Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-07-2023 20:35
Behavioral task
behavioral1
Sample
33.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
33.exe
Resource
win10v2004-20230703-en
General
-
Target
33.exe
-
Size
216KB
-
MD5
efb32ebb95f9a07cfa9d404c860b5c2e
-
SHA1
d79bd759ed3a8db25c32e9813f76f8a5742c19c9
-
SHA256
30daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
-
SHA512
b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611
-
SSDEEP
6144:UyJE1yd7WWlJmcyfwAPWna4DQFu/U3buRKlemZ9DnGAevIG+C+:UU/d7WWKvhPWa4DQFu/U3buRKlemZ9Db
Malware Config
Extracted
C:\$Recycle.Bin\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
Signatures
-
Detects Zeppelin payload 25 IoCs
resource yara_rule behavioral1/files/0x000a000000012023-58.dat family_zeppelin behavioral1/files/0x000a000000012023-62.dat family_zeppelin behavioral1/files/0x000a000000012023-60.dat family_zeppelin behavioral1/files/0x000a000000012023-64.dat family_zeppelin behavioral1/memory/1724-74-0x00000000008E0000-0x0000000000A21000-memory.dmp family_zeppelin behavioral1/files/0x000a000000012023-79.dat family_zeppelin behavioral1/files/0x000a000000012023-78.dat family_zeppelin behavioral1/files/0x000a000000012023-77.dat family_zeppelin behavioral1/memory/2044-85-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/1984-730-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-789-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-976-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-1159-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-1339-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-1503-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/1984-1599-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-1613-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-1620-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-5693-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-10510-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-13195-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-18015-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-22572-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-26463-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin behavioral1/memory/348-30102-0x0000000000DA0000-0x0000000000EE1000-memory.dmp family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7308) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2332 notepad.exe -
Executes dropped EXE 3 IoCs
pid Process 1984 services.exe 2044 services.exe 348 services.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 33.exe 1724 33.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run 33.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\services.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\services.exe\" -start" 33.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: services.exe File opened (read-only) \??\T: services.exe File opened (read-only) \??\P: services.exe File opened (read-only) \??\N: services.exe File opened (read-only) \??\I: services.exe File opened (read-only) \??\Y: services.exe File opened (read-only) \??\W: services.exe File opened (read-only) \??\U: services.exe File opened (read-only) \??\S: services.exe File opened (read-only) \??\Q: services.exe File opened (read-only) \??\K: services.exe File opened (read-only) \??\H: services.exe File opened (read-only) \??\A: services.exe File opened (read-only) \??\Z: services.exe File opened (read-only) \??\V: services.exe File opened (read-only) \??\L: services.exe File opened (read-only) \??\E: services.exe File opened (read-only) \??\B: services.exe File opened (read-only) \??\R: services.exe File opened (read-only) \??\O: services.exe File opened (read-only) \??\M: services.exe File opened (read-only) \??\J: services.exe File opened (read-only) \??\G: services.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL016.XML services.exe File created C:\Program Files (x86)\MSBuild\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-modules-appui.jar services.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\bckgzm.exe.mui services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\ED00010_.WMF services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215710.WMF services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02268_.WMF services.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.THD services.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.ds_1.4.200.v20131126-2331.jar.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099164.WMF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21333_.GIF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\COUGH.WAV services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\MessageBoxIconImagesMask.bmp services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Sts2.css services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENVELOPE.DPV services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_zh_CN.jar.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Samara.v-society.9FC-2C9-534 services.exe File created C:\Program Files\VideoLAN\VLC\plugins\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00146_.WMF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18232_.WMF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14691_.GIF services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\oracle.gif.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SendMail.api services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00382_.WMF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-ui_zh_CN.jar services.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0149407.WMF services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR3B.GIF services.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-loaders.xml.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Amman services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0227558.JPG services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZFORM.XML services.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitevignette1047.png services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Damascus services.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\EST services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\POSTITL.ICO.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\bandwidth.png services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nassau.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285926.WMF services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-loaders.xml.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099162.JPG.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03011U.BMP.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-spi-quicksearch.xml.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Chatham.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285780.WMF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03453_.WMF services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\STOPICON.JPG services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jre7\bin\server\Xusage.txt.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107494.WMF services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0202045.JPG.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239063.WMF services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0211949.WMF services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR49F.GIF services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\HEADER.GIF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Yekaterinburg services.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state_1.0.1.v20140709-1414.jar services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090390.WMF.v-society.9FC-2C9-534 services.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SlateBlue.css services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2312 vssadmin.exe 1596 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe 1984 services.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1724 33.exe Token: SeDebugPrivilege 1724 33.exe Token: SeIncreaseQuotaPrivilege 2300 WMIC.exe Token: SeSecurityPrivilege 2300 WMIC.exe Token: SeTakeOwnershipPrivilege 2300 WMIC.exe Token: SeLoadDriverPrivilege 2300 WMIC.exe Token: SeSystemProfilePrivilege 2300 WMIC.exe Token: SeSystemtimePrivilege 2300 WMIC.exe Token: SeProfSingleProcessPrivilege 2300 WMIC.exe Token: SeIncBasePriorityPrivilege 2300 WMIC.exe Token: SeCreatePagefilePrivilege 2300 WMIC.exe Token: SeBackupPrivilege 2300 WMIC.exe Token: SeRestorePrivilege 2300 WMIC.exe Token: SeShutdownPrivilege 2300 WMIC.exe Token: SeDebugPrivilege 2300 WMIC.exe Token: SeSystemEnvironmentPrivilege 2300 WMIC.exe Token: SeRemoteShutdownPrivilege 2300 WMIC.exe Token: SeUndockPrivilege 2300 WMIC.exe Token: SeManageVolumePrivilege 2300 WMIC.exe Token: 33 2300 WMIC.exe Token: 34 2300 WMIC.exe Token: 35 2300 WMIC.exe Token: SeIncreaseQuotaPrivilege 2160 WMIC.exe Token: SeSecurityPrivilege 2160 WMIC.exe Token: SeTakeOwnershipPrivilege 2160 WMIC.exe Token: SeLoadDriverPrivilege 2160 WMIC.exe Token: SeSystemProfilePrivilege 2160 WMIC.exe Token: SeSystemtimePrivilege 2160 WMIC.exe Token: SeProfSingleProcessPrivilege 2160 WMIC.exe Token: SeIncBasePriorityPrivilege 2160 WMIC.exe Token: SeCreatePagefilePrivilege 2160 WMIC.exe Token: SeBackupPrivilege 2160 WMIC.exe Token: SeRestorePrivilege 2160 WMIC.exe Token: SeShutdownPrivilege 2160 WMIC.exe Token: SeDebugPrivilege 2160 WMIC.exe Token: SeSystemEnvironmentPrivilege 2160 WMIC.exe Token: SeRemoteShutdownPrivilege 2160 WMIC.exe Token: SeUndockPrivilege 2160 WMIC.exe Token: SeManageVolumePrivilege 2160 WMIC.exe Token: 33 2160 WMIC.exe Token: 34 2160 WMIC.exe Token: 35 2160 WMIC.exe Token: SeBackupPrivilege 2272 vssvc.exe Token: SeRestorePrivilege 2272 vssvc.exe Token: SeAuditPrivilege 2272 vssvc.exe Token: SeIncreaseQuotaPrivilege 2160 WMIC.exe Token: SeSecurityPrivilege 2160 WMIC.exe Token: SeTakeOwnershipPrivilege 2160 WMIC.exe Token: SeLoadDriverPrivilege 2160 WMIC.exe Token: SeSystemProfilePrivilege 2160 WMIC.exe Token: SeSystemtimePrivilege 2160 WMIC.exe Token: SeProfSingleProcessPrivilege 2160 WMIC.exe Token: SeIncBasePriorityPrivilege 2160 WMIC.exe Token: SeCreatePagefilePrivilege 2160 WMIC.exe Token: SeBackupPrivilege 2160 WMIC.exe Token: SeRestorePrivilege 2160 WMIC.exe Token: SeShutdownPrivilege 2160 WMIC.exe Token: SeDebugPrivilege 2160 WMIC.exe Token: SeSystemEnvironmentPrivilege 2160 WMIC.exe Token: SeRemoteShutdownPrivilege 2160 WMIC.exe Token: SeUndockPrivilege 2160 WMIC.exe Token: SeManageVolumePrivilege 2160 WMIC.exe Token: 33 2160 WMIC.exe Token: 34 2160 WMIC.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1984 1724 33.exe 28 PID 1724 wrote to memory of 1984 1724 33.exe 28 PID 1724 wrote to memory of 1984 1724 33.exe 28 PID 1724 wrote to memory of 1984 1724 33.exe 28 PID 1724 wrote to memory of 2332 1724 33.exe 29 PID 1724 wrote to memory of 2332 1724 33.exe 29 PID 1724 wrote to memory of 2332 1724 33.exe 29 PID 1724 wrote to memory of 2332 1724 33.exe 29 PID 1724 wrote to memory of 2332 1724 33.exe 29 PID 1724 wrote to memory of 2332 1724 33.exe 29 PID 1724 wrote to memory of 2332 1724 33.exe 29 PID 1984 wrote to memory of 2460 1984 services.exe 30 PID 1984 wrote to memory of 2460 1984 services.exe 30 PID 1984 wrote to memory of 2460 1984 services.exe 30 PID 1984 wrote to memory of 2460 1984 services.exe 30 PID 1984 wrote to memory of 2860 1984 services.exe 31 PID 1984 wrote to memory of 2860 1984 services.exe 31 PID 1984 wrote to memory of 2860 1984 services.exe 31 PID 1984 wrote to memory of 2860 1984 services.exe 31 PID 1984 wrote to memory of 2892 1984 services.exe 34 PID 1984 wrote to memory of 2892 1984 services.exe 34 PID 1984 wrote to memory of 2892 1984 services.exe 34 PID 1984 wrote to memory of 2892 1984 services.exe 34 PID 1984 wrote to memory of 2100 1984 services.exe 43 PID 1984 wrote to memory of 2100 1984 services.exe 43 PID 1984 wrote to memory of 2100 1984 services.exe 43 PID 1984 wrote to memory of 2100 1984 services.exe 43 PID 1984 wrote to memory of 2744 1984 services.exe 42 PID 1984 wrote to memory of 2744 1984 services.exe 42 PID 1984 wrote to memory of 2744 1984 services.exe 42 PID 1984 wrote to memory of 2744 1984 services.exe 42 PID 1984 wrote to memory of 2736 1984 services.exe 36 PID 1984 wrote to memory of 2736 1984 services.exe 36 PID 1984 wrote to memory of 2736 1984 services.exe 36 PID 1984 wrote to memory of 2736 1984 services.exe 36 PID 1984 wrote to memory of 348 1984 services.exe 40 PID 1984 wrote to memory of 348 1984 services.exe 40 PID 1984 wrote to memory of 348 1984 services.exe 40 PID 1984 wrote to memory of 348 1984 services.exe 40 PID 1984 wrote to memory of 2044 1984 services.exe 39 PID 1984 wrote to memory of 2044 1984 services.exe 39 PID 1984 wrote to memory of 2044 1984 services.exe 39 PID 1984 wrote to memory of 2044 1984 services.exe 39 PID 2460 wrote to memory of 2300 2460 cmd.exe 44 PID 2460 wrote to memory of 2300 2460 cmd.exe 44 PID 2460 wrote to memory of 2300 2460 cmd.exe 44 PID 2460 wrote to memory of 2300 2460 cmd.exe 44 PID 2744 wrote to memory of 2312 2744 cmd.exe 46 PID 2744 wrote to memory of 2312 2744 cmd.exe 46 PID 2744 wrote to memory of 2312 2744 cmd.exe 46 PID 2744 wrote to memory of 2312 2744 cmd.exe 46 PID 2736 wrote to memory of 2160 2736 cmd.exe 45 PID 2736 wrote to memory of 2160 2736 cmd.exe 45 PID 2736 wrote to memory of 2160 2736 cmd.exe 45 PID 2736 wrote to memory of 2160 2736 cmd.exe 45 PID 2736 wrote to memory of 1596 2736 cmd.exe 49 PID 2736 wrote to memory of 1596 2736 cmd.exe 49 PID 2736 wrote to memory of 1596 2736 cmd.exe 49 PID 2736 wrote to memory of 1596 2736 cmd.exe 49 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\33.exe"C:\Users\Admin\AppData\Local\Temp\33.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:2860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1596
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -agent 13⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:2100
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Deletes itself
PID:2332
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904B
MD50f9f42e229d2c62968c93ce0eb5dc081
SHA111cc738b40e19a3695206a3949be01929fb0551f
SHA25662ef12b4795c7983f50c95ccf58c5591692898403a71e4947531a76dbbfdd96c
SHA512f4dc25d170e113a341271e20b00781e607d0ed9e158411de7fccd103b64358e29968541df80de70cd0bc1a837b2085bd120110d80076da583c9d69d00014f6a0
-
Filesize
513B
MD5d85fd33104300b4638721960aa78cd24
SHA1cb9d0bfef5782f71f062fac0798713aa1ff01a05
SHA256d82bd62ebeda23130853493e6eaca98da32a46d66a992415b166126c58368bca
SHA512ac29264981d520f2144f3ed21b5b9d453bc7500a9c5ebe7f0c575bbfff6d858fd957faa74128845309fac0a926a102d5941a33e1ad896a5abb2caa92b0269268
-
Filesize
23KB
MD515326757f53e870a88dc81e9e0a545e7
SHA17ef59b25b0276a7072e71dc0e9aabe464708b89d
SHA256912d303e240b3fc0169824188634444b72bc9173f9f87bf7aaea75c08b3db788
SHA5126b0a5f048e7c473f73372a28ba91e85d665efa35cab5556efd2005cd49c3e93218a74726a2bb60163ee2bcdea394daf755bce2076f083fa1bb3134bcad8e7be8
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt
Filesize29KB
MD5c3c8bd3bfbc9fcf865d8599d6568d7db
SHA15c3b9f3acdae873bf210f6bbdddd02d8e48f6822
SHA256a0aeb109f4ec0027582178095ea9786b4067be7be9d8b0e12c492d15f4dafb68
SHA512d8cffa7a90e55263090584446b7ee957ea700271b5278fb50e90621b6dbeb738dc0a7a98f287c572cfcb098b280fcab23158f96fddbf150390a5c05b121c9f38
-
Filesize
122KB
MD525353f129b9932efd39b342ec98da8ac
SHA1b37a3880105aff98d598b640d5df557217afdedb
SHA256ae9c7e8222d8ea164c30eb6af95b165134ebfc1f08bd5593a8486c2fd41599db
SHA51278cdcbae233b444e06b7fd171b2d002de7bb9d9b8117a58f8b58a8c160f1670a54dd90b1214f37fcb80aa0ec202f5396d21d8bd127a7c625ff4c8bcc6e8a6024
-
Filesize
125KB
MD5cfbe7d37d15b8ed4d4a4f82a3f2ae0d2
SHA111e72bb3d1af565936f02f7e36f82d01eb21790c
SHA256b581ebf2d187e424e08c222fff65466a067c3b613110a0681ed9c0f72725e8ac
SHA51279d923b174723449de2eb86c2cec32c3efde54f38e32fb29f7d4cc529e8d94da53482d1ecbf1ccc5bfd447d82d1039b1ae5ef42645315c8772735a128200418d
-
Filesize
258KB
MD50ee3aba36619f8d026b745287208d6e0
SHA1dca8be86d785bdfe0dd75941914fdbc8dd39016b
SHA2566c593e1607d03b1806c55ecd62e3b9af066c56c8666162048a4154c8ac3c5a37
SHA5127c36255eb73b832653cd9c1cb45e12775ed45c957c51bfb6a7238261a11cf93602ed6ec34e1b3498639e4d7ea2abf4c8bbe85d3482f07f14ee0d891248e8f877
-
Filesize
7KB
MD5533776068d554b74e4f07ad4cc26e250
SHA13b68f3e5c36293c776b7bcec5c1a3ca21375d1cc
SHA256828a9f413db734fb6f3af44e9062a7965ad5d2cd9fc0b49ebe08d70450eb5e06
SHA5124e5933e6eb000e6f0bca76ae72a5a755f28a3bc684d02d171e49619b7aa16417ffef67bf046f74fc46fbe26feb08f802f3436fe14424554f607bdca0442e2f41
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_OffMask.bmp
Filesize8KB
MD5f63291f79da9f6277681ada155406d12
SHA17453e332eb66f04e8084aab9bf863275217d7523
SHA2561f3ea7511e472b9206d505bceca7ae2b71737a463bc43e3c01bd93e96201d351
SHA512504cf04f764b4502a619698dc69af38293be80083e29c6482c05c3abbaae6a3267f663769f76fde132ed24523f1431fa94e52360fe068dc315959ab58ba7bbc8
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\Microsoft.Office.InfoPath.xml
Filesize249KB
MD5a5a398038bfcd42f9e37e7d8531ecd77
SHA1aed92b240d9c173ec0cafbf9376bff3a54c79d47
SHA256f192112514cc50a54dd6e7287d4d9d3b94479d184b12cb04253407f8fc4785a1
SHA512089b29ad230eee17c1da4f46e092bebda8e53c2d5337b94a9c64b7874699cb73708164889e92da28aa14c417005a4313279fd95a10c918199bac725fb4c39488
-
Filesize
78KB
MD533bd200f4f23d3b4ecb7d67b4914e8cc
SHA13a1ea40fb15397ce26680099f243052373720f2f
SHA2568fe530e67b566e9f69cb7b522e84d604dac2f1f8091eb785156eb21036a441b5
SHA512e3c41575ed8f1d43d635834beff8fcda7fe75a1d32b609ae10b57ca1080fa22c7f791eaa8df91c49a2e0fa411d9358f1eeb82956888d01e31a2ebb1f3cfa35eb
-
Filesize
78KB
MD5329fbbaa6104e83635fbecd5d568d9a4
SHA1ff695e44bcf817b5419b52a7c5c3841bd3d87a7d
SHA25660a829e74db6ec594cfb9d84a02f6fa7c9bd6d4bde84c3d30cff3468fc68fa30
SHA51290555e9f7db609a35966bb7fc7f019d026c75e71128a5a18710fdca73464e8ea4e6377d145adeaa68eec4015cf17a66d413d08343f602a01fc8ee2db8bdc9ed1
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\eclipse_update_120.jpg
Filesize22KB
MD5d8f9e825bf8b1e7661d87788f308e56f
SHA1b4a1aba3cbe00a7b3e7d1450781ddf2b2eec0145
SHA256597c08041c6c2d932d57736cd8d69ad6f9df7ecc18bd6239f460136140264ef1
SHA512fe333c0a08372cf44a4d4768328a96f2db79ab63b500afda34ae05d3d8a2d8981b83ac29862697ef0adcabf49c47c7a0697652010047e98c360b6408d28d32c4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html
Filesize17KB
MD57b6d29ebaba9a605610810dc434d1626
SHA1f92df0ec996e294d4dd076841a3be4fff2ebd957
SHA2562b8fdbe654635f0397612fac7683e618131dcee9864bcb61b7ecfdf4b1dde365
SHA5121c7c3dfafca1d804b42f81ef511775dc9e89115d39af7784f6ad973f58b67c8c3a5a033ccf1d865385290c6a25e69dcec9ff1f1b9e8d2eecdddc95a81eaed4d5
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html
Filesize13KB
MD51c69770ada99e3552d85b4c9cc4a0eaf
SHA1998fb2119aada52110c18027eb351b099f0f7fd7
SHA256df1304b3d70bc33224fdfa12150ec3d8647ee6b12fdc0042ced05cc55fd1639f
SHA5123675bd3e202baf120f1698cc1c0e74088549e616e5d4f0a1bf60b8be47be6abf36a9e002a1e1a7200040095fd50ab3eba26aa352b92673d8534a0f4892c44eb4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize10KB
MD52f20a5883a526a939c6883f089fe4a1f
SHA18938d64552207cbcb7ca61da792903db5bb4e346
SHA256707521ef15038215b3623ab089dc191a11e6cbd4068a4918cd190ae76d96b34a
SHA512590d17b5c92ff7c159a9aea781d8e75332253388a301604b56c3ae67708912c867a68ebb1f6a01f31d87ba03441a7d94e290fe6fb018150d7f7980d4c40db568
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\license.html
Filesize10KB
MD5d8e8d1a28d4260293476d3b70b2794c2
SHA1ddbbfb998e6f92787d73a60594e7f9a7d910108b
SHA2566c3168c0aaee5956e0441e40e74af14231e0e2869d6bdf7c18a08d73c9f27cae
SHA512e2aa426f521fced01265a3102204472421aa16ba38d2f73dbf6ee9c5b262cb7ac741b36379086c70041ae1a9b10c82f443c7d56912503186b4c125c77e9eb767
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html
Filesize10KB
MD5bfd854c48e32c80efe8f1c7ba9b2faa7
SHA1514f1677e815d11f0b37eaf613207d2cfe823c5e
SHA2566226f787fb2f14dc8ee66946b670e6413c5be642eb8e0244f5f239f77a0258b9
SHA512558a78837031791de57d8b69019d7e1105fb416c1f03b2d0a71d57649cd6247a24cb0848b75320e9a2e461e54b61b260ff77b31953c2f2df47eedde905b948a7
-
Filesize
609KB
MD53ebfa399b9d00fceddcb07b54f2bddf0
SHA19212931602300c2b845375ab5f8988226f014a0e
SHA256507942ffd9553a1792cc3593815479429185b80c302d09e93f4d5cdb0db14df9
SHA512b0979cfa81834c9e4bb095db3ee715afd3e41d6fa11cb130e82182b8d09dc4268c3ae47e1295a8136afd37ee8b75f8f8a3124c959a8838d0bfb80f0cb3342a9b
-
Filesize
610KB
MD53195f9276c3898cc99acb8e43e096b3f
SHA1989b47ea06dd8371145400fdac500e02e5010d62
SHA2564f7ed6f41326cc669525b60020b90d298447be79bed40b5d1fe76f02a1dbb1de
SHA512d1943757ebbc2f54926fb8f561938105c59b11bf41a2275a2558fc15f64fe61b94f204db8c649c7b89c7c43ca095a2a1384dc48c98211e9475356ed1108cadcb
-
Filesize
571KB
MD5880fffc950bf415f990455ef8b2566e3
SHA1499bc43ada82d709236086cf6ebbb60dfedba690
SHA256129f572653692a9260165e7cf3efdc5d1b4b5cef1ecb3560d2e160dc6160981b
SHA512279c8ee8d8b9238133b4881d0cd2178b7750829e7bb0b22bdb0c08ad425ed4964896424a44507390b6c4286179cc055460a3a03c9a24bba09815d5594c5ee9fb
-
Filesize
764KB
MD5cb81a0c6ff099b8e5ccd9c6ebaf09062
SHA1f531af480711eba2506086c8c53b10e614a07c57
SHA2564a709d0584f7276d83dba714b4216bc9ac38e74aa48a3b5f2dcc0c875aaafa1f
SHA5129761e650c257d0336397164f1afa350335133d85c2ee8fb975b644941140f2ff589f4fc45957cd832ff3455f4f6bd152708f0502465557ebd71300537dc3e731
-
Filesize
545KB
MD50cc098b5cabab8e43ee5003d60487a29
SHA13f4a5f9783274311f214b383887d53d24c60a28b
SHA256f28a704907a66f991e7231ca3815dc7266cd57dc805eacd0c2939abfdf825dee
SHA512353f04b7c4274fa3fccf4c3180a8c9910d934f616d338cd473958016466a96b3dff9eeb5b07d83f1661db36708c627a60fab873d5bfb734742344c4e70104375
-
Filesize
406B
MD5ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
Filesize
216KB
MD5efb32ebb95f9a07cfa9d404c860b5c2e
SHA1d79bd759ed3a8db25c32e9813f76f8a5742c19c9
SHA25630daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
SHA512b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611
-
Filesize
216KB
MD5efb32ebb95f9a07cfa9d404c860b5c2e
SHA1d79bd759ed3a8db25c32e9813f76f8a5742c19c9
SHA25630daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
SHA512b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611
-
Filesize
216KB
MD5efb32ebb95f9a07cfa9d404c860b5c2e
SHA1d79bd759ed3a8db25c32e9813f76f8a5742c19c9
SHA25630daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
SHA512b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611
-
Filesize
216KB
MD5efb32ebb95f9a07cfa9d404c860b5c2e
SHA1d79bd759ed3a8db25c32e9813f76f8a5742c19c9
SHA25630daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
SHA512b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611
-
Filesize
216KB
MD5efb32ebb95f9a07cfa9d404c860b5c2e
SHA1d79bd759ed3a8db25c32e9813f76f8a5742c19c9
SHA25630daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
SHA512b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611
-
Filesize
82KB
MD502e7617a8677d66b09bcf4fa0e51335a
SHA109042aaf5b91fda85642096b75c07240356d65c7
SHA256b15c185a14b1e588f3a8f4fb942ab1c2a4915701e6d57601b24dfac3a21ffd1a
SHA512fadf4ff16fe752468c2bbd3b41a1e9dff7eb58165eb6714651104fd45c8632d22f6ea8c110ab9a6ed2b5caf52ef7bac76fe24c880942f2558e9cbd8a50daf142
-
Filesize
216KB
MD5efb32ebb95f9a07cfa9d404c860b5c2e
SHA1d79bd759ed3a8db25c32e9813f76f8a5742c19c9
SHA25630daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
SHA512b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611
-
Filesize
216KB
MD5efb32ebb95f9a07cfa9d404c860b5c2e
SHA1d79bd759ed3a8db25c32e9813f76f8a5742c19c9
SHA25630daceda77b644a07bcfbea55b70a83befcb21e384f6d737d77f4002acd9a381
SHA512b07f13c5717c525ca0663f702028656c9798814f6f06f38e147715916085e81a42a7041927c3f6886fa060146601d7f9b337fabf91e28f2d63b20986faba3611