA145377cb152832c9112db7909219fa87a6e760aae
SHA25673549f6017ad04e475e40e9d306b3e042d080843d8e7c029a5bb6b8ab7e34432
SHA512d320fecef75b4514b9cf154d41c3cc03e2cd8f6bf15ff0d7c97398127c0728cf0b24e5a46435573d38b384b1515876070f28daa7d37e81de10d1db2b27ae51ec
-
Filesize
678KB
MD55aa0a571567f8437556e9b00ae5a3532
SHA145377cb152832c9112db7909219fa87a6e760aae
SHA25673549f6017ad04e475e40e9d306b3e042d080843d8e7c029a5bb6b8ab7e34432
SHA512d320fecef75b4514b9cf154d41c3cc03e2cd8f6bf15ff0d7c97398127c0728cf0b24e5a46435573d38b384b1515876070f28daa7d37e81de10d1db2b27ae51ec
-
Filesize
678KB
MD55aa0a571567f8437556e9b00ae5a3532
SHA145377cb152832c9112db7909219fa87a6e760aae
SHA25673549f6017ad04e475e40e9d306b3e042d080843d8e7c029a5bb6b8ab7e34432
SHA512d320fecef75b4514b9cf154d41c3cc03e2cd8f6bf15ff0d7c97398127c0728cf0b24e5a46435573d38b384b1515876070f28daa7d37e81de10d1db2b27ae51ec
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
678KB
MD55aa0a571567f8437556e9b00ae5a3532
SHA145377cb152832c9112db7909219fa87a6e760aae
SHA25673549f6017ad04e475e40e9d306b3e042d080843d8e7c029a5bb6b8ab7e34432
SHA512d320fecef75b4514b9cf154d41c3cc03e2cd8f6bf15ff0d7c97398127c0728cf0b24e5a46435573d38b384b1515876070f28daa7d37e81de10d1db2b27ae51ec
-
Filesize
678KB
MD55aa0a571567f8437556e9b00ae5a3532
SHA145377cb152832c9112db7909219fa87a6e760aae
SHA25673549f6017ad04e475e40e9d306b3e042d080843d8e7c029a5bb6b8ab7e34432
SHA512d320fecef75b4514b9cf154d41c3cc03e2cd8f6bf15ff0d7c97398127c0728cf0b24e5a46435573d38b384b1515876070f28daa7d37e81de10d1db2b27ae51ec