Resubmissions
30-07-2023 06:59
230730-hsjknsgd78 1030-07-2023 06:57
230730-hrd9kagd75 1028-07-2023 15:26
230728-svbyqadh66 10Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28-07-2023 15:26
Static task
static1
Behavioral task
behavioral1
Sample
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe
Resource
win10v2004-20230703-en
General
-
Target
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe
-
Size
320KB
-
MD5
cb7786ac2d9c0b586ccbe12b3bc32693
-
SHA1
4d40f8743c194671a96211ee6b4c751a4bf50871
-
SHA256
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453
-
SHA512
cee77848b9bed772e32aca5009ebde34bf1ef1ad62197630a20d9c9de3905e09881a9dc639bd56bc44f499815ed92cbc93d254423793f7bec58a4ff2e42a593e
-
SSDEEP
6144:Vk1F9vhVI8vzPW2t1BOGu1CuDq1hzF0r2Z:VeF9jI8vzPnt7YCF0SZ
Malware Config
Signatures
-
Clop
Ransomware discovered in early 2019 which has been actively developed since release.
-
Renames multiple (183) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 13 IoCs
Processes:
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exedescription ioc process File opened for modification C:\Users\Admin\Searches\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Music\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe File opened for modification C:\Users\Admin\Links\desktop.ini 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exedescription ioc process File opened (read-only) \??\F: 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exepid process 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exeWMIC.exeWMIC.exedescription pid process Token: SeBackupPrivilege 2700 vssvc.exe Token: SeRestorePrivilege 2700 vssvc.exe Token: SeAuditPrivilege 2700 vssvc.exe Token: SeIncreaseQuotaPrivilege 1976 WMIC.exe Token: SeSecurityPrivilege 1976 WMIC.exe Token: SeTakeOwnershipPrivilege 1976 WMIC.exe Token: SeLoadDriverPrivilege 1976 WMIC.exe Token: SeSystemProfilePrivilege 1976 WMIC.exe Token: SeSystemtimePrivilege 1976 WMIC.exe Token: SeProfSingleProcessPrivilege 1976 WMIC.exe Token: SeIncBasePriorityPrivilege 1976 WMIC.exe Token: SeCreatePagefilePrivilege 1976 WMIC.exe Token: SeBackupPrivilege 1976 WMIC.exe Token: SeRestorePrivilege 1976 WMIC.exe Token: SeShutdownPrivilege 1976 WMIC.exe Token: SeDebugPrivilege 1976 WMIC.exe Token: SeSystemEnvironmentPrivilege 1976 WMIC.exe Token: SeRemoteShutdownPrivilege 1976 WMIC.exe Token: SeUndockPrivilege 1976 WMIC.exe Token: SeManageVolumePrivilege 1976 WMIC.exe Token: 33 1976 WMIC.exe Token: 34 1976 WMIC.exe Token: 35 1976 WMIC.exe Token: SeIncreaseQuotaPrivilege 1976 WMIC.exe Token: SeSecurityPrivilege 1976 WMIC.exe Token: SeTakeOwnershipPrivilege 1976 WMIC.exe Token: SeLoadDriverPrivilege 1976 WMIC.exe Token: SeSystemProfilePrivilege 1976 WMIC.exe Token: SeSystemtimePrivilege 1976 WMIC.exe Token: SeProfSingleProcessPrivilege 1976 WMIC.exe Token: SeIncBasePriorityPrivilege 1976 WMIC.exe Token: SeCreatePagefilePrivilege 1976 WMIC.exe Token: SeBackupPrivilege 1976 WMIC.exe Token: SeRestorePrivilege 1976 WMIC.exe Token: SeShutdownPrivilege 1976 WMIC.exe Token: SeDebugPrivilege 1976 WMIC.exe Token: SeSystemEnvironmentPrivilege 1976 WMIC.exe Token: SeRemoteShutdownPrivilege 1976 WMIC.exe Token: SeUndockPrivilege 1976 WMIC.exe Token: SeManageVolumePrivilege 1976 WMIC.exe Token: 33 1976 WMIC.exe Token: 34 1976 WMIC.exe Token: 35 1976 WMIC.exe Token: SeIncreaseQuotaPrivilege 2260 WMIC.exe Token: SeSecurityPrivilege 2260 WMIC.exe Token: SeTakeOwnershipPrivilege 2260 WMIC.exe Token: SeLoadDriverPrivilege 2260 WMIC.exe Token: SeSystemProfilePrivilege 2260 WMIC.exe Token: SeSystemtimePrivilege 2260 WMIC.exe Token: SeProfSingleProcessPrivilege 2260 WMIC.exe Token: SeIncBasePriorityPrivilege 2260 WMIC.exe Token: SeCreatePagefilePrivilege 2260 WMIC.exe Token: SeBackupPrivilege 2260 WMIC.exe Token: SeRestorePrivilege 2260 WMIC.exe Token: SeShutdownPrivilege 2260 WMIC.exe Token: SeDebugPrivilege 2260 WMIC.exe Token: SeSystemEnvironmentPrivilege 2260 WMIC.exe Token: SeRemoteShutdownPrivilege 2260 WMIC.exe Token: SeUndockPrivilege 2260 WMIC.exe Token: SeManageVolumePrivilege 2260 WMIC.exe Token: 33 2260 WMIC.exe Token: 34 2260 WMIC.exe Token: 35 2260 WMIC.exe Token: SeIncreaseQuotaPrivilege 2260 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 760 wrote to memory of 2856 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2856 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2856 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 2856 wrote to memory of 1976 2856 cmd.exe WMIC.exe PID 2856 wrote to memory of 1976 2856 cmd.exe WMIC.exe PID 2856 wrote to memory of 1976 2856 cmd.exe WMIC.exe PID 760 wrote to memory of 2764 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2764 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2764 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 2764 wrote to memory of 2260 2764 cmd.exe WMIC.exe PID 2764 wrote to memory of 2260 2764 cmd.exe WMIC.exe PID 2764 wrote to memory of 2260 2764 cmd.exe WMIC.exe PID 760 wrote to memory of 1676 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1676 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1676 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 1676 wrote to memory of 592 1676 cmd.exe WMIC.exe PID 1676 wrote to memory of 592 1676 cmd.exe WMIC.exe PID 1676 wrote to memory of 592 1676 cmd.exe WMIC.exe PID 760 wrote to memory of 692 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 692 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 692 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 692 wrote to memory of 1640 692 cmd.exe WMIC.exe PID 692 wrote to memory of 1640 692 cmd.exe WMIC.exe PID 692 wrote to memory of 1640 692 cmd.exe WMIC.exe PID 760 wrote to memory of 1456 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1456 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1456 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 1456 wrote to memory of 1536 1456 cmd.exe WMIC.exe PID 1456 wrote to memory of 1536 1456 cmd.exe WMIC.exe PID 1456 wrote to memory of 1536 1456 cmd.exe WMIC.exe PID 760 wrote to memory of 3068 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 3068 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 3068 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 3068 wrote to memory of 2264 3068 cmd.exe WMIC.exe PID 3068 wrote to memory of 2264 3068 cmd.exe WMIC.exe PID 3068 wrote to memory of 2264 3068 cmd.exe WMIC.exe PID 760 wrote to memory of 1436 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1436 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1436 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 1436 wrote to memory of 2156 1436 cmd.exe WMIC.exe PID 1436 wrote to memory of 2156 1436 cmd.exe WMIC.exe PID 1436 wrote to memory of 2156 1436 cmd.exe WMIC.exe PID 760 wrote to memory of 2024 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2024 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2024 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 2024 wrote to memory of 2596 2024 cmd.exe WMIC.exe PID 2024 wrote to memory of 2596 2024 cmd.exe WMIC.exe PID 2024 wrote to memory of 2596 2024 cmd.exe WMIC.exe PID 760 wrote to memory of 2948 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2948 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 2948 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 2948 wrote to memory of 2532 2948 cmd.exe WMIC.exe PID 2948 wrote to memory of 2532 2948 cmd.exe WMIC.exe PID 2948 wrote to memory of 2532 2948 cmd.exe WMIC.exe PID 760 wrote to memory of 1636 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1636 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1636 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 1636 wrote to memory of 1296 1636 cmd.exe WMIC.exe PID 1636 wrote to memory of 1296 1636 cmd.exe WMIC.exe PID 1636 wrote to memory of 1296 1636 cmd.exe WMIC.exe PID 760 wrote to memory of 1952 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1952 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 760 wrote to memory of 1952 760 9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe cmd.exe PID 1952 wrote to memory of 756 1952 cmd.exe WMIC.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe"C:\Users\Admin\AppData\Local\Temp\9d0026a17b1bd281baf4cda8f6c7e52b9ed2edd180f8e3b85703931c50f11453.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E65325A1-B7B7-48FA-884F-CFA212BDB978}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E65325A1-B7B7-48FA-884F-CFA212BDB978}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C84EE877-5F48-4364-B97D-C95D9A78FC42}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C84EE877-5F48-4364-B97D-C95D9A78FC42}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{696E7880-9336-4BD1-8FE5-CE3812A01D9A}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{696E7880-9336-4BD1-8FE5-CE3812A01D9A}'" delete3⤵PID:592
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B29369F6-1A76-4D6C-8468-1112A4A7144B}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B29369F6-1A76-4D6C-8468-1112A4A7144B}'" delete3⤵PID:1640
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F38D5385-7790-4546-B54A-462C8D302DE1}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F38D5385-7790-4546-B54A-462C8D302DE1}'" delete3⤵PID:1536
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{48FCE597-3DF4-4830-86A1-DFDF28FA95F6}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{48FCE597-3DF4-4830-86A1-DFDF28FA95F6}'" delete3⤵PID:2264
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EE156971-7A43-40AE-8728-C837626C98AF}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EE156971-7A43-40AE-8728-C837626C98AF}'" delete3⤵PID:2156
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FC6B8069-C083-4B1E-8270-0A7A19C7EF45}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FC6B8069-C083-4B1E-8270-0A7A19C7EF45}'" delete3⤵PID:2596
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DA52D676-6DBA-4263-AB84-4C6F161DB140}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DA52D676-6DBA-4263-AB84-4C6F161DB140}'" delete3⤵PID:2532
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6EA46DB1-DB04-4516-9084-6F80B5A78DDE}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6EA46DB1-DB04-4516-9084-6F80B5A78DDE}'" delete3⤵PID:1296
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{74D04A56-E2FA-4580-885D-9DD72402EDCA}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{74D04A56-E2FA-4580-885D-9DD72402EDCA}'" delete3⤵PID:756
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{20A56F80-1895-41DB-A5AF-7C27AAEBF117}'" delete2⤵PID:344
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{20A56F80-1895-41DB-A5AF-7C27AAEBF117}'" delete3⤵PID:1760
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F952C30E-CC2E-48A2-AD6E-0ED9BD546C87}'" delete2⤵PID:2292
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F952C30E-CC2E-48A2-AD6E-0ED9BD546C87}'" delete3⤵PID:2536
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{61A0A08C-0A73-4CB4-A288-308DE7A45B97}'" delete2⤵PID:2572
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{61A0A08C-0A73-4CB4-A288-308DE7A45B97}'" delete3⤵PID:2448
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5CD49222-CE51-45F1-B986-E89641B076DB}'" delete2⤵PID:1576
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5CD49222-CE51-45F1-B986-E89641B076DB}'" delete3⤵PID:2316
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4F44CAA3-390E-4909-8266-9413DFCA4D0F}'" delete2⤵PID:2116
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4F44CAA3-390E-4909-8266-9413DFCA4D0F}'" delete3⤵PID:2384
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E3AD3FCC-4BEA-4145-B94B-576C5C36CB5A}'" delete2⤵PID:868
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E3AD3FCC-4BEA-4145-B94B-576C5C36CB5A}'" delete3⤵PID:1404
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{81C7D94F-0024-4D75-BA29-2CF29325250A}'" delete2⤵PID:1712
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{81C7D94F-0024-4D75-BA29-2CF29325250A}'" delete3⤵PID:1608
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1021B
MD5cc40a2ba1af80ab73e9496c5a1b5dc2e
SHA15a927aad3208578199780627917985c677fd0f07
SHA256a8363ff2d8ac192a8edd3aa9c8f7f3966ddefe1a3b65a9bc0566c2c79189fee4
SHA5125faaf001854fc9f2d865fa9b1dc46e7aacabb4b6104323dc1c9fe142141871a735fdc7780f36ca4736867aaca7212472a1ac6197cd60c1f72782a9de034f4b45