Analysis

  • max time kernel
    164s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2024 17:56

General

  • Target

    c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.exe

  • Size

    332KB

  • MD5

    0d5ccd706f75461b3fb9c56bc87b5c6f

  • SHA1

    0c3755209682d5632a5fb20143ea7d93be5dc5e8

  • SHA256

    c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1

  • SHA512

    9288cdd355d9a6fab846fda6b46ea6c67ec706e089c02d9718661b754bb45be020e97bd48d7876d82a525dfaedc17f6c2303f03160932ea4d6e915f085714131

  • SSDEEP

    6144:aY196WTQqBfFrQlVCuzw/322A1StYDBF+FTKtkV:R96eVFryVHzw/3XOfvtk

Score
10/10

Malware Config

Extracted

Path

C:\MSOCache\How_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; word-break: break-all; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">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</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <hr> <b>email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>
Emails

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (2916) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Deletes system backups 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 14 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.exe
        "C:\Users\Admin\AppData\Local\Temp\c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2968
        • C:\Windows\SysWOW64\cmd.exe
          \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c rem Kill "SQL"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\system32\cmd.exe
            C:\Windows\sysnative\cmd.exe /c rem Kill "SQL"
            4⤵
              PID:2608
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2564
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2464
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im sqlbrowser.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2704
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sql writer.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im sql writer.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2512
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im sql writer.exe
                5⤵
                • Kills process with taskkill
                PID:2460
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlserv.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlserv.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2532
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im sqlserv.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2228
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2684
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im msmdsrv.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2800
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:684
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im MsDtsSrvr.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:268
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe
            3⤵
              PID:1956
              • C:\Windows\system32\cmd.exe
                C:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe
                4⤵
                  PID:2188
                  • C:\Windows\system32\taskkill.exe
                    taskkill -f -im sqlceip.exe
                    5⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1648
              • C:\Windows\SysWOW64\cmd.exe
                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe
                3⤵
                  PID:1452
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe
                    4⤵
                      PID:1204
                      • C:\Windows\system32\taskkill.exe
                        taskkill -f -im fdlauncher.exe
                        5⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2360
                  • C:\Windows\SysWOW64\cmd.exe
                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im Ssms.exe
                    3⤵
                      PID:1964
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\sysnative\cmd.exe /c taskkill -f -im Ssms.exe
                        4⤵
                          PID:1272
                          • C:\Windows\system32\taskkill.exe
                            taskkill -f -im Ssms.exe
                            5⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1888
                      • C:\Windows\SysWOW64\cmd.exe
                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE
                        3⤵
                          PID:340
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE
                            4⤵
                              PID:772
                              • C:\Windows\system32\taskkill.exe
                                taskkill -f -im SQLAGENT.EXE
                                5⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2640
                          • C:\Windows\SysWOW64\cmd.exe
                            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdhost.exe
                            3⤵
                              PID:532
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\sysnative\cmd.exe /c taskkill -f -im fdhost.exe
                                4⤵
                                  PID:596
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill -f -im fdhost.exe
                                    5⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1096
                              • C:\Windows\SysWOW64\cmd.exe
                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe
                                3⤵
                                  PID:1040
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe
                                    4⤵
                                      PID:1328
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill -f -im ReportingServicesService.exe
                                        5⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:812
                                  • C:\Windows\SysWOW64\cmd.exe
                                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msftesql.exe
                                    3⤵
                                      PID:1780
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\sysnative\cmd.exe /c taskkill -f -im msftesql.exe
                                        4⤵
                                          PID:2312
                                      • C:\Windows\SysWOW64\cmd.exe
                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe
                                        3⤵
                                          PID:1560
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe
                                            4⤵
                                              PID:2720
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill -f -im pg_ctl.exe
                                                5⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2844
                                          • C:\Windows\SysWOW64\cmd.exe
                                            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -impostgres.exe
                                            3⤵
                                              PID:1304
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\sysnative\cmd.exe /c taskkill -f -impostgres.exe
                                                4⤵
                                                  PID:2832
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill -f -impostgres.exe
                                                    5⤵
                                                    • Kills process with taskkill
                                                    PID:1684
                                              • C:\Windows\SysWOW64\cmd.exe
                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQLServerADHelper100
                                                3⤵
                                                  PID:828
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\sysnative\cmd.exe /c net stop MSSQLServerADHelper100
                                                    4⤵
                                                      PID:1876
                                                      • C:\Windows\system32\net.exe
                                                        net stop MSSQLServerADHelper100
                                                        5⤵
                                                          PID:1556
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 stop MSSQLServerADHelper100
                                                            6⤵
                                                              PID:1144
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$ISARS
                                                        3⤵
                                                          PID:2352
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\sysnative\cmd.exe /c net stop MSSQL$ISARS
                                                            4⤵
                                                              PID:400
                                                              • C:\Windows\system32\net.exe
                                                                net stop MSSQL$ISARS
                                                                5⤵
                                                                  PID:3040
                                                                  • C:\Windows\system32\net1.exe
                                                                    C:\Windows\system32\net1 stop MSSQL$ISARS
                                                                    6⤵
                                                                      PID:2164
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$MSFW
                                                                3⤵
                                                                  PID:2244
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\sysnative\cmd.exe /c net stop MSSQL$MSFW
                                                                    4⤵
                                                                      PID:700
                                                                      • C:\Windows\system32\net.exe
                                                                        net stop MSSQL$MSFW
                                                                        5⤵
                                                                          PID:1936
                                                                          • C:\Windows\system32\net1.exe
                                                                            C:\Windows\system32\net1 stop MSSQL$MSFW
                                                                            6⤵
                                                                              PID:1064
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$ISARS
                                                                        3⤵
                                                                          PID:1524
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\sysnative\cmd.exe /c net stop SQLAgent$ISARS
                                                                            4⤵
                                                                              PID:1792
                                                                              • C:\Windows\system32\net.exe
                                                                                net stop SQLAgent$ISARS
                                                                                5⤵
                                                                                  PID:1992
                                                                                  • C:\Windows\system32\net1.exe
                                                                                    C:\Windows\system32\net1 stop SQLAgent$ISARS
                                                                                    6⤵
                                                                                      PID:984
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$MSFW
                                                                                3⤵
                                                                                  PID:1408
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\sysnative\cmd.exe /c net stop SQLAgent$MSFW
                                                                                    4⤵
                                                                                      PID:1620
                                                                                      • C:\Windows\system32\net.exe
                                                                                        net stop SQLAgent$MSFW
                                                                                        5⤵
                                                                                          PID:1884
                                                                                          • C:\Windows\system32\net1.exe
                                                                                            C:\Windows\system32\net1 stop SQLAgent$MSFW
                                                                                            6⤵
                                                                                              PID:2988
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLBrowser
                                                                                        3⤵
                                                                                          PID:1988
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\sysnative\cmd.exe /c net stop SQLBrowser
                                                                                            4⤵
                                                                                              PID:2324
                                                                                              • C:\Windows\system32\net.exe
                                                                                                net stop SQLBrowser
                                                                                                5⤵
                                                                                                  PID:1976
                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                    C:\Windows\system32\net1 stop SQLBrowser
                                                                                                    6⤵
                                                                                                      PID:920
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop REportServer$ISARS
                                                                                                3⤵
                                                                                                  PID:1588
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\sysnative\cmd.exe /c net stop REportServer$ISARS
                                                                                                    4⤵
                                                                                                      PID:1512
                                                                                                      • C:\Windows\system32\net.exe
                                                                                                        net stop REportServer$ISARS
                                                                                                        5⤵
                                                                                                          PID:2080
                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                            C:\Windows\system32\net1 stop REportServer$ISARS
                                                                                                            6⤵
                                                                                                              PID:2852
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLWriter
                                                                                                        3⤵
                                                                                                          PID:2268
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\sysnative\cmd.exe /c net stop SQLWriter
                                                                                                            4⤵
                                                                                                              PID:2272
                                                                                                              • C:\Windows\system32\net.exe
                                                                                                                net stop SQLWriter
                                                                                                                5⤵
                                                                                                                  PID:2972
                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                    C:\Windows\system32\net1 stop SQLWriter
                                                                                                                    6⤵
                                                                                                                      PID:1776
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet
                                                                                                                3⤵
                                                                                                                  PID:2372
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\sysnative\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet
                                                                                                                    4⤵
                                                                                                                      PID:2824
                                                                                                                      • C:\Windows\system32\vssadmin.exe
                                                                                                                        vssadmin.exe Delete Shadows /All /Quiet
                                                                                                                        5⤵
                                                                                                                        • Interacts with shadow copies
                                                                                                                        PID:2036
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wbadmin delete backup -keepVersion:0 -quiet
                                                                                                                    3⤵
                                                                                                                      PID:1744
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\sysnative\cmd.exe /c wbadmin delete backup -keepVersion:0 -quiet
                                                                                                                        4⤵
                                                                                                                          PID:1592
                                                                                                                          • C:\Windows\system32\wbadmin.exe
                                                                                                                            wbadmin delete backup -keepVersion:0 -quiet
                                                                                                                            5⤵
                                                                                                                            • Deletes system backups
                                                                                                                            PID:1572
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                                                        3⤵
                                                                                                                          PID:320
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\sysnative\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                                                            4⤵
                                                                                                                              PID:2200
                                                                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                                                                bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                                                                5⤵
                                                                                                                                • Modifies boot configuration data using bcdedit
                                                                                                                                PID:3000
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c bcdedit.exe /set {default} recoverynabled No
                                                                                                                            3⤵
                                                                                                                              PID:1376
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\sysnative\cmd.exe /c bcdedit.exe /set {default} recoverynabled No
                                                                                                                                4⤵
                                                                                                                                  PID:2864
                                                                                                                                  • C:\Windows\system32\bcdedit.exe
                                                                                                                                    bcdedit.exe /set {default} recoverynabled No
                                                                                                                                    5⤵
                                                                                                                                    • Modifies boot configuration data using bcdedit
                                                                                                                                    PID:1464
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wmic.exe SHADOWCOPY /nointeractive
                                                                                                                                3⤵
                                                                                                                                  PID:3028
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTABACKUP -deleteOldest
                                                                                                                                  3⤵
                                                                                                                                    PID:1020
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTATEBACKUP
                                                                                                                                    3⤵
                                                                                                                                      PID:2108
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.exe
                                                                                                                                    \\?\C:\Users\Admin\AppData\Local\Temp\c6d09776e748f0fe1cec9d4af9f3154c9f84026c27e1a59c0d48bcaf17b89ce1.exe -network
                                                                                                                                    2⤵
                                                                                                                                    • System policy modification
                                                                                                                                    PID:2644
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c pause
                                                                                                                                      3⤵
                                                                                                                                        PID:2496
                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                    taskkill -f -im msftesql.exe
                                                                                                                                    1⤵
                                                                                                                                    • Kills process with taskkill
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:2056
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\sysnative\cmd.exe /c wmic.exe SHADOWCOPY /nointeractive
                                                                                                                                    1⤵
                                                                                                                                      PID:888
                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                        wmic.exe SHADOWCOPY /nointeractive
                                                                                                                                        2⤵
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:1944
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTABACKUP -deleteOldest
                                                                                                                                      1⤵
                                                                                                                                        PID:1764
                                                                                                                                        • C:\Windows\system32\wbadmin.exe
                                                                                                                                          wbadmin DELETE SYSTEMSTABACKUP -deleteOldest
                                                                                                                                          2⤵
                                                                                                                                            PID:2028
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTATEBACKUP
                                                                                                                                          1⤵
                                                                                                                                            PID:1760
                                                                                                                                            • C:\Windows\system32\wbadmin.exe
                                                                                                                                              wbadmin DELETE SYSTEMSTATEBACKUP
                                                                                                                                              2⤵
                                                                                                                                              • Deletes System State backups
                                                                                                                                              • Drops file in Windows directory
                                                                                                                                              PID:1880
                                                                                                                                          • C:\Windows\system32\vssvc.exe
                                                                                                                                            C:\Windows\system32\vssvc.exe
                                                                                                                                            1⤵
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:2516

                                                                                                                                          Network

                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                          Replay Monitor

                                                                                                                                          Loading Replay Monitor...

                                                                                                                                          Downloads

                                                                                                                                          • C:\MSOCache\How_to_back_files.html

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                            MD5

                                                                                                                                            02793d91189ad89069231555f0704586

                                                                                                                                            SHA1

                                                                                                                                            336dfce26023d781a1a9d6a746909971665ebcc3

                                                                                                                                            SHA256

                                                                                                                                            14c3a651e7b4baba28068d63612ba99e623751ba9d4f736e05dd91c27870f1b6

                                                                                                                                            SHA512

                                                                                                                                            5fd662c5f567a90ecb6bc52d9b43ed123a3fefda8174d501414b4f70f7fa4389f241968c928307d276b053c81947761fc1f24fcd1ffb533b8af86a687a002101

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\db\bin\NetworkServerControl

                                                                                                                                            Filesize

                                                                                                                                            7KB

                                                                                                                                            MD5

                                                                                                                                            d1e491164acc23b0da7e377c1762d0ac

                                                                                                                                            SHA1

                                                                                                                                            1fa486de5cb437e72beec304fc3f8b90797acffc

                                                                                                                                            SHA256

                                                                                                                                            d09cc8ab1e00123640c4bb8553910386b3a1938634de290baec1f0239d699b77

                                                                                                                                            SHA512

                                                                                                                                            6dd9cee6b572d159e18a1a7a50b2e33b342a067138ad1695603513ebd89f1470305b68068c97f8ec2462090402e37a48d860b18b6290d397a316811f4d86623e

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            b5312ff18523b00eceb7bfd0679bb9bf

                                                                                                                                            SHA1

                                                                                                                                            1dc467a36bea13f3d87ea1340920165dac8f7c2d

                                                                                                                                            SHA256

                                                                                                                                            55d6c97651ad25eeba77348581b8cd86af16ce30ea19c51794fe4bbe02a0a995

                                                                                                                                            SHA512

                                                                                                                                            3c5b3ce548b33588a6e54aa49d8149163dbe1a75d1e8b62b92db234e4e4e7987b3586ff6d18f7e21703e9cc21d9db3021f37299f2f2b741e3a17600760271f5a

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\UTC

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            535a160f860ec52a31fa38b53c6ce65d

                                                                                                                                            SHA1

                                                                                                                                            7d40fad2c6b4dc6d222c1fe9b67ad3fc3b709c00

                                                                                                                                            SHA256

                                                                                                                                            c6fd0b5284e7f2cf097cb31b8423d77409c491f8b199d0f71f8df63d9d334d41

                                                                                                                                            SHA512

                                                                                                                                            71c8c6e881cb5ed09e79a4f8dd598a7e745315ae2002999fa89fe6804a2fa9bc1f03a858739cfa55fbe8567640b97655ba620d36151382f1c992a11dbe3d7a21

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\EST5

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            b52d7104bae3f94b72abcd21eaa2f80b

                                                                                                                                            SHA1

                                                                                                                                            d36763773d1877faa8792820b1587526a84a168e

                                                                                                                                            SHA256

                                                                                                                                            b8a936a45fa3867c16a5b7bfc752067b1db986af77d1d85a5c63de3ae1607c18

                                                                                                                                            SHA512

                                                                                                                                            3804a5c5d3bf4231353babc84187fd6e96a01c0f40b1a786aae337b818f81970d6247f2ee58dcdeaf1a2e73794029fc7cba1cb951ce578b8e250a6ab6e41a5c9

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\HST10

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            c745905be7691c37ecc2385ca96e495a

                                                                                                                                            SHA1

                                                                                                                                            ab671e2a02c2eac573356249fd49e6fdb29a682e

                                                                                                                                            SHA256

                                                                                                                                            9220aa191bf90d9c9ea2e25f09ea031ee56eb82cc640d253ffa538f4ace786ae

                                                                                                                                            SHA512

                                                                                                                                            7a2ac7eca03499e2f96b8f95dd7edbf6b0bcbdd766c4d2485c468be8f923492debc7b0cb9ec3499f30df77c9a942ce03eb945a2f7c690da8237665665d3f5589

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            7f7638e739d092b158ac3f31fbc2ddfb

                                                                                                                                            SHA1

                                                                                                                                            652cf54202637568871e5b80a7a600c5455ecbd9

                                                                                                                                            SHA256

                                                                                                                                            e9df9cc8907af154593d75a14288387130ddbf3d7f2ef3324386b7bf8783e1ba

                                                                                                                                            SHA512

                                                                                                                                            ca1091b3827e52094566ed71e1b1c86ba1fffe2386139731c3fe9f744a75afb417d27cb8629db16489bf9b7dec18b24f3e9ba0c41d7b69c52cca14c486714ad2

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

                                                                                                                                            Filesize

                                                                                                                                            13KB

                                                                                                                                            MD5

                                                                                                                                            bb286892682b8860fb5f8cb39ed59d36

                                                                                                                                            SHA1

                                                                                                                                            7ec1d1656b635f65eec17150f2c3d875ec3ffa9b

                                                                                                                                            SHA256

                                                                                                                                            168aeda7d9ff25058443f47a71736a25e991577b78f3ec20a95835adbdbc682e

                                                                                                                                            SHA512

                                                                                                                                            c742dddc3fd9b45e40f98ab6a7d3d818b97da9f62c22d3e1d1675230a6c31ed102f29245fbae493de8f6c5c05ab5e99005a21b3770eb084de561caa1e6c5185a

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

                                                                                                                                            Filesize

                                                                                                                                            10KB

                                                                                                                                            MD5

                                                                                                                                            def21d8dae52ffafe848a8ad1a2ab0fc

                                                                                                                                            SHA1

                                                                                                                                            20433e276a8db2175fe527f363046098a4334b0d

                                                                                                                                            SHA256

                                                                                                                                            d3043d375a2078fe814bf090c89fad7cbfca4188cfdd871068456e8177d005a1

                                                                                                                                            SHA512

                                                                                                                                            1d23b6f5a11e6088f68c35cb994d807c181614758eef05e4513201692ca033f20c83fdd616705119bb9d01a2e7ea1aa1253c5886740b925800f0065f3b99f152

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            2e1b92ad6a298be1a0f30da7bfac5c58

                                                                                                                                            SHA1

                                                                                                                                            04f57158ccf2abc852c6bae8e3f70fa0836d8438

                                                                                                                                            SHA256

                                                                                                                                            b976ba7842f83fb8b237d4e2f960fbece7e31a1e59f5f9c9ee6c999dc40623c7

                                                                                                                                            SHA512

                                                                                                                                            f5951af15ce7cf4983b3af65f181c6fe3a94761e15d0c5cf02ed411a829d3ab52a445868a4e890003cabda8eb7b0074e5dfea414ef8da41a199bd970c88610cf

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA

                                                                                                                                            Filesize

                                                                                                                                            9KB

                                                                                                                                            MD5

                                                                                                                                            ccec9d0a05fb881ddb73fcb2d0f1362a

                                                                                                                                            SHA1

                                                                                                                                            a470eb95a555f2b29c61f8c98fabe17090f6169e

                                                                                                                                            SHA256

                                                                                                                                            e2069c1fd135bdd734bd28ec8c12f32ce08b3920e9c5d3f7faed1e218e93d4c6

                                                                                                                                            SHA512

                                                                                                                                            fdd0b4c0d22eaee944ba232bf1c7ca4741015041348ecb4b41d13d62f63b5c60435f03db2e72c58a2750ae74ca1435956d2b2949c7b8f96b3ae680f533951759

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            8cdc8be2afaee8ca3e03c81edf8bef5b

                                                                                                                                            SHA1

                                                                                                                                            6eb36d7b6407dfade295c671d42e14c792b06fa7

                                                                                                                                            SHA256

                                                                                                                                            43bfd8b750ca444cf83171179d24a50dc7d5ce6d1aaa967c6fe4d98980b397ed

                                                                                                                                            SHA512

                                                                                                                                            79b66d72800c5cc2cd2dd100f733e84d4d213f6b70ac8d6f9139bce1ba18d799d3667ee3b3e6ba6d9a5e17bbfa35418bea1f20a48e33c105533d61654b8495cd

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

                                                                                                                                            Filesize

                                                                                                                                            13KB

                                                                                                                                            MD5

                                                                                                                                            521bc1fd14d5d3e859498a991105fc78

                                                                                                                                            SHA1

                                                                                                                                            000f3f4dc3d974beb67cc37ca432415743e08443

                                                                                                                                            SHA256

                                                                                                                                            8c8012669eb0a4f5acb33a369a1317e1a593bc7d83e66366757ddc7579bf9248

                                                                                                                                            SHA512

                                                                                                                                            410e3a0b44d507fd521c37b76d92dd74e54b78d04753e084f9fe8383fd7d2b34947152065d5714f87f46167fccb1893d724f68b32089f1efd0093dc8b640bd6b

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html

                                                                                                                                            Filesize

                                                                                                                                            10KB

                                                                                                                                            MD5

                                                                                                                                            48656ded1603e67c50a422bc4688f459

                                                                                                                                            SHA1

                                                                                                                                            afe64e8ba55e8233086629a664d482d478a65acd

                                                                                                                                            SHA256

                                                                                                                                            17a19e730804e45744fe364de606e1973225d9abef8b868c460c81861f468924

                                                                                                                                            SHA512

                                                                                                                                            bfc33e122478fd6f339f9885c48c1233b10d6d70e7ce9a457fbb0ec75d90cf03f28938f4c997926cf03b839ffe47cca8f781b5c7c1259baa4454029ec9c0d7e5

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.RSA

                                                                                                                                            Filesize

                                                                                                                                            9KB

                                                                                                                                            MD5

                                                                                                                                            37e3575b2d34fb1da6ed43be688dac57

                                                                                                                                            SHA1

                                                                                                                                            384fcc31115b6e2539f257358ad9456d7960f4b9

                                                                                                                                            SHA256

                                                                                                                                            734a23c19ca2fe39a04147b43c094444be88daf16aeb2cdf65f419b59edbd684

                                                                                                                                            SHA512

                                                                                                                                            f793518dfa08cad19885f733bba609b880ee334bd8e8eb2e80a80ce5483e413d320b80949dc02355b18f91d344b95ed76b735f7e6b752419167efec15121e68a

                                                                                                                                          • C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-core-execution.xml_hidden

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            dacebdca8c76cfb633b74536358a8582

                                                                                                                                            SHA1

                                                                                                                                            77b9ea973f100ccce7d09ae41b1c948d870e9d69

                                                                                                                                            SHA256

                                                                                                                                            08ca3aa6815ef656fce8975fd59fcf6c1514bcf2d39746343a2acd912c547ca6

                                                                                                                                            SHA512

                                                                                                                                            8dc043cf1db8a9def4617b02351c5feba78b8803b70dfed1370e646633dc611f21a2d4530f461002071edf869a810874da2ddc4573e18bd024c24f10010bf536

                                                                                                                                          • C:\Program Files\Java\jre7\lib\images\cursors\win32_LinkNoDrop32x32.gif

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            ded1663de119f6eedac4bc6bda8d5644

                                                                                                                                            SHA1

                                                                                                                                            bb59e9111181ed0c5c9363119461987dfe6de967

                                                                                                                                            SHA256

                                                                                                                                            08dc0099295e8559778564f831d1b35b49a1691d2e57763ed3ab2f8a948f3f2e

                                                                                                                                            SHA512

                                                                                                                                            5956e10d319ec5fba5474fc2908e7fbb98a0d2e9936f1e02b1c2fb42d3b8114d4eb6a0ada5089bb9c19bd47bac60982af411ae741a7280693933b03f95fcc471

                                                                                                                                          • C:\Program Files\Java\jre7\lib\zi\Etc\UTC

                                                                                                                                            Filesize

                                                                                                                                            1KB

                                                                                                                                            MD5

                                                                                                                                            a1d2d5ee8b5230a5965e201873b8e05c

                                                                                                                                            SHA1

                                                                                                                                            b5b69420c21723137de899dbd353f09a4f4c81fe

                                                                                                                                            SHA256

                                                                                                                                            9fc1c33bd8fd8edede30587be00757f973da6d0676b8f8eab873f5bfa1d23018

                                                                                                                                            SHA512

                                                                                                                                            f8b2258d7c6a57b7b6d53364c26fe0658ce00bef554c005b511ad325c949d30b7693c1347187c889b20cdf92ea9bb5b1e8b97daa226d1abf71bc5224bf833362

                                                                                                                                          • C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\vlc.mo

                                                                                                                                            Filesize

                                                                                                                                            609KB

                                                                                                                                            MD5

                                                                                                                                            82e4da1d5cb0a12e8fbb0add7c75c7cb

                                                                                                                                            SHA1

                                                                                                                                            89a0b7909e3045d09ed54773c9e3aeac82f306fb

                                                                                                                                            SHA256

                                                                                                                                            f4dc751d310f4be6be4f61efe6d9e889e96e65df3106ef034524f0efab935b78

                                                                                                                                            SHA512

                                                                                                                                            6385d6f789df71a8be4908987997777b1419fb73f33ddcbc8aff0917dfde26b9075dbdb664e0ca3cd9723a70da6d1b7352349214e7e67537c46fa50b5962ede1

                                                                                                                                          • C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\vlc.mo

                                                                                                                                            Filesize

                                                                                                                                            606KB

                                                                                                                                            MD5

                                                                                                                                            1cbd87e7ed7fe14c27e3bba4da1b1f30

                                                                                                                                            SHA1

                                                                                                                                            8aef93a1b770704dd131a7ffd3d7cd9598c53cb5

                                                                                                                                            SHA256

                                                                                                                                            c0d68d0073761ebbe8914a05e67f84956dfbab76ed55ae20311e24363ca6d172

                                                                                                                                            SHA512

                                                                                                                                            89b744ce2b16e47c63dcee9ebd0783e0c86f4315017cafefb16e15b1a39172b606521175c4098e8c56c14a86082450dc5f6834c81e8c7fdd0f9137070f35a3d4

                                                                                                                                          • C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\vlc.mo

                                                                                                                                            Filesize

                                                                                                                                            599KB

                                                                                                                                            MD5

                                                                                                                                            4c0376b3a6f12c6d1ae57de24ecee0d2

                                                                                                                                            SHA1

                                                                                                                                            8f82f1eda29b64e857eb9f04a284fcfa72f2eb1f

                                                                                                                                            SHA256

                                                                                                                                            ebb8465d1b8997577245fedfa974540ae39387e2e176c68e6793fdc1f9065c35

                                                                                                                                            SHA512

                                                                                                                                            d9f81424124e153a16b4bd5517b2a05655b2bfa8363bb2752612fa9a34322c98c95cea0b3e5ee27ebc3792cb0b2d1baec0cb5cc39b2f8b9b14a0009c5a415d0a

                                                                                                                                          • C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\vlc.mo

                                                                                                                                            Filesize

                                                                                                                                            545KB

                                                                                                                                            MD5

                                                                                                                                            708befcc32649dc94cd7d355b4e470ee

                                                                                                                                            SHA1

                                                                                                                                            b9101e86e49e65357a922053b13748486e882e05

                                                                                                                                            SHA256

                                                                                                                                            c092d4f34053eaae5df122533ba34fd92b35cc6d881e2d6354fbc51634e0b3fc

                                                                                                                                            SHA512

                                                                                                                                            0e7f1defcd653089eefeecdbe90709ed500c19730044b041f83fa53fe09c455c4b5044bc81b54f67fdf0a8b98dec0ff48f1d848186ea86ea1d949ba49506496e