Analysis
-
max time kernel
426s -
max time network
429s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2023, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe
Resource
win10v2004-20230831-en
General
-
Target
c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe
-
Size
138KB
-
MD5
ceececadd6c0a7265c3ca3d01ec9d20f
-
SHA1
6154b81d146a4c7dedbbb546081628626a20e469
-
SHA256
c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20
-
SHA512
cef796740651ce4231748928eec48540e2d0dc68770cb88e3f61ca85c3716761a521a1d66adfe6fbdd37edf5e75d5d8fa7d8eee5d256a9b4f41dc1b9812c86f9
-
SSDEEP
3072:tPgv1uTga8za7/aApO6fCR6kMgNjTX8jI8VD/dJJO04aN5uvvmRE7xIxT62B009Q:tKZTMPVDdzR1N5sAxKN9dRd
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (11342) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\Control Panel\International\Geo\Nation c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened (read-only) \??\D: c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessDemoR_BypassTrial365-ppd.xrm-ms c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.altform-unplated_targetsize-48.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\MedTile.scale-100.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\download-btn.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QRYINT32.DLL.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_contrast-black.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files (x86)\Microsoft\EdgeWebView\Application\116.0.1938.62\ResiliencyLinks\Trust Protection Lists\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\acrobat_parcel_generic_32.svg.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\msptlsimm.dll c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\msedgeupdateres_mi.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\Attribution\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\View3d\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\uk-ua\ui-strings.js.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoViewer.dll.mui c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\osfintlimm.dll c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ACEODEXL.DLL c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Retail-pl.xrm-ms c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyShare-Dark.scale-125.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_ja.jar c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Bus Schedule.pdf.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\CommonUtils.winmd c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-pl.xrm-ms.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nb-no\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\msedgeupdateres_uk.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\Pester.bat c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\RICEPAPR.ELM c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MotionController_Hero.jpg c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48_altform-unplated.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Scientific.targetsize-20_contrast-white.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\SmallTile.scale-125_contrast-black.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\msix.dll c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.commons.logging_1.1.1.v201101211721.jar.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application_zh_CN.jar.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\ui-strings.js.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\Internet Explorer\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\FBIBLIO.DLL.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected]=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\vlc.mo c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ppd.xrm-ms.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\OutlookMailSmallTile.scale-200.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\msvcp120.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.177.11\msedgeupdateres_en-GB.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\chrome_elf.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\xmsrv.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\ui-strings.js c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_MouseNose.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\REFINED\THMBNAIL.PNG c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\1033\GrooveIntlResource.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_ja.jar.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\AppxSignature.p7x c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\FILE ENCRYPTED.txt c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_zh_4.4.0.v20140623020002.jar c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-24_contrast-white.png c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2492 vssadmin.exe 1472 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4692 vssvc.exe Token: SeRestorePrivilege 4692 vssvc.exe Token: SeAuditPrivilege 4692 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 7156 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 348 wrote to memory of 2060 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 88 PID 348 wrote to memory of 2060 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 88 PID 2060 wrote to memory of 2492 2060 cmd.exe 90 PID 2060 wrote to memory of 2492 2060 cmd.exe 90 PID 348 wrote to memory of 7780 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 106 PID 348 wrote to memory of 7780 348 c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe 106 PID 7780 wrote to memory of 1472 7780 cmd.exe 108 PID 7780 wrote to memory of 1472 7780 cmd.exe 108 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe"C:\Users\Admin\AppData\Local\Temp\c638ac1eeef2c97901d6a67e8669a265fecb16eeccda7c49b47e78667cc1fe20.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2492
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:7780 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1472
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:648
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330B
MD504ff194c9661cb2e9602921f806618d5
SHA179efc9c5ac8680178f9652bf9abf814445859769
SHA256be13ce3677357d50cd909b8acb34721a3a683539f40e05d978ee44ced8e1fdbe
SHA5129e69960e4ea93625c8b40d93420a2b6186af642efce246c6f627c173e18edc392a558cfd3245c9aa5bac4150f5595d4a47f9360d088d6a800a705f72c719161c
-
C:\Program Files (x86)\Microsoft\EdgeCore\116.0.1938.62\msedge.dll.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival
Filesize243.4MB
MD5a8fa7257f6a649c555929e34599c52a2
SHA13d8d2993e8dea973f93041c22af6e65c7371b058
SHA256398e274f6d51e82618cef1b74cff12a509ccae533a594503f1da44d60ae6cb84
SHA5127607eef39b23b21a7c4fb1c973968bfcce63c201e8925e1ac1649085d0dc8083127929aced242e98c88ea753de098fa05147c01eae1d0c3f29347ee34a26a162
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3334BD0-12B8-4B45-9E44-89AF8D41F229}\MicrosoftEdge_X64_116.0.1938.62.exe.EMAIL=[[email protected]]ID=[A7BF40638C0B7184].rival
Filesize145.6MB
MD5bad3ab7cca9e6d182e05d7ab781274ab
SHA1b48947c09aada5a39bc67481a0099a9275bea59f
SHA256a8fd9c2fdc40cb45970b4ed5305e4e8d35137d4dddaa5b5b9913b27ec18f1bdf
SHA5128e48e27b2ea296eba07bc4f67a280e892860ed5568f303a8ec35ee7240d35e587357d6c2cf562df06fac575f34bdf5ae1d62500298c988def2ad09c9fd523559
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\116.0.1938.62\ResiliencyLinks\EdgeWebView.dat.DATA
Filesize8KB
MD57a3b05a64f11e3048b1f0395f5e57c94
SHA17cf5dfcff76b53cf9ba26b1f782b0fcbff3df4f6
SHA256287a351282b09470576c7d5c22dadd1a0377c76246dee2f89c969a51b97ca79f
SHA512db8e06579af13b4112c431ba864aa34e4049eaaac2537976e6b54fa2c0e97cf9e8dae6971f188a9f932d5b62084a1a7a848440681bceff3167e1bc55784cdd94
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD5ad1550ededb9ae33836bed3a8e020bb6
SHA1d97f555fafad1373359139e9746e2a7a619ecb97
SHA256b467849d6c685359359d542f6a565dba1ea20847ac97a79b4689fd61ee1702e1
SHA512e7db008eb29622ec2dcb3fdd7c911a2f1539646a713aa873c60c8f5d0ff3338b1ad11e25e3c104d8d5600b3e4d69e2c2f01ccc0f5e3c048a4d1c330f4e8b2537
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD5f0c52b5cef3946494f0d33d8147f23c6
SHA12990021322c21c9aed04719a96e722ae584034b7
SHA2564dee12edb94732465db579c7525e200fd54b367c076a24cf5f20ca14f21f00cd
SHA512b676a309dc56e3d3018f5c3c13c93827fbd74d70e1a6f73d29331a51b402d2ec7f569cfad6075f894081b13355ad96ee51973de0f6361297fef2d83c4e61fce8