Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72272954a2c...5a.exe
windows7-x64
102C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
172716d15ea...21.exe
windows7-x64
78b04af13b7...21.exe
windows7-x64
10Bit Paymer.exe
windows7-x64
10KeepCalm.exe
windows7-x64
1LockedIn.exe
windows7-x64
1Purge.exe
windows7-x64
1Scarab.exe
windows7-x64
10a631ad1b1a...4b.exe
windows7-x64
6a9053a3a52...bc.exe
windows7-x64
7b764629e1f...1c.exe
windows7-x64
10cf89f70633...5c.exe
windows7-x64
1e951e82867...50.exe
windows7-x64
1fa0c321e1a...d2.exe
windows7-x64
9fc184274ad...27.exe
windows7-x64
10Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 15:13
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
Bit Paymer.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
KeepCalm.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
LockedIn.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Purge.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
Scarab.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240220-en
Behavioral task
behavioral27
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240221-en
General
-
Target
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
-
Size
236KB
-
MD5
6aa5d9b03d34c87026ac11a6f30524fe
-
SHA1
c0c532d64bc1d16aeb12ea58c9e94c48eb3d64d4
-
SHA256
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0
-
SHA512
1e0cdbfd5399c03e6db32b309d38f56dc0761d6a9d2319c712f771fecc9fec8aac0c2dd2ee00e4674b26168265558e4d02a810a6326c73e36a1e453ecc394069
-
SSDEEP
3072:A2XIX/5EEAmkN7HqOaeV/RPMObiZif2fXSF9uvm8dDuCb4NeIAg0Fuj3RK3o1yL:AliN3qO1hR0UiZi+fC+iAObo41I
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!#_READ_ME_#!.inf
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (267) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\DECRYPTINFO = "\"C:\\Users\\Admin\\AppData\\Roaming\\!#_READ_ME_#!.inf\"" 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Public\Libraries\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Music\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Cookies\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Links\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Music\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Documents\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Videos\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\1.bmp" 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Firebird\ 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File created C:\Program Files (x86)\MSSQL.1\!#_READ_ME_#!.inf 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Program Files (x86)\MSSQL.1\ 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File created C:\Program Files\MySQL\!#_READ_ME_#!.inf 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Program Files\MySQL\ 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File created C:\Program Files (x86)\Firebird\!#_READ_ME_#!.inf 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2484 vssadmin.exe 2696 vssadmin.exe 2760 vssadmin.exe 1600 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2684 vssvc.exe Token: SeRestorePrivilege 2684 vssvc.exe Token: SeAuditPrivilege 2684 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2036 wrote to memory of 288 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 28 PID 2036 wrote to memory of 288 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 28 PID 2036 wrote to memory of 288 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 28 PID 2036 wrote to memory of 288 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 28 PID 2036 wrote to memory of 2804 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 2036 wrote to memory of 2804 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 2036 wrote to memory of 2804 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 2036 wrote to memory of 2804 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 288 wrote to memory of 2484 288 cmd.exe 32 PID 288 wrote to memory of 2484 288 cmd.exe 32 PID 288 wrote to memory of 2484 288 cmd.exe 32 PID 288 wrote to memory of 2484 288 cmd.exe 32 PID 2036 wrote to memory of 2748 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 33 PID 2036 wrote to memory of 2748 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 33 PID 2036 wrote to memory of 2748 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 33 PID 2036 wrote to memory of 2748 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 33 PID 2036 wrote to memory of 2544 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 2036 wrote to memory of 2544 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 2036 wrote to memory of 2544 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 2036 wrote to memory of 2544 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 2544 wrote to memory of 2696 2544 cmd.exe 37 PID 2544 wrote to memory of 2696 2544 cmd.exe 37 PID 2544 wrote to memory of 2696 2544 cmd.exe 37 PID 2544 wrote to memory of 2696 2544 cmd.exe 37 PID 2036 wrote to memory of 2460 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 40 PID 2036 wrote to memory of 2460 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 40 PID 2036 wrote to memory of 2460 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 40 PID 2036 wrote to memory of 2460 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 40 PID 2036 wrote to memory of 2624 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2036 wrote to memory of 2624 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2036 wrote to memory of 2624 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2036 wrote to memory of 2624 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2036 wrote to memory of 2388 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2036 wrote to memory of 2388 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2036 wrote to memory of 2388 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2036 wrote to memory of 2388 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2460 wrote to memory of 2760 2460 cmd.exe 45 PID 2460 wrote to memory of 2760 2460 cmd.exe 45 PID 2460 wrote to memory of 2760 2460 cmd.exe 45 PID 2460 wrote to memory of 2760 2460 cmd.exe 45 PID 2036 wrote to memory of 2740 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2036 wrote to memory of 2740 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2036 wrote to memory of 2740 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2036 wrote to memory of 2740 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2740 wrote to memory of 1600 2740 cmd.exe 50 PID 2740 wrote to memory of 1600 2740 cmd.exe 50 PID 2740 wrote to memory of 1600 2740 cmd.exe 50 PID 2740 wrote to memory of 1600 2740 cmd.exe 50 PID 2036 wrote to memory of 1976 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 49 PID 2036 wrote to memory of 1976 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 49 PID 2036 wrote to memory of 1976 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 49 PID 2036 wrote to memory of 1976 2036 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 49 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe"C:\Users\Admin\AppData\Local\Temp\5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:2624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1600
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!#_READ_ME_#!.inf2⤵
- Suspicious use of FindShellTrayWindow
PID:1976
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD551ed64dbc27b3c0962bff1ddd3d9a697
SHA1d56e632f009d40f675cb5bb3a31abe56434ea151
SHA2568b487e2517904a5f23330da47902bba57872cd948fb69188503ea9e951a2579a
SHA5129fa2158d634ad01982643ffb0e54daef2cecb160ff8488d29b6776573d4ed3ee9f8380d0ed057b22e285e6786f59c5c07d6299a5ec58b2924a895734f0e21a16
-
Filesize
14KB
MD5d56d9fb909ae02dc65be938293fda93a
SHA1cd275f177ae4bf13de789b1dfa1641bf8e1602d9
SHA2567f35c8e0cecf672a9115ef263f5153e606ccaba7a0fcc4462746ac9fe9c0cb44
SHA512c4c10c4209681f42474d2e75ba7f89d678514191bb493eceb6235322a3e7f78fa67aad6e3b2c6eb92f774c1cb353b32ae70941489620cee87be7943648ea45c2
-
Filesize
48KB
MD52385c2f60bcd6c894bd6c94e363f26d6
SHA17157cdc17a55b811bd993b265a8f7df73693c789
SHA256fc132d4ebadae1f9e272dc1f3381ac9ca491495d7d91d10d0dae7dcba5743e2d
SHA512ba6bab7bcbdee455db224b0a164edd7cb6f089ad1a58e29a26c21afee02b7ac875ac778a516cb64f1373753f5ae4e7b76d3e4e3618664900ee9063079cc17b30
-
C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi
Filesize140KB
MD5a5680e50b879562fb4272adec5643df0
SHA126647277c82bd2c307f3bebbb83c580903c5e2eb
SHA2564cfde7db0ed75e6f6fbcefe9438833ca156da98ee22902bfc31c4f038ab07d0f
SHA512171f910e6149ce418cb6251fc9c94c248d1fa3b4e7b0cce7ca5cf5f441680e420e6884ec6a8be9bdbb674c24bac7b0c9a7ab9f3679fb27b35ae6c37aa93fd831
-
Filesize
1KB
MD5213422e7c05f99771f75ce3f59f0a45c
SHA183081ba7306e0cfd8edbf24861c0980f521ee66b
SHA25655e3458359fb8c1b3b2aaf84d5ae0d205edc32820cb16610a90f18e44a89c679
SHA512dd67f93ebe1f4be8346b1c98ef98e8f4519c94ae99744040879d5dc5fd23c2ece285a2043086ac76866f5af657856ad4322e1a046c037e31f5f6b6cb5ae9e305
-
Filesize
16B
MD5770d2f3017c668bcffd742f9adc26523
SHA1dbec39f20271ec623922e87cd03dc86e021fd243
SHA25674d959ef2d18661aaec18233588a8a3b821b57e04e868fa2c1547bdf446a407f
SHA512ede865d621b841eefa66f7cbada7e6f33d1d0fdd42d941193d5c0d0f14d69e323087c2c5f4fa31d429d2bf17a5b65e0c4abe7125f4ae8f4e72bd2f72a35f1e26
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2548_2049673321\6ea5a28b-3996-422b-b7c6-9c420189f286.tmp
Filesize88KB
MD53e8acce4682d9ccee2010e1c4ddcb1ca
SHA1a76eb16b8f284841c5e253ff2593997324bd7a53
SHA25616fe6b383eb561d29d679fb53d5115ae865b5775a538816b837a5584f4405950
SHA5121b59206cb30f472bd11c571d6b6551255ded90ba3f07ac1624587e9e654e797b1993880d9b79704d5a6a2c1f3dd201d2c9bdc4bf0bcc7df9dcea3ed3b2f20885
-
Filesize
242KB
MD5dbb4e2dbeb35972ac8da075e2a1efcb0
SHA1ed985a9bbfbe738c4e73028f701e9f47ae1288e6
SHA2566d9b45d06552ab90c63858030fe37c16cd00a58e066072d6dc3742cca47c7b7b
SHA512096f5afe60c7b53aefa5b1c9b98ec86f3fbdb4306001043b559bd5ceb15b547699d66920ef6ad2a913039e8b019ee576cfc923fdc28ee8f16615fff20fc1e9ee
-
Filesize
86KB
MD54615b96fb72edbb509cc6c6a2d645dc6
SHA182b06e9af299be8a9e5c84e35a28318642b3370d
SHA256043d4369a1e77ab6281e4d6469250549ef9a32b9fa4178411e6753b4438f4970
SHA51278f39aa4f59fcc62728b9b12e0a4ec12f5e5c8bbb6af5e61fbfc5c7ab1673fe5a95611813652949de342bbfc0c2e1645e321f6c31a5b67821efc94a65cb7d2db