Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72272954a2c...5a.exe
windows7-x64
102C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
172716d15ea...21.exe
windows7-x64
78b04af13b7...21.exe
windows7-x64
10Bit Paymer.exe
windows7-x64
10KeepCalm.exe
windows7-x64
1LockedIn.exe
windows7-x64
1Purge.exe
windows7-x64
1Scarab.exe
windows7-x64
10a631ad1b1a...4b.exe
windows7-x64
6a9053a3a52...bc.exe
windows7-x64
7b764629e1f...1c.exe
windows7-x64
10cf89f70633...5c.exe
windows7-x64
1e951e82867...50.exe
windows7-x64
1fa0c321e1a...d2.exe
windows7-x64
9fc184274ad...27.exe
windows7-x64
10Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 15:13
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
Bit Paymer.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
KeepCalm.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
LockedIn.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Purge.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
Scarab.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240220-en
Behavioral task
behavioral27
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240221-en
General
-
Target
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
-
Size
235KB
-
MD5
fac89802b3db89ba74cf8891824af3d6
-
SHA1
27b57dfdc8b1b265e3755cc0068be846c4c4981e
-
SHA256
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061
-
SHA512
2c604a00446fe4901341a4c8093443cba06fc00ee90a946749c3b66b2205339850740406edd0553ef55a33573599c7e494eb1b0552395d1cd9e54a8d4268b3e5
-
SSDEEP
3072:thrQ6J0Exp7gW31x+S/EkuIDNGqLW4t5P0tz/aMgb2JpL7Ag0FujYWkcv23nNT3I:tiHgpR31kS8kuIpW60tRPAOs3sc8
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!#_READ_ME_#!.inf
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (303) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\DECRYPTINFO = "\"C:\\Users\\Admin\\AppData\\Roaming\\!#_READ_ME_#!.inf\"" 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Links\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Music\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Cookies\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Music\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Videos\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Documents\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\1.bmp" 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 912 vssadmin.exe 2312 vssadmin.exe 2980 vssadmin.exe 1884 vssadmin.exe 1576 vssadmin.exe 2756 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2436 vssvc.exe Token: SeRestorePrivilege 2436 vssvc.exe Token: SeAuditPrivilege 2436 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2260 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 28 PID 2832 wrote to memory of 2260 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 28 PID 2832 wrote to memory of 2260 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 28 PID 2832 wrote to memory of 2260 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 28 PID 2832 wrote to memory of 2084 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 30 PID 2832 wrote to memory of 2084 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 30 PID 2832 wrote to memory of 2084 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 30 PID 2832 wrote to memory of 2084 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 30 PID 2832 wrote to memory of 2800 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 32 PID 2832 wrote to memory of 2800 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 32 PID 2832 wrote to memory of 2800 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 32 PID 2832 wrote to memory of 2800 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 32 PID 2832 wrote to memory of 2208 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 34 PID 2832 wrote to memory of 2208 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 34 PID 2832 wrote to memory of 2208 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 34 PID 2832 wrote to memory of 2208 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 34 PID 2260 wrote to memory of 2312 2260 cmd.exe 35 PID 2260 wrote to memory of 2312 2260 cmd.exe 35 PID 2260 wrote to memory of 2312 2260 cmd.exe 35 PID 2260 wrote to memory of 2312 2260 cmd.exe 35 PID 2208 wrote to memory of 2980 2208 cmd.exe 37 PID 2208 wrote to memory of 2980 2208 cmd.exe 37 PID 2208 wrote to memory of 2980 2208 cmd.exe 37 PID 2208 wrote to memory of 2980 2208 cmd.exe 37 PID 2832 wrote to memory of 1984 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 40 PID 2832 wrote to memory of 1984 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 40 PID 2832 wrote to memory of 1984 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 40 PID 2832 wrote to memory of 1984 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 40 PID 2832 wrote to memory of 1484 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 42 PID 2832 wrote to memory of 1484 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 42 PID 2832 wrote to memory of 1484 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 42 PID 2832 wrote to memory of 1484 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 42 PID 1984 wrote to memory of 1884 1984 cmd.exe 43 PID 1984 wrote to memory of 1884 1984 cmd.exe 43 PID 1984 wrote to memory of 1884 1984 cmd.exe 43 PID 1984 wrote to memory of 1884 1984 cmd.exe 43 PID 2832 wrote to memory of 2248 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 44 PID 2832 wrote to memory of 2248 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 44 PID 2832 wrote to memory of 2248 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 44 PID 2832 wrote to memory of 2248 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 44 PID 2832 wrote to memory of 1564 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 46 PID 2832 wrote to memory of 1564 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 46 PID 2832 wrote to memory of 1564 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 46 PID 2832 wrote to memory of 1564 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 46 PID 1564 wrote to memory of 1576 1564 cmd.exe 49 PID 1564 wrote to memory of 1576 1564 cmd.exe 49 PID 1564 wrote to memory of 1576 1564 cmd.exe 49 PID 1564 wrote to memory of 1576 1564 cmd.exe 49 PID 2832 wrote to memory of 2252 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 50 PID 2832 wrote to memory of 2252 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 50 PID 2832 wrote to memory of 2252 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 50 PID 2832 wrote to memory of 2252 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 50 PID 2832 wrote to memory of 868 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 52 PID 2832 wrote to memory of 868 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 52 PID 2832 wrote to memory of 868 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 52 PID 2832 wrote to memory of 868 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 52 PID 2832 wrote to memory of 628 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 53 PID 2832 wrote to memory of 628 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 53 PID 2832 wrote to memory of 628 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 53 PID 2832 wrote to memory of 628 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 53 PID 2832 wrote to memory of 2940 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 55 PID 2832 wrote to memory of 2940 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 55 PID 2832 wrote to memory of 2940 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 55 PID 2832 wrote to memory of 2940 2832 21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe 55 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe"C:\Users\Admin\AppData\Local\Temp\21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:2084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:1484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵PID:2252
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:2940
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:912
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!#_READ_ME_#!.inf2⤵PID:1612
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD535436a31e111af53c435f119b5051312
SHA1b81a584d3dcd21a5cdb5380bfdc00625d79f2f54
SHA256b97a4607e5e490f6a12b18b83f97b0967dbf02601f3f53fc42606c408997c8f9
SHA512292d71f9fc9566606ef1112c93fc639f5a2275bf67108f7bbc48b44de5461127c4d92d92519794a6a74b60a3bdd2dd72875b7344b3b2fb49d316b7bdd7dd40ae
-
Filesize
14KB
MD5bb63b37e19204a354fd421dc313ecb65
SHA1c7737f3c3e81c430b11a20a6b5b3990e82dd290f
SHA256738aac381d42ff71db5f2a63df0f4aa186f7be930dc30ff7dd7ff7f0bc526f8c
SHA512bf38545b3c20d3d8ee8d915a688b23df92a1794d50fa00f6c6523244e90e641bbd7ab61a6748a2919ce5dd1a64548ebfdbb467840eae7da1b34450024d6e82f7
-
Filesize
48KB
MD56431795c31e5730ce99995849bf08dde
SHA1675120e8e7a3252d6bd023f9e390d984cbbd3cfa
SHA25600bcc1973b6d27098c2b64b7cfd5d2f4c0095f99f9132a402548cde7911cb650
SHA51248761c8b26f049bb6c9021dc84224765b3a3e951b9431a45d3cbba3d2320592b7201f4019ebe3d6fdd71f24006101bdab73c26c0b960ce5f12386d6080d270b3
-
C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi
Filesize140KB
MD59d0bf08f95e60fd9419c637d22aab3c8
SHA1621a0c8b299c16f389bb1c1a8aab9066d500df51
SHA25649a96682cdbc3ec8eb1558ee0e2877e45ec35cc7d7361feea3ffd47c114125a4
SHA5127050859e3197397958fa8125a78f998f963425ddb9aa0f73dea3af733b9ac19ab31cfaefeec6c4e06f5cdce45e08edbffa3acda6548cff66db232ff2965376c3
-
Filesize
1KB
MD58349660e1f70d33c1b203e0400e283d6
SHA1405ceae0ac5724b413df9a62ffd4ea18c4e59bc0
SHA2564716387dc192b3aa79ab3e7b61a4c22db4f36f394721b36164de90f32c964e46
SHA5128e3506581865c5183494055bceacf7141cf23de15c42c7c11be2641d3386fc6c0363780572bb983518288f22caa014eeafa93f841ba47b5173598c272998615e
-
Filesize
16B
MD55e86f65f2d217e422d8c44f5db9dd005
SHA11d7d08f0becbe092b0ddf9b83c8d54aee985bf8e
SHA256267a38d4573a5ac776339c619a9c7f9f8278ddc9c1d8ec7fe8a20763042e1c8e
SHA5122c611bc9aedf3eb8910daa745bcf250e54435ccf7e66b9b644a81f23d4031404c602885b1ec09d238f7a6453640e4d7611ce26be42368aa622fc2e536c937f3f
-
Filesize
242KB
MD5c6677a621784eda266239697b95633c6
SHA18f6bad35b4a7af0c91d08ec32c1018f41a928da9
SHA256e7752fb7dbf46d91ebbfa456c4583c3560c723cf2373f6c17c790567265b3dee
SHA512a70793a67ac205eab6b34cc96917b7baf2b2fa6060c75ff5486efa604c59b0a4f9bab9ec0289d19eebb6d79bd31b80b552751de5bd5fb2dc49f9166f51384167
-
Filesize
88KB
MD5e33d2fc2f6844b85bfbd7e131a4a50cc
SHA107d9c300cb259f51671b2de60cf594477dfc50a5
SHA25672e3c390435a6086fa4381203aed25c40537de7c39bf41c47edbe770cec73612
SHA512ee94d8c9cc654954c6796e770c907193c04db7230d430425ca5a2c3d3e242b0188145a2d2b5433ddfafe03cec981a1f9b6f550103b1046b595a176f0a7d836d1
-
Filesize
86KB
MD5f674b11e7ef1d7c2a453369ad7949e1e
SHA173db32568b7dedf2b38229680d8c760ed2e18a3b
SHA256fa59c1d1d32eafd45f66a0ca745e492872784146d0815bf81786f7315f63094e
SHA512014c0507d347a5e7f9c140a5fb18fc5ac83c79baa03a32ba62317ecbf3882ecf11adefbe3e8ad1d03e23943be69618c4e7fd5b9af7622bddcf83b507082937c1