Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 07:54
Behavioral task
behavioral1
Sample
6f21a85894e91b7082407e08e7c231c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f21a85894e91b7082407e08e7c231c8.exe
Resource
win10v2004-20231215-en
General
-
Target
6f21a85894e91b7082407e08e7c231c8.exe
-
Size
1.2MB
-
MD5
6f21a85894e91b7082407e08e7c231c8
-
SHA1
f576ed4ae101088abcb2b6b9b0649b972b023546
-
SHA256
f5fb7fa5231c18f0951c755c4cb0ec07b0889b5e320f42213cbf6bbbe499ad31
-
SHA512
deada7181f11badc0d64d1cab50951eab6472c178382b2ceff52a8aae447578a97f640e4a74b34889146df7c435a2a29f72f140e50f8345543ef422e4cd41a44
-
SSDEEP
12288:QmHAIqyfF/5ebyz1dpPlRnMRTD410ALP68kG3Jz4S9FUmnyJtgoiOHmabd8ornX3:HHRFfauvpPXnMKqJtfiOHmUd8QTH
Malware Config
Extracted
C:\Users\Admin\!!!HOW_TO_DECRYPT!!!.mht
[email protected]<BR>[email protected]<BR>In
http-equiv=3D"X
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 784 bcdedit.exe 576 bcdedit.exe -
Renames multiple (921) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2448 wbadmin.exe 876 wbadmin.exe -
Drops file in Drivers directory 13 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\services.1btc 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\drivers\etc\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\networks.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\services 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\drivers\etc\networks 6f21a85894e91b7082407e08e7c231c8.exe -
Deletes itself 1 IoCs
pid Process 604 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\6f21a85894e91b7082407e08e7c231c8.exe\" e" 6f21a85894e91b7082407e08e7c231c8.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-3818056530-936619650-3554021955-1000\desktop.ini 6f21a85894e91b7082407e08e7c231c8.exe -
Enumerates connected drives 3 TTPs 39 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\P: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\U: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\A: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\G: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\I: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\K: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\V: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\L: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\N: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\R: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\D: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\M: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\Q: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\T: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\W: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\E: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\Y: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\B: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\S: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\Z: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\F: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\J: 6f21a85894e91b7082407e08e7c231c8.exe File opened (read-only) \??\O: 6f21a85894e91b7082407e08e7c231c8.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\config\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f22e410f-f947-4e08-8f2a-8f65df603f8d.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\RegBack\SYSTEM 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e582198-061f-43f1-abdf-d4e9b606b035 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\70ede4ed-794b-4f83-9c44-1260b7d1ebde.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\BCD-Template 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\COMPONENTS 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\RegBack\DEFAULT 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\1da1a4aa-14f7-49d3-aecc-2509b8cde4dc.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b889ab5d-f7d2-47ff-92a1-3ec877b7e01c 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\931bd4aa-fe52-473b-b884-df04ca9342e0.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\COMPONENTS.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\SOFTWARE 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\1da1a4aa-14f7-49d3-aecc-2509b8cde4dc.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e582198-061f-43f1-abdf-d4e9b606b035.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\70ede4ed-794b-4f83-9c44-1260b7d1ebde.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\config\RegBack\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\931bd4aa-fe52-473b-b884-df04ca9342e0.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f22e410f-f947-4e08-8f2a-8f65df603f8d 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.1btc 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\LogFiles\Scm\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.1btc 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\BCD-Template.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\RegBack\SECURITY 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\1da1a4aa-14f7-49d3-aecc-2509b8cde4dc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b889ab5d-f7d2-47ff-92a1-3ec877b7e01c.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\SYSTEM 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\RegBack\SAM 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\70ede4ed-794b-4f83-9c44-1260b7d1ebde 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f22e410f-f947-4e08-8f2a-8f65df603f8d.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Abidjan.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kolkata 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Merida.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+8 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Abidjan 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Adelaide 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Lindeman 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Curacao.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Pontianak.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Shanghai.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Whitehorse.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-8.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-10.1btc 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Program Files\Java\jre7\lib\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\GMT.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Inuvik 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Nipigon.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Vladivostok 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Swift_Current 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Toronto.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Rome.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Godthab.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Krasnoyarsk.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Qatar.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Montreal.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Yakutat 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Bahia.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Gaza.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Thimphu 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Davis.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kamchatka 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Godthab.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sitka 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\MST.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Adak.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Baghdad.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dubai.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Eirunepe.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Noronha.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Palmer 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dili.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Juneau 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Samarkand 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Panama.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Petersburg 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Amman 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Syowa.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Managua 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Kaliningrad.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\EST5EDT.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Brisbane.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Lindeman.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jayapura 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+11.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-13.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Madrid.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Beirut.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Godthab 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Krasnoyarsk.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Martinique.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+9 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Rome 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Broken_Hill 6f21a85894e91b7082407e08e7c231c8.exe -
Drops file in Windows directory 50 IoCs
description ioc Process File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb2 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_1 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.1btc 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\Boot\DVD\EFI\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th0 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File created C:\Windows\Boot\PCAT\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_2 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb0 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\ehome\CreateDisc\Components\tables\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th2 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb2 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_0 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th1 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb1 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb0 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb1 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\dewindow 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Panther\setupinfo.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_1 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.1btc 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_0 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_3 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.inprocess 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\Boot\DVD\PCAT\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_2 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\Panther\setupinfo 6f21a85894e91b7082407e08e7c231c8.exe File created C:\Windows\Panther\!!!HOW_TO_DECRYPT!!!.mht 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th0 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th1 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th2 6f21a85894e91b7082407e08e7c231c8.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\enwindow 6f21a85894e91b7082407e08e7c231c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2736 vssadmin.exe 2764 vssadmin.exe 1036 vssadmin.exe 2856 vssadmin.exe 1604 vssadmin.exe 1616 vssadmin.exe 2340 vssadmin.exe 1980 vssadmin.exe 1528 vssadmin.exe 1504 vssadmin.exe 2676 vssadmin.exe 2612 vssadmin.exe 2780 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe 2284 6f21a85894e91b7082407e08e7c231c8.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeBackupPrivilege 2544 vssvc.exe Token: SeRestorePrivilege 2544 vssvc.exe Token: SeAuditPrivilege 2544 vssvc.exe Token: SeIncreaseQuotaPrivilege 3016 wmic.exe Token: SeSecurityPrivilege 3016 wmic.exe Token: SeTakeOwnershipPrivilege 3016 wmic.exe Token: SeLoadDriverPrivilege 3016 wmic.exe Token: SeSystemProfilePrivilege 3016 wmic.exe Token: SeSystemtimePrivilege 3016 wmic.exe Token: SeProfSingleProcessPrivilege 3016 wmic.exe Token: SeIncBasePriorityPrivilege 3016 wmic.exe Token: SeCreatePagefilePrivilege 3016 wmic.exe Token: SeBackupPrivilege 3016 wmic.exe Token: SeRestorePrivilege 3016 wmic.exe Token: SeShutdownPrivilege 3016 wmic.exe Token: SeDebugPrivilege 3016 wmic.exe Token: SeSystemEnvironmentPrivilege 3016 wmic.exe Token: SeRemoteShutdownPrivilege 3016 wmic.exe Token: SeUndockPrivilege 3016 wmic.exe Token: SeManageVolumePrivilege 3016 wmic.exe Token: 33 3016 wmic.exe Token: 34 3016 wmic.exe Token: 35 3016 wmic.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2736 2284 6f21a85894e91b7082407e08e7c231c8.exe 29 PID 2284 wrote to memory of 2736 2284 6f21a85894e91b7082407e08e7c231c8.exe 29 PID 2284 wrote to memory of 2736 2284 6f21a85894e91b7082407e08e7c231c8.exe 29 PID 2284 wrote to memory of 2676 2284 6f21a85894e91b7082407e08e7c231c8.exe 34 PID 2284 wrote to memory of 2676 2284 6f21a85894e91b7082407e08e7c231c8.exe 34 PID 2284 wrote to memory of 2676 2284 6f21a85894e91b7082407e08e7c231c8.exe 34 PID 2284 wrote to memory of 2764 2284 6f21a85894e91b7082407e08e7c231c8.exe 36 PID 2284 wrote to memory of 2764 2284 6f21a85894e91b7082407e08e7c231c8.exe 36 PID 2284 wrote to memory of 2764 2284 6f21a85894e91b7082407e08e7c231c8.exe 36 PID 2284 wrote to memory of 2612 2284 6f21a85894e91b7082407e08e7c231c8.exe 38 PID 2284 wrote to memory of 2612 2284 6f21a85894e91b7082407e08e7c231c8.exe 38 PID 2284 wrote to memory of 2612 2284 6f21a85894e91b7082407e08e7c231c8.exe 38 PID 2284 wrote to memory of 2340 2284 6f21a85894e91b7082407e08e7c231c8.exe 40 PID 2284 wrote to memory of 2340 2284 6f21a85894e91b7082407e08e7c231c8.exe 40 PID 2284 wrote to memory of 2340 2284 6f21a85894e91b7082407e08e7c231c8.exe 40 PID 2284 wrote to memory of 1036 2284 6f21a85894e91b7082407e08e7c231c8.exe 44 PID 2284 wrote to memory of 1036 2284 6f21a85894e91b7082407e08e7c231c8.exe 44 PID 2284 wrote to memory of 1036 2284 6f21a85894e91b7082407e08e7c231c8.exe 44 PID 2284 wrote to memory of 2780 2284 6f21a85894e91b7082407e08e7c231c8.exe 43 PID 2284 wrote to memory of 2780 2284 6f21a85894e91b7082407e08e7c231c8.exe 43 PID 2284 wrote to memory of 2780 2284 6f21a85894e91b7082407e08e7c231c8.exe 43 PID 2284 wrote to memory of 2856 2284 6f21a85894e91b7082407e08e7c231c8.exe 62 PID 2284 wrote to memory of 2856 2284 6f21a85894e91b7082407e08e7c231c8.exe 62 PID 2284 wrote to memory of 2856 2284 6f21a85894e91b7082407e08e7c231c8.exe 62 PID 2284 wrote to memory of 1980 2284 6f21a85894e91b7082407e08e7c231c8.exe 47 PID 2284 wrote to memory of 1980 2284 6f21a85894e91b7082407e08e7c231c8.exe 47 PID 2284 wrote to memory of 1980 2284 6f21a85894e91b7082407e08e7c231c8.exe 47 PID 2284 wrote to memory of 1528 2284 6f21a85894e91b7082407e08e7c231c8.exe 48 PID 2284 wrote to memory of 1528 2284 6f21a85894e91b7082407e08e7c231c8.exe 48 PID 2284 wrote to memory of 1528 2284 6f21a85894e91b7082407e08e7c231c8.exe 48 PID 2284 wrote to memory of 1616 2284 6f21a85894e91b7082407e08e7c231c8.exe 61 PID 2284 wrote to memory of 1616 2284 6f21a85894e91b7082407e08e7c231c8.exe 61 PID 2284 wrote to memory of 1616 2284 6f21a85894e91b7082407e08e7c231c8.exe 61 PID 2284 wrote to memory of 1604 2284 6f21a85894e91b7082407e08e7c231c8.exe 52 PID 2284 wrote to memory of 1604 2284 6f21a85894e91b7082407e08e7c231c8.exe 52 PID 2284 wrote to memory of 1604 2284 6f21a85894e91b7082407e08e7c231c8.exe 52 PID 2284 wrote to memory of 1504 2284 6f21a85894e91b7082407e08e7c231c8.exe 60 PID 2284 wrote to memory of 1504 2284 6f21a85894e91b7082407e08e7c231c8.exe 60 PID 2284 wrote to memory of 1504 2284 6f21a85894e91b7082407e08e7c231c8.exe 60 PID 2284 wrote to memory of 576 2284 6f21a85894e91b7082407e08e7c231c8.exe 57 PID 2284 wrote to memory of 576 2284 6f21a85894e91b7082407e08e7c231c8.exe 57 PID 2284 wrote to memory of 576 2284 6f21a85894e91b7082407e08e7c231c8.exe 57 PID 2284 wrote to memory of 784 2284 6f21a85894e91b7082407e08e7c231c8.exe 56 PID 2284 wrote to memory of 784 2284 6f21a85894e91b7082407e08e7c231c8.exe 56 PID 2284 wrote to memory of 784 2284 6f21a85894e91b7082407e08e7c231c8.exe 56 PID 2284 wrote to memory of 2448 2284 6f21a85894e91b7082407e08e7c231c8.exe 59 PID 2284 wrote to memory of 2448 2284 6f21a85894e91b7082407e08e7c231c8.exe 59 PID 2284 wrote to memory of 2448 2284 6f21a85894e91b7082407e08e7c231c8.exe 59 PID 2284 wrote to memory of 876 2284 6f21a85894e91b7082407e08e7c231c8.exe 64 PID 2284 wrote to memory of 876 2284 6f21a85894e91b7082407e08e7c231c8.exe 64 PID 2284 wrote to memory of 876 2284 6f21a85894e91b7082407e08e7c231c8.exe 64 PID 2284 wrote to memory of 3016 2284 6f21a85894e91b7082407e08e7c231c8.exe 66 PID 2284 wrote to memory of 3016 2284 6f21a85894e91b7082407e08e7c231c8.exe 66 PID 2284 wrote to memory of 3016 2284 6f21a85894e91b7082407e08e7c231c8.exe 66 PID 2284 wrote to memory of 604 2284 6f21a85894e91b7082407e08e7c231c8.exe 68 PID 2284 wrote to memory of 604 2284 6f21a85894e91b7082407e08e7c231c8.exe 68 PID 2284 wrote to memory of 604 2284 6f21a85894e91b7082407e08e7c231c8.exe 68 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 6f21a85894e91b7082407e08e7c231c8.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f21a85894e91b7082407e08e7c231c8.exe"C:\Users\Admin\AppData\Local\Temp\6f21a85894e91b7082407e08e7c231c8.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2284 -
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:2736
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:2676
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2764
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2612
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2340
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2780
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1036
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1980
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1528
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1604
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:784
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:576
-
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:2448
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1504
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1616
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2856
-
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:876
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6F21A8~1.EXE >> NUL2⤵
- Deletes itself
PID:604
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ec59d4348c9c5117c73ac265ecd1a906
SHA1eb53c8334d0eaaf966756da857388b23e0b6ba56
SHA256951eb92a70ac1f3f3bf4d8081c7af364fc503db8eac5b752537720068f67250d
SHA5123c184ff84db5d9db63a3271c45f931addf6ec4b1524a45335664bc37beb55d3c5592634fff34af2777bced1ccdb554a8a961d60655ca63957ca312d8c3c87ca2