Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2023, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
Crypter.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Crypter.exe
Resource
win10v2004-20230621-en
General
-
Target
Crypter.exe
-
Size
141KB
-
MD5
26156564a104eae0cc9b06306a63ed9a
-
SHA1
a81e06b82d233c813b8803ce1c608b83cbbba8e6
-
SHA256
f1bb5ce204bc9e9fd12c3cb8c376e36e9ab47528c7c1ca865b38b8bd02314fc9
-
SHA512
f5d502ded9705a7dc53243d9dfae2095f95fbbc288a737f2d4259caa8a6ecbc6b256d786fae042d12af4931b79033540ef0aee98fc6a5ed99539fc7a122b7c98
-
SSDEEP
3072:4qHmFIAcneRB2ukEtRJ2XgqNjjCvvkfV7mF:JmsexkEt2hWCm
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8044) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies extensions of user files 21 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertFromCopy.tif.resq100 Crypter.exe File renamed C:\Users\Admin\Pictures\ConvertOptimize.tiff => C:\Users\Admin\Pictures\ConvertOptimize.tiff.resq100 Crypter.exe File renamed C:\Users\Admin\Pictures\LockUndo.tiff => C:\Users\Admin\Pictures\LockUndo.tiff.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\PopResolve.png.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\UnregisterOptimize.tif.resq100 Crypter.exe File renamed C:\Users\Admin\Pictures\PopResolve.png => C:\Users\Admin\Pictures\PopResolve.png.resq100 Crypter.exe File renamed C:\Users\Admin\Pictures\UnregisterOptimize.tif => C:\Users\Admin\Pictures\UnregisterOptimize.tif.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\ClearClose.crw.resq100 Crypter.exe File renamed C:\Users\Admin\Pictures\ConvertFromCopy.tif => C:\Users\Admin\Pictures\ConvertFromCopy.tif.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\ConvertOptimize.tiff.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\LockUndo.tiff Crypter.exe File renamed C:\Users\Admin\Pictures\OpenSplit.crw => C:\Users\Admin\Pictures\OpenSplit.crw.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\LockUndo.tiff.resq100 Crypter.exe File renamed C:\Users\Admin\Pictures\ClearClose.crw => C:\Users\Admin\Pictures\ClearClose.crw.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\ConvertOptimize.tiff Crypter.exe File renamed C:\Users\Admin\Pictures\DisableResume.tif => C:\Users\Admin\Pictures\DisableResume.tif.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\DisableResume.tif.resq100 Crypter.exe File renamed C:\Users\Admin\Pictures\LimitBackup.tiff => C:\Users\Admin\Pictures\LimitBackup.tiff.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\LimitBackup.tiff Crypter.exe File opened for modification C:\Users\Admin\Pictures\LimitBackup.tiff.resq100 Crypter.exe File opened for modification C:\Users\Admin\Pictures\OpenSplit.crw.resq100 Crypter.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\International\Geo\Nation Crypter.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 L11.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: Crypter.exe File opened (read-only) \??\E: Crypter.exe File opened (read-only) \??\G: Crypter.exe File opened (read-only) \??\H: Crypter.exe File opened (read-only) \??\J: Crypter.exe File opened (read-only) \??\N: Crypter.exe File opened (read-only) \??\X: Crypter.exe File opened (read-only) \??\O: Crypter.exe File opened (read-only) \??\P: Crypter.exe File opened (read-only) \??\T: Crypter.exe File opened (read-only) \??\Y: Crypter.exe File opened (read-only) \??\Z: Crypter.exe File opened (read-only) \??\F: Crypter.exe File opened (read-only) \??\S: Crypter.exe File opened (read-only) \??\A: Crypter.exe File opened (read-only) \??\I: Crypter.exe File opened (read-only) \??\K: Crypter.exe File opened (read-only) \??\L: Crypter.exe File opened (read-only) \??\M: Crypter.exe File opened (read-only) \??\Q: Crypter.exe File opened (read-only) \??\R: Crypter.exe File opened (read-only) \??\U: Crypter.exe File opened (read-only) \??\V: Crypter.exe File opened (read-only) \??\W: Crypter.exe File opened (read-only) \??\D: Crypter.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\vreg\proof.fr-fr.msi.16.fr-fr.vreg.dat.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Microsoft.VCLibs.x86.14.00.appx Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\APASixthEditionOfficeOnline.xsl Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-gb\ui-strings.js Crypter.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-pl.xrm-ms.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\LAYERS.ELM.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\init.js Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.service.exsd.resq100 Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fr-ma\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_es_135x40.svg.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\S_ThumbUpOutline_22_N1.svg.resq100 Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\wmlaunch.exe.mui Crypter.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html.resq100 Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.ssl_1.1.0.v20140827-1444.jar Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jmx.xml Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] Crypter.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\resq_Recovery.txt Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hr-hr\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\bg_pattern_RHP.png Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\forms_super.gif Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-api-caching_ja.jar Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\inline-error-2x.png.resq100 Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.update.configurator_3.3.300.v20140518-1928.jar Crypter.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\QUAD.ELM Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\new_icons_retina.png.resq100 Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-attach.xml Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\he-il\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_ja.jar Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-ppd.xrm-ms.resq100 Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.core.contexts_1.3.100.v20140407-1019.jar.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_selectlist_checkmark_18.svg.resq100 Crypter.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\resq_Recovery.txt Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psm1.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\TabTip32.exe.mui.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\ui-strings.js Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\tr-tr\ui-strings.js.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-oob.xrm-ms.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ul-phn.xrm-ms.resq100 Crypter.exe File opened for modification C:\Program Files\7-Zip\License.txt.resq100 Crypter.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_Grace-ul-oob.xrm-ms.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Trial-ul-oob.xrm-ms Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\IEEE2006OfficeOnline.xsl Crypter.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pt-br\resq_Recovery.txt Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-ma\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rightnav.gif.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\ui-strings.js.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-pl.xrm-ms.resq100 Crypter.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-coredump_ja.jar.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\SQLENGINEMESSAGES.XML Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\sybase.xsl.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\ui-strings.js.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\it-it\ui-strings.js Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_OEM_Perp-ppd.xrm-ms Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WordInterProviderRanker.bin.resq100 Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-pl.xrm-ms.resq100 Crypter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner_Dark.pdf.resq100 Crypter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\resq_Recovery.txt Crypter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_MAK_AE-ul-oob.xrm-ms.resq100 Crypter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4212 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1860 vssadmin.exe 2828 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe 3596 Crypter.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3596 Crypter.exe Token: SeRestorePrivilege 3596 Crypter.exe Token: SeBackupPrivilege 3596 Crypter.exe Token: SeTakeOwnershipPrivilege 3596 Crypter.exe Token: SeAuditPrivilege 3596 Crypter.exe Token: SeSecurityPrivilege 3596 Crypter.exe Token: SeIncBasePriorityPrivilege 3596 Crypter.exe Token: SeBackupPrivilege 1196 vssvc.exe Token: SeRestorePrivilege 1196 vssvc.exe Token: SeAuditPrivilege 1196 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 944 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3596 wrote to memory of 1284 3596 Crypter.exe 85 PID 3596 wrote to memory of 1284 3596 Crypter.exe 85 PID 3596 wrote to memory of 1284 3596 Crypter.exe 85 PID 3596 wrote to memory of 4200 3596 Crypter.exe 87 PID 3596 wrote to memory of 4200 3596 Crypter.exe 87 PID 1284 wrote to memory of 4212 1284 cmd.exe 89 PID 1284 wrote to memory of 4212 1284 cmd.exe 89 PID 1284 wrote to memory of 4212 1284 cmd.exe 89 PID 4200 wrote to memory of 1860 4200 cmd.exe 90 PID 4200 wrote to memory of 1860 4200 cmd.exe 90 PID 3596 wrote to memory of 3772 3596 Crypter.exe 108 PID 3596 wrote to memory of 3772 3596 Crypter.exe 108 PID 3596 wrote to memory of 2008 3596 Crypter.exe 110 PID 3596 wrote to memory of 2008 3596 Crypter.exe 110 PID 3596 wrote to memory of 2008 3596 Crypter.exe 110 PID 3596 wrote to memory of 4260 3596 Crypter.exe 114 PID 3596 wrote to memory of 4260 3596 Crypter.exe 114 PID 3596 wrote to memory of 4260 3596 Crypter.exe 114 PID 3772 wrote to memory of 2828 3772 cmd.exe 115 PID 3772 wrote to memory of 2828 3772 cmd.exe 115 PID 4260 wrote to memory of 3124 4260 cmd.exe 116 PID 4260 wrote to memory of 3124 4260 cmd.exe 116 PID 4260 wrote to memory of 3124 4260 cmd.exe 116 PID 2008 wrote to memory of 2580 2008 cmd.exe 117 PID 2008 wrote to memory of 2580 2008 cmd.exe 117 PID 2008 wrote to memory of 2580 2008 cmd.exe 117 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crypter.exe"C:\Users\Admin\AppData\Local\Temp\Crypter.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\Crypter.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Update BETA" /TR "C:\Users\Admin\AppData\Local\Temp\Crypter.exe" /F3⤵
- Creates scheduled task(s)
PID:4212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\L11.tmp"2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\L11.tmpC:\Users\Admin\AppData\Local\Temp\L11.tmp3⤵
- Executes dropped EXE
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Update BETA" /F2⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Update BETA" /F3⤵PID:3124
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
690B
MD5557f56a43cfbac7ddf83eeefb5aaeaa6
SHA10a9a5a5d46c60dd3d2acaae5e0a7c5bfd2677c4a
SHA2563aa1bc73e902b58f6ab3dc7ff49e71e355eae50ae00448b554c8c509e99f4c78
SHA5121c1c5cf1101195f19036ac7f2cd1addb3412ae53401801443becfa708bbe9ed3198093455a608947af5a211dc787913f06902c10e3c850d0272cac69df4993df
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD5b0f5cb1b6be68b3bfdccf8649a050932
SHA104afc85ea03c3d44e77ab20b709912074b0aed3a
SHA256ec7e87459bc15903599323dd9682e0530ba557d00eeb55f51827c238134846bb
SHA5120b8774b5a5dbb006dc902a1c981a0560bd570b8d5a944b8e8f23e7f05ab64fc513eabde0798cd70f8d39b4cdf15156fc05912a9c35656612169e188c8e5d3a0c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD591caab83fd5d5a5bddfa156d8519aeeb
SHA123ec16606ca444d622219cf2eab59b4f35990de8
SHA2565517768e386a73f9628858b8521cd0309361197add51055d4fc15b42d6a9cc15
SHA512a6930247b0154ce8260ed6502117aa6cfd8a6f6601e3b4d85140bdb7031c32db98282cc231062937deda28e1444d7a48efca2aa673c643f7fa7e09bf8c306afe
-
Filesize
5KB
MD5ab65af4349e7c5b0872c8b808d036980
SHA1414b2a2748b7ea6176c1d2453f89fdc8a2d349d0
SHA256a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2
SHA5122c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679
-
Filesize
5KB
MD5ab65af4349e7c5b0872c8b808d036980
SHA1414b2a2748b7ea6176c1d2453f89fdc8a2d349d0
SHA256a6c41f368f42a7c57c307a48ce2440a60a744226b6414fadb6517a80a5d160a2
SHA5122c61c56e8c299677bad4ce223e3187200c341aa4dd4503fac1217aa8e15687af03544a6d160bb2b1b131a56ea9df2967e00359aa622f12d1b82605c40cca6679