Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 14:33
Behavioral task
behavioral1
Sample
d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe
Resource
win10v2004-20230220-en
General
-
Target
d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe
-
Size
159KB
-
MD5
85ca694de55c02d285e997e7671c9e43
-
SHA1
e4ecabeb1f0df4ae69a9408d6522f039fd3a4968
-
SHA256
d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3
-
SHA512
6bea0a189a947c059205e8c31dbcc0f6675504170d4dade3d780ab20fd44b1e1ae4b4d975227d95fd08a9aec3adeec21ce471a095650a53304837f12f515f4ca
-
SSDEEP
3072:/uJ9OlKolUa1U197bzhVsmftsfwohznCoJjlNr/DNg10:/ufj0zi1dNVsmft0GoJzrK0
Malware Config
Extracted
C:\5XKuA1aj2.README.txt
lockbit
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion.ly
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion.ly
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion.ly
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
http://lockbitsupdwon76nzykzblcplixwts4n4zoecugz2bxabtapqvmzqqd.onion
http://lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion
http://lockbitsupq3g62dni2f36snrdb4n5qzqvovbtkt5xffw3draxk6gwqd.onion
http://lockbitsupqfyacidr6upt6nhhyipujvaablubuevxj6xy3frthvr3yd.onion
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupxcjntihbmat4rrh7ktowips2qzywh6zer5r3xafhviyhqd.onion
https://gdpr.eu/what-is-gdpr/
https://gdpr-info.eu/
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\GrantOptimize.tiff d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe -
Executes dropped EXE 1 IoCs
pid Process 1780 785D.tmp -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1013461898-3711306144-4198452673-1000\desktop.ini d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL splwow64.exe File created C:\Windows\system32\spool\PRINTERS\PP7qp0wpcf7z_7vedfo_uxos2t.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPqb4b73hvevqa987a05cpur_nb.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPa51yyrojuhz3yy0nboncr6hc.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\5XKuA1aj2.bmp" d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\5XKuA1aj2.bmp" d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\WallpaperStyle = "10" d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.5XKuA1aj2 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.5XKuA1aj2\ = "5XKuA1aj2" d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5XKuA1aj2\DefaultIcon d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5XKuA1aj2 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\5XKuA1aj2\DefaultIcon\ = "C:\\ProgramData\\5XKuA1aj2.ico" d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 5052 ONENOTE.EXE 5052 ONENOTE.EXE -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp 1780 785D.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeDebugPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: 36 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeImpersonatePrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeIncBasePriorityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeIncreaseQuotaPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: 33 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeManageVolumePrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeProfSingleProcessPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeRestorePrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSystemProfilePrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeTakeOwnershipPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeShutdownPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeDebugPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4936 vssvc.exe Token: SeRestorePrivilege 4936 vssvc.exe Token: SeAuditPrivilege 4936 vssvc.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeSecurityPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe Token: SeBackupPrivilege 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE 5052 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4012 wrote to memory of 2012 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 104 PID 4012 wrote to memory of 2012 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 104 PID 1728 wrote to memory of 5052 1728 printfilterpipelinesvc.exe 107 PID 1728 wrote to memory of 5052 1728 printfilterpipelinesvc.exe 107 PID 4012 wrote to memory of 1780 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 108 PID 4012 wrote to memory of 1780 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 108 PID 4012 wrote to memory of 1780 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 108 PID 4012 wrote to memory of 1780 4012 d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe 108 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe"C:\Users\Admin\AppData\Local\Temp\d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
- Drops file in System32 directory
PID:2012
-
-
C:\ProgramData\785D.tmp"C:\ProgramData\785D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
PID:1780
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4692
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{55C6DFDF-95D2-48B6-892A-74908D002EF5}.xps" 1332388643984100002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
129B
MD5ffb3175b9cdb95d83a1b18353542136d
SHA1c6b8ce25b08038e153a8b2c620bdc8c5f8f8385a
SHA2567dcfd96fda2d495112ec06316806fa7d3b4c1693555c00545607c8b7056bf6d7
SHA51225f52817bdf8644a59c0e585f55bb4cb63d33f7b4437a19dae6ead913523cd37a60ebaf55fa4f053072dfd15781041afb6f589c61dde3bc8aa03e97bc8df680f
-
Filesize
10KB
MD5a52244f84e322ea2b726c6219eb48c37
SHA1bcd6ea086b4772e82ab716ac00a5d84da54f5990
SHA256821b0cdf6f322502b3f54e66944d789e8c883acb847f91018f62d29992208991
SHA512bc65672cfaae1e9c1a786c289f6e7c1fb13d99d4de643eea2264efaff5eef2326f879cf26e6afc4514e84431a0b66ad7d775ad773f0e1e5db5ec16df4f6af33c
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
C:\Users\Admin\AppData\Local\Temp\d31e38f333deeeb21c8b55fe129b64964a3ff14c04f3149b3f93a56e2fbf33d3.exe
Filesize159KB
MD5fbfa05da96f641ebbc77dafdb771332e
SHA14455986a5fd16bd68acde90ebd4e5b91d9bdc398
SHA2564ff0b8f45af0cd7220c461e51000c9cb199229fd067430c23d8c62bfb97488fe
SHA512232d203d79ffe8c87b45eb3d4e8b44bb3df14f9490ff455e56a18d0a3983bbc52a311f83eb12bcde983c9a2c5e56fb3dcdc774314bf492deb9d69eb41c3ba234
-
Filesize
4KB
MD55c226a7a851e0f04e0260990104dda73
SHA154a45ab885aee7478a7e7eacc772fa93ab7cf244
SHA256ef9f9546edd589b5105226c2a232edd981eba3bf8b6b87fb1c8115bc6accf826
SHA512040c157a0543b31e550972eac3ba40b066f4edb4aedde0bf6a4dfa35dcd10195ea64c5cef6cb47ffa36654fe442792b16be47d5525491a0e0c02044b5efef036