Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe
Resource
win10v2004-20230915-en
General
-
Target
17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe
-
Size
138KB
-
MD5
254df705ae1572e5bb33fdf9bdd38bb6
-
SHA1
3d40b40f626cae4d3499e72288cfdfe409df72ac
-
SHA256
17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd
-
SHA512
60ba12b65eca7387733707eb27a39c076e9a0d3945555638262030b3bd32e8dd1d584ec59bcce26d96ef217f08a06c582289914229c19ad857ddde789474bf17
-
SSDEEP
3072:MbvdlTga8za7/aApO6fCR6kMgoXpOpo7KqXd4ljqEJSfMKRuF2f0xsxT626f/GAo:MDppOabdUj1J+MKRaKPLAm3zRd
Malware Config
Extracted
C:\Program Files (x86)\README ELECTRONIC.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7760) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened (read-only) \??\D: 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookSmallTile.scale-400.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteLargeTile.scale-125.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-100_contrast-black.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\ACEWSTR.DLL 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_download_audit_report_18.svg.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\AppxManifest.xml 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeWideTile.scale-200.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraLargeTile.contrast-white_scale-200.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-150.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-80_altform-unplated.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_OEM_Perp-ul-oob.xrm-ms 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-72_altform-unplated_contrast-black.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\liblogo_plugin.dll.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-200_contrast-white.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ha-Latn-NG\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square310x310\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-ppd.xrm-ms 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ppd.xrm-ms.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-64.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Grace-ul-oob.xrm-ms 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1036\MSO.ACL 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MicrosoftLogo.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\id\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\vlc.mo.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\clrcompression.dll 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ppd.xrm-ms 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-core-localization-l1-2-0.dll 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\fr-FR\MSFT_PackageManagement.strings.psd1.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sw-KE\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Services.Client.resources.dll 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BSSYM7.TTF.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-black_scale-200.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-private-l1-1-0.dll.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-threaddump.xml.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BREEZE\THMBNAIL.PNG.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ul-oob.xrm-ms.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ScreenSketchWide310x150Logo.scale-100_contrast-black.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\sunjce_provider.jar 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-black_scale-140.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-200_contrast-white.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\fr-FR\msdasqlr.dll.mui 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MediumTile.scale-200_contrast-black.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Retail-ul-phn.xrm-ms 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-200.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\next-arrow-down.svg.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ul-oob.xrm-ms 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-180.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\Microsoft Office\root\vfs\System\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-200_contrast-white.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSB.DLL 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.scale-200.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\kk\msipc.dll.mui.EMAIL=[[email protected]]ID=[142B4BFB2B4FD9BD].ELCTRONIC 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\mso30imm.dll 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\BadgeLogo.scale-400.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\Assets\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxLargeTile.scale-125.png 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\README ELECTRONIC.txt 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.xml 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 548 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2484 vssvc.exe Token: SeRestorePrivilege 2484 vssvc.exe Token: SeAuditPrivilege 2484 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2916 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4780 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 86 PID 4520 wrote to memory of 4780 4520 17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe 86 PID 4780 wrote to memory of 548 4780 cmd.exe 89 PID 4780 wrote to memory of 548 4780 cmd.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe"C:\Users\Admin\AppData\Local\Temp\17bf10e4dd21565658610824afa990f2f474c39a396510701425ef740343fdbd.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:548
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2024
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424B
MD5771c185bef12d25590f660e626f75c8d
SHA158b5ba8fdfe8536324ee29f1db014a8011b9c665
SHA25664d1a92068aa43e8d666a9f06984975287af4f879a841cbff2e6e2777c1386e6
SHA512db4e6515a47c4782222c178af8fa67be37cc7d4cdb2add717cc347f9e6ab45b78da934d358384f8bc46573ab803c5133158f26ab22606eac07d6de238049cad6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD5b979ecb221ff0e6ae7444c43e77f968d
SHA1fd2050ffce4aefb244865005e0d158d087d15625
SHA256a5d16aca933e19af62225a8433a8e56befaeda17d2bf4a5fad22a591da6b0adc
SHA51200b3a62df340570daa1152fad3306194a90b23b363b05c36a26062a6ba4c422e21d4b97676e30f2e4dc1d53a46bbf21020bb47f05677cc272d45ad6f6e0a9586
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize14KB
MD5f70bc659b30a4783b52476bacfc35b52
SHA194adde432bf040738812184a952e5bc636dea1b7
SHA256a220e85f247ad87cef9e61ab6748ab4a7711df4de484ceff6f0b60c8b75131b8
SHA5122175e96c586f828befbd704166a8f7a4637377a87971a7b2d646cd3bb46db8b87c616653037084a8381d2ab4f1d0dfb3c98ac3cae8ca3a1a124fed75fc45acc1