Analysis
-
max time kernel
152s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 12:39
Behavioral task
behavioral1
Sample
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe
Resource
win10v2004-20220901-en
General
-
Target
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe
-
Size
215KB
-
MD5
a58d761d66e5045c1b5d10b823b90afe
-
SHA1
1fd48eabec99f127231deab1c36abd640e93f226
-
SHA256
0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501
-
SHA512
4ff1a1229c6bbb1a54e52d79486cbb66b4d62ee56d5161b96805dd5f2e386100db3cc49245e32aab7a0b2e0542cc1d6c96e42fe9c7f982fa70aef7b1f7d2a94e
-
SSDEEP
6144:PyJE1yd7WEJmcyf70PWna4DQFu/U3buRKlemZ9DnGAevIX+:PU/d7WRvIPWa4DQFu/U3buRKlemZ9DnI
Malware Config
Extracted
C:\ALL YOUR FILES ARE ENCRYPTED.txt
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\G: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\F: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\A: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\R: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\P: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\Q: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\L: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\B: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\X: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\V: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\O: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\K: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\J: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\Z: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\S: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\U: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\T: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\N: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\M: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\H: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\E: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\Y: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened (read-only) \??\W: 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\de-DE\WMM2CLIP.dll.mui 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DebugReceive.xlsm.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DisconnectConfirm.aiff.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\OmdBase.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\sonicsptransform.ax 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_SelectionSubpicture.png 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\License.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\SubmitRevoke.ex_.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\DVD Maker\ja-JP\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\OmdProject.dll.mui 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\cloud_Thumbnail.bmp 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\heart_glass_Thumbnail.bmp 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\OutRedo.vbs.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\TestClose.mp3 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_SelectionSubpicture.png 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\AddInstall.vdx 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circle_glass_Thumbnail.bmp 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_ButtonGraphic.png 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_plain_Thumbnail.bmp 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\readme.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\it-IT\DVDMaker.exe.mui 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_glass_Thumbnail.bmp 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\ALL YOUR FILES ARE ENCRYPTED.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt.bbd2.1E2-1AF-72A 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Pipeline.dll 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\en-US\DVDMaker.exe.mui 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1320 vssadmin.exe 800 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 368 WMIC.exe Token: SeSecurityPrivilege 368 WMIC.exe Token: SeTakeOwnershipPrivilege 368 WMIC.exe Token: SeLoadDriverPrivilege 368 WMIC.exe Token: SeSystemProfilePrivilege 368 WMIC.exe Token: SeSystemtimePrivilege 368 WMIC.exe Token: SeProfSingleProcessPrivilege 368 WMIC.exe Token: SeIncBasePriorityPrivilege 368 WMIC.exe Token: SeCreatePagefilePrivilege 368 WMIC.exe Token: SeBackupPrivilege 368 WMIC.exe Token: SeRestorePrivilege 368 WMIC.exe Token: SeShutdownPrivilege 368 WMIC.exe Token: SeDebugPrivilege 368 WMIC.exe Token: SeSystemEnvironmentPrivilege 368 WMIC.exe Token: SeRemoteShutdownPrivilege 368 WMIC.exe Token: SeUndockPrivilege 368 WMIC.exe Token: SeManageVolumePrivilege 368 WMIC.exe Token: 33 368 WMIC.exe Token: 34 368 WMIC.exe Token: 35 368 WMIC.exe Token: SeIncreaseQuotaPrivilege 1008 WMIC.exe Token: SeSecurityPrivilege 1008 WMIC.exe Token: SeTakeOwnershipPrivilege 1008 WMIC.exe Token: SeLoadDriverPrivilege 1008 WMIC.exe Token: SeSystemProfilePrivilege 1008 WMIC.exe Token: SeSystemtimePrivilege 1008 WMIC.exe Token: SeProfSingleProcessPrivilege 1008 WMIC.exe Token: SeIncBasePriorityPrivilege 1008 WMIC.exe Token: SeCreatePagefilePrivilege 1008 WMIC.exe Token: SeBackupPrivilege 1008 WMIC.exe Token: SeRestorePrivilege 1008 WMIC.exe Token: SeShutdownPrivilege 1008 WMIC.exe Token: SeDebugPrivilege 1008 WMIC.exe Token: SeSystemEnvironmentPrivilege 1008 WMIC.exe Token: SeRemoteShutdownPrivilege 1008 WMIC.exe Token: SeUndockPrivilege 1008 WMIC.exe Token: SeManageVolumePrivilege 1008 WMIC.exe Token: 33 1008 WMIC.exe Token: 34 1008 WMIC.exe Token: 35 1008 WMIC.exe Token: SeIncreaseQuotaPrivilege 368 WMIC.exe Token: SeSecurityPrivilege 368 WMIC.exe Token: SeTakeOwnershipPrivilege 368 WMIC.exe Token: SeLoadDriverPrivilege 368 WMIC.exe Token: SeSystemProfilePrivilege 368 WMIC.exe Token: SeSystemtimePrivilege 368 WMIC.exe Token: SeProfSingleProcessPrivilege 368 WMIC.exe Token: SeIncBasePriorityPrivilege 368 WMIC.exe Token: SeCreatePagefilePrivilege 368 WMIC.exe Token: SeBackupPrivilege 368 WMIC.exe Token: SeRestorePrivilege 368 WMIC.exe Token: SeShutdownPrivilege 368 WMIC.exe Token: SeDebugPrivilege 368 WMIC.exe Token: SeSystemEnvironmentPrivilege 368 WMIC.exe Token: SeRemoteShutdownPrivilege 368 WMIC.exe Token: SeUndockPrivilege 368 WMIC.exe Token: SeManageVolumePrivilege 368 WMIC.exe Token: 33 368 WMIC.exe Token: 34 368 WMIC.exe Token: 35 368 WMIC.exe Token: SeIncreaseQuotaPrivilege 1008 WMIC.exe Token: SeSecurityPrivilege 1008 WMIC.exe Token: SeTakeOwnershipPrivilege 1008 WMIC.exe Token: SeLoadDriverPrivilege 1008 WMIC.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1960 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 28 PID 1712 wrote to memory of 1960 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 28 PID 1712 wrote to memory of 1960 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 28 PID 1712 wrote to memory of 1960 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 28 PID 1712 wrote to memory of 560 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 30 PID 1712 wrote to memory of 560 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 30 PID 1712 wrote to memory of 560 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 30 PID 1712 wrote to memory of 560 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 30 PID 1712 wrote to memory of 588 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 32 PID 1712 wrote to memory of 588 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 32 PID 1712 wrote to memory of 588 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 32 PID 1712 wrote to memory of 588 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 32 PID 1712 wrote to memory of 324 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 34 PID 1712 wrote to memory of 324 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 34 PID 1712 wrote to memory of 324 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 34 PID 1712 wrote to memory of 324 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 34 PID 1960 wrote to memory of 368 1960 cmd.exe 33 PID 1960 wrote to memory of 368 1960 cmd.exe 33 PID 1960 wrote to memory of 368 1960 cmd.exe 33 PID 1960 wrote to memory of 368 1960 cmd.exe 33 PID 1712 wrote to memory of 1648 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 41 PID 1712 wrote to memory of 1648 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 41 PID 1712 wrote to memory of 1648 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 41 PID 1712 wrote to memory of 1648 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 41 PID 1712 wrote to memory of 2000 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 36 PID 1712 wrote to memory of 2000 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 36 PID 1712 wrote to memory of 2000 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 36 PID 1712 wrote to memory of 2000 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 36 PID 1712 wrote to memory of 1788 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 38 PID 1712 wrote to memory of 1788 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 38 PID 1712 wrote to memory of 1788 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 38 PID 1712 wrote to memory of 1788 1712 0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe 38 PID 1648 wrote to memory of 1320 1648 cmd.exe 42 PID 1648 wrote to memory of 1320 1648 cmd.exe 42 PID 1648 wrote to memory of 1320 1648 cmd.exe 42 PID 1648 wrote to memory of 1320 1648 cmd.exe 42 PID 2000 wrote to memory of 1008 2000 cmd.exe 43 PID 2000 wrote to memory of 1008 2000 cmd.exe 43 PID 2000 wrote to memory of 1008 2000 cmd.exe 43 PID 2000 wrote to memory of 1008 2000 cmd.exe 43 PID 2000 wrote to memory of 800 2000 cmd.exe 46 PID 2000 wrote to memory of 800 2000 cmd.exe 46 PID 2000 wrote to memory of 800 2000 cmd.exe 46 PID 2000 wrote to memory of 800 2000 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe"C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:800
-
-
-
C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe"C:\Users\Admin\AppData\Local\Temp\0ef3f837880e58131bb45566215d60ee1c023ce5d0299c05e3b80a2ed931e501.exe" -agent 02⤵
- Drops file in Program Files directory
PID:1788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1320
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406B
MD5ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9