Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2023 19:15
Static task
static1
Behavioral task
behavioral1
Sample
723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe
Resource
win10v2004-20230220-en
General
-
Target
723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe
-
Size
1.4MB
-
MD5
6441d7260944bcedc5958c5c8a05d16d
-
SHA1
46257982840493eca90e051ff1749e7040895584
-
SHA256
723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224
-
SHA512
af88fd3a0a2728c811be524feee575d8d2d9623b7944021c83173e40dbec6b1fbe7bea64dcdd8f1dbebc7d8df76b40e5c9647e2586316ea46ceb191ebcf14d89
-
SSDEEP
24576:1p2gwjk6ikYhJ9lvGnYZvy48/V33ck7LnBAyldFu8hod/Qodly:1AgxkmvGnYWccjBAwFadRd
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3088) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\InitializeSearch.raw => C:\Users\Admin\Pictures\InitializeSearch.raw.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File renamed C:\Users\Admin\Pictures\ImportRemove.crw => C:\Users\Admin\Pictures\ImportRemove.crw.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File renamed C:\Users\Admin\Pictures\RestartBlock.raw => C:\Users\Admin\Pictures\RestartBlock.raw.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File renamed C:\Users\Admin\Pictures\TraceTest.raw => C:\Users\Admin\Pictures\TraceTest.raw.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File renamed C:\Users\Admin\Pictures\BackupWrite.png => C:\Users\Admin\Pictures\BackupWrite.png.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Users\Admin\Pictures\GrantNew.tiff 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File renamed C:\Users\Admin\Pictures\ExitExport.tif => C:\Users\Admin\Pictures\ExitExport.tif.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File renamed C:\Users\Admin\Pictures\GrantNew.tiff => C:\Users\Admin\Pictures\GrantNew.tiff.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Local\\Temp\\723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe" 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSplashLogo.scale-400.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\instructions_read_me.txt 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.scale-150.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-32.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageWideTile.scale-150.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-100_contrast-black.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\AppxManifest.xml 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\instructions_read_me.txt 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ul-phn.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-32.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-36_altform-unplated.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Standard.targetsize-24_contrast-black.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\msader15.dll.mui 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\avtransport.xml 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsWideTile.contrast-white_scale-200.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\instructions_read_me.txt 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-48.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubBadgeLogo.scale-100_contrast-high.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Common Files\System\wab32.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\resources.pri 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derby.jar 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.shared.Office.x-none.msi.16.x-none.xml 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-20_altform-fullcolor.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\TinyTile.scale-100_contrast-white.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019DemoR_BypassTrial180-ul-oob.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Retail-ppd.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ppd.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Wide310x150Logo.scale-400.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\7734_20x20x32.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-24.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\README.html 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\vccorlib140.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Retail-ul-phn.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusMSDNR_Retail-ul-phn.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteLargeTile.scale-200.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\tinytile.targetsize-256_contrast-black.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-400.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_pt_BR.jar 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-80_altform-unplated.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-24_altform-unplated.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-64.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPSLAX.DLL 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_F_COL.HXK 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmpnetwk.exe.mui 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorStoreLogo.contrast-white_scale-100.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\swscale-5_ms.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_as.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\8041_48x48x32.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-48_altform-unplated_contrast-white.png 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\VideoLAN\VLC\README.txt 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-ul-oob.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\resources.pri 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\eula.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ppd.xrm-ms 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_sv.dll 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1304 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.7878kr5jx 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.7878kr5jx\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.7878kr5jx\DefaultIcon 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3644 vssvc.exe Token: SeRestorePrivilege 3644 vssvc.exe Token: SeAuditPrivilege 3644 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1160 wrote to memory of 3752 1160 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe 83 PID 1160 wrote to memory of 3752 1160 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe 83 PID 1160 wrote to memory of 3752 1160 723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe 83 PID 3752 wrote to memory of 1304 3752 cmd.exe 85 PID 3752 wrote to memory of 1304 3752 cmd.exe 85 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe"C:\Users\Admin\AppData\Local\Temp\723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1304
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ba21d49977850f54961ede73b7e9e480
SHA1bd630b3dbe9d7139527c1ffdbb2161e7a9067ae0
SHA25634757273c5e041f07b0352c51cfab2998ab676f3a39bc0f16a1b4d68f3fac4f8
SHA5124bf9be5f41f7258357e838ba94f0aa2b7f17d8fe3266174aaf123156b422c4fb72e4d3fd36db7b2e3e9d13202202d2a6b0ecca06ee2a2a043ce6ad27ffd751e2