Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 12:37
Behavioral task
behavioral1
Sample
ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe
Resource
win10v2004-20231130-en
General
-
Target
ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe
-
Size
2.9MB
-
MD5
ff8a7dd8b1cb0420dd18810041d172a7
-
SHA1
cc166bc3eaa024aac4a2cdc02174ae87fcf47e28
-
SHA256
ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c
-
SHA512
edac57212b21a8046ab07213bf0ea51d1f3c5c9c539812fb1dffba6663b1f74e137991128f1c3135f4c1ab2ff4b470dcc6563ecae5079546dd1f6dfda210ba60
-
SSDEEP
49152:VUzeOdI+NDXIgqUPGPiTgvRZHrn7hQyZ9haNSAXpuNh/RgaJ2wf3:VUzekDpRGaTARZHPhQMCcyYvwwf3
Malware Config
Extracted
C:\RECOVER-kh1ftzx-FILES.txt
http://rfosusl6qdm4zhoqbqnjxaloprld2qz35u77h4aap46rhwkouejsooqd.onion/?access-key=dZAtaLpcTXzZ20UCN6pe4%2F0LYwMYJBe6KAumFcQiYUOFJQk37qxZ9gzg37ust8vXS%2FoIDWglQUPbJVcH%2FjC4XGqfiNyL0dltStiNZKlu0RIqzyNRtkFovrsr2tFsPcSZrNYFCn1fxLOvXwokyA%2FogdIQZE2hNNIPjjy6ZUXZu%2BT%2BbEk1PTfRB90ubPpNGda8bVLpsn4g6trXK4nuGXxYdr7wzSVfXfdgQXDRlmhFdyQNS4%2BeeEznqCLNdpRkyL%2BkEzLqGUKm21xRcwVOtuTshtuEiRJTz4hLcVSE2ZAg7r3ntBEESPFmXfnPHImcDMsDcM77%2FINqjO%2F7ZQ8VmtGjlg%3D%3D
Extracted
blackcat
-
enable_network_discovery
true
-
enable_self_propagation
true
-
enable_set_wallpaper
true
-
extension
kh1ftzx
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
>> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? Follow these simple steps to get everything back to normal: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://rfosusl6qdm4zhoqbqnjxaloprld2qz35u77h4aap46rhwkouejsooqd.onion/?access-key=${ACCESS_KEY}
Signatures
-
BlackCat
A Rust-based ransomware sold as RaaS first seen in late 2021.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2816 bcdedit.exe 1612 bcdedit.exe -
Renames multiple (7453) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Control Panel\Desktop\WallPaper = "C:\\Users\\Admin\\Desktop\\RECOVER-kh1ftzx-FILES.txt.png" ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\RECOVER-kh1ftzx-FILES.txt.png" ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\checkpoints-J0105378.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKACC.CFG ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.GIF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Amsterdam.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341344.JPG.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\BTOPENWORLD.COM.XML.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR45B.GIF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Hermosillo ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay.css ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files\Java\jre7\lib\jfr\checkpoints-profile.jfc.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Adobe.css ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099171.WMF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00168_.WMF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files\VideoLAN\VLC\skins\checkpoints-skin.dtd.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC.HXS.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\cpu.js ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\ChkrRes.dll.mui ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\checkpoints-J0301252.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-gibbous.png ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\checkpoints-Vevay.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\artifacts.xml ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\checkpoints-SO00152_.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00942_.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS_F_COL.HXK.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART3.BDR.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Amsterdam.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignright.gif.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\PurblePlace.exe.mui.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\checkpoints-BD21297_.GIF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Tokyo ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\checkpoints-ui.js.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\checkpoints-J0182888.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+10.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-search_zh_CN.jar ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105398.WMF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287643.JPG.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\CONCRETE.INF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\checkpoints-HH00636_.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\checkpoints-classlist.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewAttachmentIconsMask.bmp ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00423_.WMF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232171.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\1px.gif ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200279.WMF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01462_.WMF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151061.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152708.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files\Java\jre7\lib\zi\America\checkpoints-Yellowknife.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSGR3EN.LEX ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-uisupport.jar ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ja.properties.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04195_.WMF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0172035.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-over-DOT.png ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\checkpoints-AN02724_.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR4B.GIF ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msdaremr.dll.mui ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\button_left.gif.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLSLICER.DLL.IDX_DLL ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\Java\jre7\lib\javaws.jar ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\checkpoints-IN00915_.WMF.kh1ftzx ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2628 vssadmin.exe 228 vssadmin.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Control Panel\Desktop\WallpaperStyle = "0" ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3004 WMIC.exe Token: SeSecurityPrivilege 3004 WMIC.exe Token: SeTakeOwnershipPrivilege 3004 WMIC.exe Token: SeLoadDriverPrivilege 3004 WMIC.exe Token: SeSystemProfilePrivilege 3004 WMIC.exe Token: SeSystemtimePrivilege 3004 WMIC.exe Token: SeProfSingleProcessPrivilege 3004 WMIC.exe Token: SeIncBasePriorityPrivilege 3004 WMIC.exe Token: SeCreatePagefilePrivilege 3004 WMIC.exe Token: SeBackupPrivilege 3004 WMIC.exe Token: SeRestorePrivilege 3004 WMIC.exe Token: SeShutdownPrivilege 3004 WMIC.exe Token: SeDebugPrivilege 3004 WMIC.exe Token: SeSystemEnvironmentPrivilege 3004 WMIC.exe Token: SeRemoteShutdownPrivilege 3004 WMIC.exe Token: SeUndockPrivilege 3004 WMIC.exe Token: SeManageVolumePrivilege 3004 WMIC.exe Token: 33 3004 WMIC.exe Token: 34 3004 WMIC.exe Token: 35 3004 WMIC.exe Token: SeIncreaseQuotaPrivilege 3004 WMIC.exe Token: SeSecurityPrivilege 3004 WMIC.exe Token: SeTakeOwnershipPrivilege 3004 WMIC.exe Token: SeLoadDriverPrivilege 3004 WMIC.exe Token: SeSystemProfilePrivilege 3004 WMIC.exe Token: SeSystemtimePrivilege 3004 WMIC.exe Token: SeProfSingleProcessPrivilege 3004 WMIC.exe Token: SeIncBasePriorityPrivilege 3004 WMIC.exe Token: SeCreatePagefilePrivilege 3004 WMIC.exe Token: SeBackupPrivilege 3004 WMIC.exe Token: SeRestorePrivilege 3004 WMIC.exe Token: SeShutdownPrivilege 3004 WMIC.exe Token: SeDebugPrivilege 3004 WMIC.exe Token: SeSystemEnvironmentPrivilege 3004 WMIC.exe Token: SeRemoteShutdownPrivilege 3004 WMIC.exe Token: SeUndockPrivilege 3004 WMIC.exe Token: SeManageVolumePrivilege 3004 WMIC.exe Token: 33 3004 WMIC.exe Token: 34 3004 WMIC.exe Token: 35 3004 WMIC.exe Token: SeIncreaseQuotaPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeSecurityPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeTakeOwnershipPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeLoadDriverPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeSystemProfilePrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeSystemtimePrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeProfSingleProcessPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeIncBasePriorityPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeCreatePagefilePrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeBackupPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeRestorePrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeShutdownPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeDebugPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeSystemEnvironmentPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeChangeNotifyPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeRemoteShutdownPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeUndockPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeManageVolumePrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeImpersonatePrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeCreateGlobalPrivilege 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: 33 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: 34 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: 35 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe Token: SeBackupPrivilege 2828 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 28 PID 2964 wrote to memory of 2644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 28 PID 2964 wrote to memory of 2644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 28 PID 2964 wrote to memory of 2644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 28 PID 2644 wrote to memory of 3004 2644 cmd.exe 30 PID 2644 wrote to memory of 3004 2644 cmd.exe 30 PID 2644 wrote to memory of 3004 2644 cmd.exe 30 PID 2644 wrote to memory of 3004 2644 cmd.exe 30 PID 2964 wrote to memory of 2856 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 32 PID 2964 wrote to memory of 2856 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 32 PID 2964 wrote to memory of 2856 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 32 PID 2964 wrote to memory of 2856 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 32 PID 2856 wrote to memory of 2588 2856 cmd.exe 34 PID 2856 wrote to memory of 2588 2856 cmd.exe 34 PID 2856 wrote to memory of 2588 2856 cmd.exe 34 PID 2856 wrote to memory of 2588 2856 cmd.exe 34 PID 2964 wrote to memory of 1644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 35 PID 2964 wrote to memory of 1644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 35 PID 2964 wrote to memory of 1644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 35 PID 2964 wrote to memory of 1644 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 35 PID 1644 wrote to memory of 2616 1644 cmd.exe 37 PID 1644 wrote to memory of 2616 1644 cmd.exe 37 PID 1644 wrote to memory of 2616 1644 cmd.exe 37 PID 1644 wrote to memory of 2616 1644 cmd.exe 37 PID 2964 wrote to memory of 2700 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 38 PID 2964 wrote to memory of 2700 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 38 PID 2964 wrote to memory of 2700 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 38 PID 2964 wrote to memory of 2700 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 38 PID 2964 wrote to memory of 2484 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 39 PID 2964 wrote to memory of 2484 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 39 PID 2964 wrote to memory of 2484 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 39 PID 2964 wrote to memory of 2484 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 39 PID 2964 wrote to memory of 2708 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 42 PID 2964 wrote to memory of 2708 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 42 PID 2964 wrote to memory of 2708 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 42 PID 2964 wrote to memory of 2708 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 42 PID 2484 wrote to memory of 2512 2484 cmd.exe 44 PID 2484 wrote to memory of 2512 2484 cmd.exe 44 PID 2484 wrote to memory of 2512 2484 cmd.exe 44 PID 2484 wrote to memory of 2512 2484 cmd.exe 44 PID 2708 wrote to memory of 2628 2708 cmd.exe 45 PID 2708 wrote to memory of 2628 2708 cmd.exe 45 PID 2708 wrote to memory of 2628 2708 cmd.exe 45 PID 2964 wrote to memory of 2452 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 46 PID 2964 wrote to memory of 2452 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 46 PID 2964 wrote to memory of 2452 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 46 PID 2964 wrote to memory of 2452 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 46 PID 2452 wrote to memory of 2624 2452 cmd.exe 48 PID 2452 wrote to memory of 2624 2452 cmd.exe 48 PID 2452 wrote to memory of 2624 2452 cmd.exe 48 PID 2452 wrote to memory of 2624 2452 cmd.exe 48 PID 2964 wrote to memory of 1852 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 51 PID 2964 wrote to memory of 1852 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 51 PID 2964 wrote to memory of 1852 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 51 PID 2964 wrote to memory of 1852 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 51 PID 1852 wrote to memory of 1304 1852 cmd.exe 53 PID 1852 wrote to memory of 1304 1852 cmd.exe 53 PID 1852 wrote to memory of 1304 1852 cmd.exe 53 PID 2964 wrote to memory of 2780 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 54 PID 2964 wrote to memory of 2780 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 54 PID 2964 wrote to memory of 2780 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 54 PID 2964 wrote to memory of 2780 2964 ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe 54 PID 2780 wrote to memory of 2816 2780 cmd.exe 56 PID 2780 wrote to memory of 2816 2780 cmd.exe 56 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exeC:\Users\Admin\AppData\Local\Temp\ecea6b772742758a2240898ef772ca11aa9d870aec711cffab8994c23044117c.exe --access-token "hello"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "wmic csproduct get UUID"2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get UUID3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "fsutil behavior set SymlinkEvaluation R2L:1"2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\fsutil.exefsutil behavior set SymlinkEvaluation R2L:13⤵PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "fsutil behavior set SymlinkEvaluation R2R:1"2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\fsutil.exefsutil behavior set SymlinkEvaluation R2R:13⤵PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "iisreset.exe /stop"2⤵PID:2700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f3⤵PID:2512
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "vssadmin.exe Delete Shadows /all /quiet"2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "arp -a"2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\ARP.EXEarp -a3⤵PID:2624
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "wmic.exe Shadowcopy Delete"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\System32\Wbem\WMIC.exewmic.exe Shadowcopy Delete3⤵PID:1304
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "bcdedit /set {default}"2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\bcdedit.exebcdedit /set {default}3⤵
- Modifies boot configuration data using bcdedit
PID:2816
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "bcdedit /set {default} recoveryenabled No"2⤵PID:2928
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1612
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "cmd.exe /c for /F \"tokens=*\" %1 in ('wevtutil.exe el') DO wevtutil.exe cl \"%1\""2⤵PID:1068
-
C:\Windows\system32\cmd.execmd.exe /c for /F \"tokens=*\" %1 in ('wevtutil.exe el') DO wevtutil.exe cl \"%1\"3⤵PID:1124
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "vssadmin.exe Delete Shadows /all /quiet"2⤵PID:2244
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:228
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "wmic.exe Shadowcopy Delete"2⤵PID:3800
-
C:\Windows\System32\Wbem\WMIC.exewmic.exe Shadowcopy Delete3⤵PID:3240
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "cmd.exe /c for /F \"tokens=*\" %1 in ('wevtutil.exe el') DO wevtutil.exe cl \"%1\""2⤵PID:3456
-
C:\Windows\system32\cmd.execmd.exe /c for /F \"tokens=*\" %1 in ('wevtutil.exe el') DO wevtutil.exe cl \"%1\"3⤵PID:4048
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5990407a1d143432c6b6331a867d94d1d
SHA1a10d1978d1bfaf19b9734ff76c3a78a43b43593d
SHA2568f2214fc28cc7a91eaf4f45205f3b090912411c31eb265ae38f3fa9cef97f9a5
SHA512cb20ada1bb49ac6299c0d40b26e8fd8c70d5f35fb9efe47a3a3cdddabb89ace1b47541396784b2e7580b7bd91dcf414ba3bc67a54e56d7d544adb129c2b09dbc
-
Filesize
1KB
MD520012d62ab22730ca6346db05f5819f6
SHA16236431cc70d6905b95b323a81c015a4b476f888
SHA256586a861604dc00f0308a4370f4681e146672f6df13a0fa6f2caef7dba320c0da
SHA512f060c94443b94646af0fa349bddd9649bc64b32ddc00e330ffe6816e8c409af47b44f90ec364d12967f6b78480f195f35ac371a4a3a11d05deaf8d6a8f4739b9