Overview
overview
10Static
static
10samples2.zip
windows7-x64
1samples2.zip
windows10-2004-x64
1032e2e00eb...36.exe
windows7-x64
3032e2e00eb...36.exe
windows10-2004-x64
307e98c92e1...3b.exe
windows7-x64
807e98c92e1...3b.exe
windows10-2004-x64
80a045d39cb...35.exe
windows7-x64
70a045d39cb...35.exe
windows10-2004-x64
72d713e13f7...d3.exe
windows7-x64
12d713e13f7...d3.exe
windows10-2004-x64
137a83fd6b1...32.exe
windows7-x64
137a83fd6b1...32.exe
windows10-2004-x64
1390b31934a...56.exe
windows7-x64
9390b31934a...56.exe
windows10-2004-x64
94dc6bd447e...9d.exe
windows7-x64
14dc6bd447e...9d.exe
windows10-2004-x64
15300d74561...0d.exe
windows7-x64
105300d74561...0d.exe
windows10-2004-x64
105e7d11d6bd...c6.exe
windows7-x64
75e7d11d6bd...c6.exe
windows10-2004-x64
164c7d9f709...20.exe
windows7-x64
164c7d9f709...20.exe
windows10-2004-x64
17db03ff8a8...3a.exe
windows7-x64
17db03ff8a8...3a.exe
windows10-2004-x64
181cb6442c2...78.exe
windows7-x64
181cb6442c2...78.exe
windows10-2004-x64
18629ec2aed...11.exe
windows7-x64
18629ec2aed...11.exe
windows10-2004-x64
18b13ff52ff...ab.exe
windows7-x64
88b13ff52ff...ab.exe
windows10-2004-x64
890b4871229...11.exe
windows7-x64
790b4871229...11.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 15:27
Behavioral task
behavioral1
Sample
samples2.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
samples2.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
032e2e00ebb50fcd0c1b56a4cfb9479683e15de23e336556ea3783038e18b536.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
032e2e00ebb50fcd0c1b56a4cfb9479683e15de23e336556ea3783038e18b536.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
07e98c92e1f9859a16b31df6aa5bc83c0d11d4f5f9d8a8ce5d7ddc1a0655a73b.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
07e98c92e1f9859a16b31df6aa5bc83c0d11d4f5f9d8a8ce5d7ddc1a0655a73b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
0a045d39cbae62c5e73639b6a5a6bdc7948e13d5e960978d22b687d95e599b35.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
0a045d39cbae62c5e73639b6a5a6bdc7948e13d5e960978d22b687d95e599b35.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
2d713e13f7941f69ff7978a16736aac4019955895a79636eed1738c1f6a3e0d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
2d713e13f7941f69ff7978a16736aac4019955895a79636eed1738c1f6a3e0d3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
37a83fd6b1048433907502f8e50aabdcbae822388ea284e81e9ea1b199674732.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
37a83fd6b1048433907502f8e50aabdcbae822388ea284e81e9ea1b199674732.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
390b31934a8c6923fca53127953406a98231e4437a8523f242c072b0c38bb756.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
390b31934a8c6923fca53127953406a98231e4437a8523f242c072b0c38bb756.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
4dc6bd447edc955f853e3d624be982a77e219a0d8d78c9009ecfd0b6bf18049d.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
4dc6bd447edc955f853e3d624be982a77e219a0d8d78c9009ecfd0b6bf18049d.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
5e7d11d6bd11b09c4cc0c4ba54ebea19dcc06ae585d0508d3d8dba251075f4c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
5e7d11d6bd11b09c4cc0c4ba54ebea19dcc06ae585d0508d3d8dba251075f4c6.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
64c7d9f709c2e8f059e695db2b1dd84db7b1061ea0a445046603291749fb0920.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
64c7d9f709c2e8f059e695db2b1dd84db7b1061ea0a445046603291749fb0920.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
7db03ff8a8f7a96bff02870cd5975b06ac52f2816a7c4ee8f2473a301bea133a.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
7db03ff8a8f7a96bff02870cd5975b06ac52f2816a7c4ee8f2473a301bea133a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
81cb6442c2562274be3b9bc33c6fc5a4c5c43b0569494f857157eef1e9613178.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
81cb6442c2562274be3b9bc33c6fc5a4c5c43b0569494f857157eef1e9613178.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
8629ec2aedcf3d482ced397406a20fc49e64adf5eb52b717fa331730404de411.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
8629ec2aedcf3d482ced397406a20fc49e64adf5eb52b717fa331730404de411.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
8b13ff52ff84eff160a5c0b8c80c7bd336e5bcfef7730ce7a5c499f112632bab.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
8b13ff52ff84eff160a5c0b8c80c7bd336e5bcfef7730ce7a5c499f112632bab.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
90b4871229a8654c4258d4d470475e891b7db88407f53653a110de8d70fa4811.exe
Resource
win7-20231215-en
General
-
Target
5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe
-
Size
453KB
-
MD5
15e64cc4e12006fd7bf95cdfdb2ad674
-
SHA1
f4a7023d943749b9aa5c373cc84b5ee6f2845717
-
SHA256
5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d
-
SHA512
596b44694970ecef43a4238c0d2e547844b40c75697e962893a0b21f248136de5a1bf27da7651a5f4eef073f595e5015d63fa0f99a1e39185cfeb5c3bdaf5bbc
-
SSDEEP
6144:selkSPS7kiuw4SEtOvgs25TfCxFu/4grGsBNcRMr5p6LnTAOzarKJ7nkxXTv:selk4Sgiuw40vfnxIXNcw6rTcr4eTv
Malware Config
Extracted
C:\Users\Admin\Desktop\HOW_TO_RECOVER_FILES.txt
http://noescapemsqxvizdxyl7f7rmg5cdjwp33pg2wpmiaaibilb4btwzttad.onion
http://noescaperjh3gg6oy7rck57fiefyuzmj7kmvojxgvlmwd5pdzizrb7ad.onion/9a327ded-8235-4391-8aa9-bd7cbeca8977
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (154) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\P: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\R: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\V: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\Y: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\L: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\G: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\H: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\S: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\X: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\E: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\A: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\B: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\J: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\K: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\W: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\Z: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\F: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\M: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\O: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\Q: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\T: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\U: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe File opened (read-only) \??\I: 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2648 vssadmin.exe 2096 vssadmin.exe 1888 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2172 WMIC.exe Token: SeSecurityPrivilege 2172 WMIC.exe Token: SeTakeOwnershipPrivilege 2172 WMIC.exe Token: SeLoadDriverPrivilege 2172 WMIC.exe Token: SeSystemProfilePrivilege 2172 WMIC.exe Token: SeSystemtimePrivilege 2172 WMIC.exe Token: SeProfSingleProcessPrivilege 2172 WMIC.exe Token: SeIncBasePriorityPrivilege 2172 WMIC.exe Token: SeCreatePagefilePrivilege 2172 WMIC.exe Token: SeBackupPrivilege 2172 WMIC.exe Token: SeRestorePrivilege 2172 WMIC.exe Token: SeShutdownPrivilege 2172 WMIC.exe Token: SeDebugPrivilege 2172 WMIC.exe Token: SeSystemEnvironmentPrivilege 2172 WMIC.exe Token: SeRemoteShutdownPrivilege 2172 WMIC.exe Token: SeUndockPrivilege 2172 WMIC.exe Token: SeManageVolumePrivilege 2172 WMIC.exe Token: 33 2172 WMIC.exe Token: 34 2172 WMIC.exe Token: 35 2172 WMIC.exe Token: SeIncreaseQuotaPrivilege 2172 WMIC.exe Token: SeSecurityPrivilege 2172 WMIC.exe Token: SeTakeOwnershipPrivilege 2172 WMIC.exe Token: SeLoadDriverPrivilege 2172 WMIC.exe Token: SeSystemProfilePrivilege 2172 WMIC.exe Token: SeSystemtimePrivilege 2172 WMIC.exe Token: SeProfSingleProcessPrivilege 2172 WMIC.exe Token: SeIncBasePriorityPrivilege 2172 WMIC.exe Token: SeCreatePagefilePrivilege 2172 WMIC.exe Token: SeBackupPrivilege 2172 WMIC.exe Token: SeRestorePrivilege 2172 WMIC.exe Token: SeShutdownPrivilege 2172 WMIC.exe Token: SeDebugPrivilege 2172 WMIC.exe Token: SeSystemEnvironmentPrivilege 2172 WMIC.exe Token: SeRemoteShutdownPrivilege 2172 WMIC.exe Token: SeUndockPrivilege 2172 WMIC.exe Token: SeManageVolumePrivilege 2172 WMIC.exe Token: 33 2172 WMIC.exe Token: 34 2172 WMIC.exe Token: 35 2172 WMIC.exe Token: SeBackupPrivilege 2656 vssvc.exe Token: SeRestorePrivilege 2656 vssvc.exe Token: SeAuditPrivilege 2656 vssvc.exe Token: SeIncreaseQuotaPrivilege 2540 WMIC.exe Token: SeSecurityPrivilege 2540 WMIC.exe Token: SeTakeOwnershipPrivilege 2540 WMIC.exe Token: SeLoadDriverPrivilege 2540 WMIC.exe Token: SeSystemProfilePrivilege 2540 WMIC.exe Token: SeSystemtimePrivilege 2540 WMIC.exe Token: SeProfSingleProcessPrivilege 2540 WMIC.exe Token: SeIncBasePriorityPrivilege 2540 WMIC.exe Token: SeCreatePagefilePrivilege 2540 WMIC.exe Token: SeBackupPrivilege 2540 WMIC.exe Token: SeRestorePrivilege 2540 WMIC.exe Token: SeShutdownPrivilege 2540 WMIC.exe Token: SeDebugPrivilege 2540 WMIC.exe Token: SeSystemEnvironmentPrivilege 2540 WMIC.exe Token: SeRemoteShutdownPrivilege 2540 WMIC.exe Token: SeUndockPrivilege 2540 WMIC.exe Token: SeManageVolumePrivilege 2540 WMIC.exe Token: 33 2540 WMIC.exe Token: 34 2540 WMIC.exe Token: 35 2540 WMIC.exe Token: SeIncreaseQuotaPrivilege 2540 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3060 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 29 PID 2216 wrote to memory of 3060 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 29 PID 2216 wrote to memory of 3060 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 29 PID 2216 wrote to memory of 3060 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 29 PID 3060 wrote to memory of 2172 3060 cmd.exe 28 PID 3060 wrote to memory of 2172 3060 cmd.exe 28 PID 3060 wrote to memory of 2172 3060 cmd.exe 28 PID 3060 wrote to memory of 2172 3060 cmd.exe 28 PID 2216 wrote to memory of 2616 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 32 PID 2216 wrote to memory of 2616 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 32 PID 2216 wrote to memory of 2616 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 32 PID 2216 wrote to memory of 2616 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 32 PID 2216 wrote to memory of 2596 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 82 PID 2216 wrote to memory of 2596 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 82 PID 2216 wrote to memory of 2596 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 82 PID 2216 wrote to memory of 2596 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 82 PID 2216 wrote to memory of 2580 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 33 PID 2216 wrote to memory of 2580 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 33 PID 2216 wrote to memory of 2580 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 33 PID 2216 wrote to memory of 2580 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 33 PID 2216 wrote to memory of 2740 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 79 PID 2216 wrote to memory of 2740 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 79 PID 2216 wrote to memory of 2740 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 79 PID 2216 wrote to memory of 2740 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 79 PID 2216 wrote to memory of 2720 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 77 PID 2216 wrote to memory of 2720 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 77 PID 2216 wrote to memory of 2720 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 77 PID 2216 wrote to memory of 2720 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 77 PID 2720 wrote to memory of 1888 2720 cmd.exe 76 PID 2720 wrote to memory of 1888 2720 cmd.exe 76 PID 2720 wrote to memory of 1888 2720 cmd.exe 76 PID 2720 wrote to memory of 1888 2720 cmd.exe 76 PID 2216 wrote to memory of 1184 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 75 PID 2216 wrote to memory of 1184 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 75 PID 2216 wrote to memory of 1184 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 75 PID 2216 wrote to memory of 1184 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 75 PID 2216 wrote to memory of 2464 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 74 PID 2216 wrote to memory of 2464 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 74 PID 2216 wrote to memory of 2464 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 74 PID 2216 wrote to memory of 2464 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 74 PID 2216 wrote to memory of 2484 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 72 PID 2216 wrote to memory of 2484 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 72 PID 2216 wrote to memory of 2484 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 72 PID 2216 wrote to memory of 2484 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 72 PID 2484 wrote to memory of 2540 2484 cmd.exe 36 PID 2484 wrote to memory of 2540 2484 cmd.exe 36 PID 2484 wrote to memory of 2540 2484 cmd.exe 36 PID 2484 wrote to memory of 2540 2484 cmd.exe 36 PID 2216 wrote to memory of 2932 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 70 PID 2216 wrote to memory of 2932 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 70 PID 2216 wrote to memory of 2932 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 70 PID 2216 wrote to memory of 2932 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 70 PID 2216 wrote to memory of 2160 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 68 PID 2216 wrote to memory of 2160 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 68 PID 2216 wrote to memory of 2160 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 68 PID 2216 wrote to memory of 2160 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 68 PID 2216 wrote to memory of 2972 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 67 PID 2216 wrote to memory of 2972 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 67 PID 2216 wrote to memory of 2972 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 67 PID 2216 wrote to memory of 2972 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 67 PID 2216 wrote to memory of 952 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 65 PID 2216 wrote to memory of 952 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 65 PID 2216 wrote to memory of 952 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 65 PID 2216 wrote to memory of 952 2216 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe 65 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe"C:\Users\Admin\AppData\Local\Temp\5300d7456183c470a40267da9cd1771d6147445b203d8eb02437348bf3169e0d.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c wmic SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:3060
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE BACKUP -deleteOldest2⤵PID:2580
-
-
C:\Windows\SysWOW64\cmd.execmd /c wmic SHADOWCOPY DELETE /nointeractive2⤵PID:1936
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE /nointeractive3⤵PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵PID:856
-
-
C:\Windows\SysWOW64\cmd.execmd /c bcdedit /set {default} recoveryenabled No2⤵PID:2420
-
-
C:\Windows\SysWOW64\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.execmd /c vssadmin Delete Shadows /All /Quiet2⤵PID:2968
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE BACKUP -keepVersions:02⤵PID:2316
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE BACKUP -deleteOldest2⤵PID:2092
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:02⤵PID:2704
-
-
C:\Windows\SysWOW64\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2192
-
-
C:\Windows\SysWOW64\cmd.execmd /c bcdedit /set {default} recoveryenabled No2⤵PID:1348
-
-
C:\Windows\SysWOW64\cmd.execmd /c vssadmin Delete Shadows /All /Quiet2⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE BACKUP -keepVersions:02⤵PID:952
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE BACKUP -deleteOldest2⤵PID:2972
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:02⤵PID:2160
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd /c wmic SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:2484
-
-
C:\Windows\SysWOW64\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2464
-
-
C:\Windows\SysWOW64\cmd.execmd /c bcdedit /set {default} recoveryenabled No2⤵PID:1184
-
-
C:\Windows\SysWOW64\cmd.execmd /c vssadmin Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2720
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE BACKUP -keepVersions:02⤵PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:02⤵PID:2596
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE /nointeractive1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE /nointeractive1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /All /Quiet1⤵
- Interacts with shadow copies
PID:2648
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /All /Quiet1⤵
- Interacts with shadow copies
PID:2096
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /All /Quiet1⤵
- Interacts with shadow copies
PID:1888
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ae09a1907f06c1c8b6944601c07466b0
SHA1b836d0c8e7c49c283948d26c4f811abcb691f6c7
SHA2561d811d180143ebcbf3481cbed6a271e6c0c382fc22afd2edb1fe8f2105a7d6d6
SHA5124e0c0b97f388c3c51d0b4cd772855d38e0ded3b554fa4884da4c32eaa9ec91924141b06621b12b1132036a19afd8a5e333318e2991558f71fd44ec2d6a86738d