Overview
overview
10Static
static
10samples (2) (3).zip
windows7-x64
1samples (2) (3).zip
windows10-2004-x64
1100b8bfff5...48.exe
windows7-x64
1100b8bfff5...48.exe
windows10-2004-x64
116b5122423...49.exe
windows7-x64
716b5122423...49.exe
windows10-2004-x64
72727dde741...98.exe
windows7-x64
92727dde741...98.exe
windows10-2004-x64
929dd920ac1...e5.zip
windows7-x64
129dd920ac1...e5.zip
windows10-2004-x64
12001.exe
windows7-x64
92001.exe
windows10-2004-x64
93c5ffe21fd...017.js
windows7-x64
13c5ffe21fd...017.js
windows10-2004-x64
148493bb68b...20.exe
windows7-x64
1048493bb68b...20.exe
windows10-2004-x64
10568a79ce58...19.exe
windows7-x64
9568a79ce58...19.exe
windows10-2004-x64
957de0d2d59...fe.exe
windows7-x64
957de0d2d59...fe.exe
windows10-2004-x64
75e34ceeaf6...05.exe
windows7-x64
15e34ceeaf6...05.exe
windows10-2004-x64
16e2db44578...ac.exe
windows7-x64
96e2db44578...ac.exe
windows10-2004-x64
975342ada93...76.exe
windows7-x64
875342ada93...76.exe
windows10-2004-x64
67e623dca8a...e2.exe
windows7-x64
107e623dca8a...e2.exe
windows10-2004-x64
1087f2db714e...7e.exe
windows7-x64
887f2db714e...7e.exe
windows10-2004-x64
88dcb1af1e7...b0.exe
windows7-x64
78dcb1af1e7...b0.exe
windows10-2004-x64
7Analysis
-
max time kernel
38s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 15:12
Behavioral task
behavioral1
Sample
samples (2) (3).zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
samples (2) (3).zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
16b51224239d3671b1af3e8f2656a2ad1e7f5fb9acb09111a95461338a841b49.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
16b51224239d3671b1af3e8f2656a2ad1e7f5fb9acb09111a95461338a841b49.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
2727dde7418284bd2b16a032346a9c6921cbfb5e950ad21c9468792b71ee3898.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
2727dde7418284bd2b16a032346a9c6921cbfb5e950ad21c9468792b71ee3898.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
29dd920ac1453b5be12fcef5af45690dbbe625e985f6692e237a057e832937e5.zip
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
29dd920ac1453b5be12fcef5af45690dbbe625e985f6692e237a057e832937e5.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
2001.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
2001.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
3c5ffe21fd24c4daf62f5190d96e65bf7a25232ef9ec956a77db910e90750017.js
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
3c5ffe21fd24c4daf62f5190d96e65bf7a25232ef9ec956a77db910e90750017.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
48493bb68bc1062b11cc505e444db288ec6cba0c979d10a9b5a3ea775daf9420.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
48493bb68bc1062b11cc505e444db288ec6cba0c979d10a9b5a3ea775daf9420.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
57de0d2d5945db11d6c845459419a1b48a5cf415a7a0866c40b03afaec6fb4fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
57de0d2d5945db11d6c845459419a1b48a5cf415a7a0866c40b03afaec6fb4fe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
5e34ceeaf60a7cdfaeee0443a87edb92115727130323314628503dfe755b9505.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
5e34ceeaf60a7cdfaeee0443a87edb92115727130323314628503dfe755b9505.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
6e2db44578ff2fdcab7938517973ed9bfd3532d7b29b7798ceb9f04ed079c1ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
6e2db44578ff2fdcab7938517973ed9bfd3532d7b29b7798ceb9f04ed079c1ac.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
75342ada938ea71dc863ee603a075a3ff7cbd759a091879f065a849650097a76.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
75342ada938ea71dc863ee603a075a3ff7cbd759a091879f065a849650097a76.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
7e623dca8a26a45440c331e383ac6ce3783d5c1bd60b91ee91ce0cc5841633e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
7e623dca8a26a45440c331e383ac6ce3783d5c1bd60b91ee91ce0cc5841633e2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
87f2db714eac44b77889c850b8b6b55e2b117c88ac8f8923b47ac89fecadab7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
87f2db714eac44b77889c850b8b6b55e2b117c88ac8f8923b47ac89fecadab7e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
8dcb1af1e7886834252394e9710ee72b9bfa910779c4ea041831d0622efa85b0.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
8dcb1af1e7886834252394e9710ee72b9bfa910779c4ea041831d0622efa85b0.exe
Resource
win10v2004-20231222-en
General
-
Target
568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe
-
Size
78KB
-
MD5
0163a114f3cd11d4a2d3c1374bf4878d
-
SHA1
96b9b8510641a18f7920f48078087001a16db568
-
SHA256
568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919
-
SHA512
0104fedf9a6cc994a267f743c8fa3324af388e2191dec5aff1eedf7345a1d0bbb4829db2b846dd6f7e63e2e4c04aaa0d315ed8b7361c8fbbd8b9f0096e90cba0
-
SSDEEP
1536:freiQwer+Gu3gzQ6qOAI2PneemZcsABvYPpXUJqnwBWH9R1X3Jq5:yiPGu34Q6pAgeJsOOYByXHJ
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (482) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VmHslOfI.lnk 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VmHslOfI.lnk 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe -
Loads dropped DLL 1 IoCs
pid Process 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\VmHslOfI = "C:\\Users\\Admin\\AppData\\Local\\Mozilla\\nEBOLQBm.exe" 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(cm).wmf 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\ApproveWatch.eps 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Seyes.emf 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresplm.dat 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwritalm.dat 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee100.tlb 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\White_Chocolate.jpg 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2828 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe Token: SeBackupPrivilege 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe Token: SeSecurityPrivilege 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe Token: SeDebugPrivilege 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe Token: SeBackupPrivilege 2824 vssvc.exe Token: SeRestorePrivilege 2824 vssvc.exe Token: SeAuditPrivilege 2824 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2828 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 28 PID 1520 wrote to memory of 2828 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 28 PID 1520 wrote to memory of 2828 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 28 PID 1520 wrote to memory of 2828 1520 568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe 28 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe"C:\Users\Admin\AppData\Local\Temp\568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet2⤵
- Interacts with shadow copies
PID:2828
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD507517915a459923a5a1096d77d9b35bc
SHA19c431640331275d90f8591851c7167159df79a36
SHA25666dd04df2b29645bfb9c491ce29daf7834a84dcd31f2b19049b07f632d28f7ba
SHA512762b7739e4db4edcb8a7ff963b7f0835ce575eea6d0fd3c97676c7c701a01cdd14cab7cfc1abe703e9ef305cd1a951565918076c0d4373766109c66685ed1248
-
Filesize
2KB
MD58e5c26eacb28d75b31d79d926cba19c7
SHA1b7d93d5f6ad3f417c2ff5127fac880d88958f770
SHA2565d01fb1510aad5ba5b2dfebdee406cb72c378d8c7d072307f755c9a0dcd2f594
SHA512a29349ad2cc72dc41561b48e8f5c637f5ff59fbb2566ce79dbca595f07aca8dedb15456c8141b8ad5a41cacafbf85ce28b3172bdc56b5fe5dde35ae0c561351e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\TAB_ON.GIF
Filesize2KB
MD5e4ef5753cd3589d9332c14e73b273a88
SHA1007f7d1fcd2d18dfc1f9e9e0bb52aa6ecbac8dec
SHA256b7b105221fb425518e28b27907c81af3cd56d9b262edc700975e9d8a5a9b3d2e
SHA51280682ede69c73e5051b5543a9fc17b9cbe4a2aaeeda53157a5f16e7959209eefdd8615eabbae34de7040f22b77470cb2baf658afcd437bba93e5293462ebc7e8
-
Filesize
79KB
MD5991936d293e4e8a4dd98041cf15e7dbf
SHA1bb669422c7f50de5f179a72d21150e148e82a051
SHA2566edc93fd3692b0857eef9b74babcb5a3de842bce064d4abdba2e4fab1398d3a6
SHA5121fe020dee023dc899e8fccb912b23889db380b6321c44f13dea71e62c77c1bb5e3dbbd3eeaee9d5c09f3c2bfc68be3f43b6fda8e2f8c41cc424051c917ecc7fd
-
C:\ProgramData\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\packages\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi
Filesize92KB
MD5c31d82610451bc55f1c31e124e36e4ba
SHA12acf1cc40af32056b657da81e4173450fa1b43f8
SHA256c39aa3fc820d316739c8997f4b1261c17edfd64dcec62532f0f4eec9953dc392
SHA5124fbf4a41c26f5dbe0546675057e2d5bfc6763720829e44f1eb2cda0cde2325f81520a6602918f17025b503ebdc855e6fa4e3bb514e98021c833561dce5bdac13
-
C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\AcroFnt09.lst!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize9KB
MD509403f4076416e7be4aa3a0068350085
SHA1a2dcc7de9d6f9c80cf37d5e1e69ee71399e088de
SHA256249fea9414019d6cf08f5a780e450f8243768a0dc46ff384b76e4360bfc6c3ca
SHA51248f703fdef4da7cfafe9b52e069bb3a75db822d5799db7e3e8f55eeae49fac3b4b7539d32714aec9c0ca8859b2fbefe442d9f1e74016e8095c98d08b01fb5867
-
C:\Users\Admin\AppData\Local\IconCache.db!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize92KB
MD5ccd30a6c189878a66220b78775b7942a
SHA1d5ee0d7d73817c3469ec3d99a225b64c77002e7d
SHA256d8c69af134b1d65179f8cc4e7e5ac29cf2722a62513b269e116e947725fa66e6
SHA5127c347177a7b17668257f61717f659c50a98e8e4a884f851951f69dc0c22a488f395a7f6f6ef03055e8d1350d4a73550427fec5e628da9253157b96a88cc5e3ee
-
Filesize
29KB
MD5279c057c301d4e5b5ecc638a3c58c932
SHA1ee4dfeb225375f2747cd01e26bdb78369f59d6d1
SHA25652a930e794f72198dd0011889ce9da276b02bacca432e70a225f06ca204461ae
SHA512791ee8ce2e9d03becc4c2e826706ee909a5f8295b75dd514df84dd9c8347b34cd70af3070652aed2e3fcf8777506a10cb25aa3406b18c2d836d1049f467b69c4
-
Filesize
29KB
MD59cb794e8485735b0155443d6fe8b0d8e
SHA163d8b6e86ad1347c23935fe96a5933458e8c31fd
SHA256ee031a7fd02b2f1ab7154a9f2676b42307f0dab19f47a8c49800a44cf5f2b421
SHA512f156b277e7bc24891eacfc8486cd9a0412244818fd425600aa411ebbfd7aa44576496bbe5fb9d77d2ddbe6fe9d8a0eebba9c32dc9a678bdcb51bfa9e91de078a
-
Filesize
1KB
MD5b657c23074a14a75893a996660e9414d
SHA14f3cb3bdcccc61c7fc37453fe8f5c64ffe449c24
SHA2563878e536d1f6b8ae34fb32e93319eb71a0727b83224e4d70c709dbd2e0805e6b
SHA5129ec122dd78a27989cdfef78858db6a4d7a2331cec659807e29c6c72facce38c8610d15999f8e4284270f64d878c41cfa5eaf173a78a4ef7809034b0b6dda58e1
-
C:\Users\Admin\Desktop\AddRepair.html!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize263KB
MD598ceaa025e11f2a651130805f3d541cf
SHA1053a1ecbee6328480db9953a887110f12953e31a
SHA2569b3a76cc05c79a6a0be359ec4a05fc5f4a0b4a9a68846368cbcd4a8f1d05f504
SHA512db4996f213d57f0bf392566ec7907548e125d258e1e009399b79af299d533fbef6c3e544b99a5e9119b1fdf8b90023a9722f8ff4600874bf93767ae58c07e941
-
C:\Users\Admin\Desktop\BackupCheckpoint.3gpp!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize275KB
MD5ec4b37175c1d0dba183112d6b555850b
SHA14fbf9a5f20f9c6ba3635844e6228f5a60c225064
SHA2565609573b45d7c9a24e2ac73d84bd25efefae24c8090920813ed171365cf05f1f
SHA512edad97a554753ba46b9318e6beeadcdf68ea126998d816833e107933e3a661ccea94077191b6fe4f807c02c2e5120f2f7848668a12c36e6db246a01d4f5342af
-
C:\Users\Admin\Desktop\CompareClear.wmf!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize337KB
MD5941d427896461fa36353261075ca38d3
SHA1038618652b3563eb4e85cc6e74179c53f797d22e
SHA25638a9d2ee88b66ecb78cd453f46a33cd4960577419b64c97858b49a664b51f264
SHA512b46ad1bee3d1c99f4c3675db1f1e5a2b247200d852583b6feb28a5e9c4b1c627de96a5ab2fd93cfa9ad2a26e659f8e429cd99172e36405128402bf1154d2004f
-
C:\Users\Admin\Desktop\ConvertToInstall.xltm!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize425KB
MD5b5e9b0eebc32d00ee6793e3d5eef6694
SHA1169ec08b17f1e637cfe950a257f9992962de7293
SHA256dce8c8dafab03448aa9c265b2610213c1ee6bddb59bd89806fd53878450812b6
SHA5124d66675509394e65a814173fd0631eaf089b2222e3d9de732d9b8365eef5f410de80a19979dbc1f8962413150820147aa5d333719dcd0004ec28fbcf8314343a
-
C:\Users\Admin\Desktop\DenyExport.ADT!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize93KB
MD5be0729fa9fd689668a31581445031d09
SHA15cf955d9ad945bc3ad7f91e6db4d80692fb109ed
SHA256f96f9c155c165f15ea900a907cc76271afbfd30862173178ea1faf5c4070f3d3
SHA512e146ee9cc04515ce0fcb80eb7746b93ba0aaedb35ed098db9e24f0b00ade620b2f1759c36cba3f51374373626ee27482f312a3569c5b963fafdba6d2be619456
-
C:\Users\Admin\Desktop\ExpandReceive.dot!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize93KB
MD592811745064a35901e2047cf1c494f13
SHA177a87c74b03e743b63aff86106e8430e5a120ed0
SHA2566eeeb3eec49dd1ef09e23bc52d7d57c9dbe8981138030f6ff7e7d43269bb5441
SHA51200ea0ad8c063a5a9b4864a4aa62f91dacf3a0cb1f718995dc59a494120ade7b8cd846ed6dbd0339b4defe4943d88e3bd50437acb311584a20edee3ee1dcb01c8
-
C:\Users\Admin\Desktop\ImportSuspend.pps!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize325KB
MD5c7846d2373ed8a374790cfdd6d228149
SHA1d63ba7fe77ddd3710001df2d93a0a126e1d03eac
SHA256b431910272b4764ff7ecdd0e78af6dc487c0391e08633b6997eb5a7a7157d2c2
SHA512af3462ad8ffcea3026462f6d806c2372bd5577c8041baaa1299c8731834c0eebf7efbdbb9d22fc74a43aee0b04166dfbf342112e425c0f77315e91d4133c6427
-
C:\Users\Admin\Desktop\ProtectImport.DVR-MS!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize176KB
MD5b1ea445faf5ffcfac67beeb940613335
SHA1d8eafbeeab15c055837b9bff80f222a04c8ffd14
SHA256f7fd5541387adac36b87b095ee26e52ef53f036453540c8ede742ca4538406d5
SHA51265327a15925c8f3d8aadd495368ab93a5af8fdaa19fe240263ee440dcd83ad73655498b28334e2619666856f4813464748e2ccf3806b6d995d0f0164ee384d55
-
C:\Users\Admin\Desktop\PublishReset.M2T!==SOLUTION OF THE [email protected]==.Black_OFFserve
Filesize350KB
MD5c6696d2e8d767e606f7e40ed783c4fc6
SHA113b785b7e7e34e6e9d6357e041cb14709f7ba7be
SHA256728330fa2f9321a3d881a1635825b4a7ea18eb30bd8d557147251e71348b87ed
SHA5124fcf2a1cc44a3e696998e218fd836e62b41cb3837428f2f4cc08cb6f75b92013c97ffd948b7c48d28e5cdccb49235e4f63ea4072e54221ba2a31d4424ced62ac
-
Filesize
78KB
MD50163a114f3cd11d4a2d3c1374bf4878d
SHA196b9b8510641a18f7920f48078087001a16db568
SHA256568a79ce585dac32af237cb187b663cb6d2e4f594d66860c7ea1b3c66e4b7919
SHA5120104fedf9a6cc994a267f743c8fa3324af388e2191dec5aff1eedf7345a1d0bbb4829db2b846dd6f7e63e2e4c04aaa0d315ed8b7361c8fbbd8b9f0096e90cba0