Malware Analysis Report

2024-09-11 01:07

Sample ID 240321-mnat7ahf22
Target 16164047899.zip
SHA256 c9ee552718024ce4f90a38d949a12f9364c67db550bbad2ec67811e884746b15
Tags
phobos evasion persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c9ee552718024ce4f90a38d949a12f9364c67db550bbad2ec67811e884746b15

Threat Level: Known bad

The file 16164047899.zip was found to be: Known bad.

Malicious Activity Summary

phobos evasion persistence ransomware spyware stealer

Phobos

Renames multiple (310) files with added filename extension

Renames multiple (624) files with added filename extension

Modifies boot configuration data using bcdedit

Deletes shadow copies

Modifies Windows Firewall

Deletes backup catalog

Checks computer location settings

Drops startup file

Reads user/profile data of web browsers

Adds Run key to start application

Drops desktop.ini file(s)

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

Checks SCSI registry key(s)

Uses Volume Shadow Copy service COM API

Suspicious behavior: EnumeratesProcesses

Interacts with shadow copies

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-03-21 10:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-21 10:36

Reported

2024-03-21 10:39

Platform

win7-20240221-en

Max time kernel

150s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (310) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37 = "C:\\Users\\Admin\\AppData\\Local\\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe" C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37 = "C:\\Users\\Admin\\AppData\\Local\\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe" C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQ9N4B3U\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JSZQNXMR\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CYXNIRQN\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O29M4VT2\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\87XXOISN\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLNOTER.FAE.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0237228.WMF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\settings.css C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.OPG C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\button.gif.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Sts.css.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.base.nl_ja_4.4.0.v20140623020002.jar.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jre7\bin\dt_socket.dll.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\ACWZUSR12.ACCDU.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART14.BDR.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierDownArrow.jpg.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE.MANIFEST C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\QP.DPV.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mshwLatin.dll.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Vancouver.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\add_down.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.SF.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099158.WMF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Common Files\System\ado\msadrh15.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextService.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00175_.GIF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01751_.GIF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Equity.xml.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\jfluid-server_zh_CN.jar.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Windows Media Player\es-ES\mpvis.dll.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106816.WMF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01590_.WMF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierWindowMask.bmp C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoAcq.dll.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Windows Portable Devices\sqmapi.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Microsoft Office\Office14\MAPISHELL.DLL.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00195_.WMF.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\RMNSQUE.INF.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\ACCOLK.DLL C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageSmall.jpg C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7EN.LEX.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\tipresx.dll.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\vlc.mo.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdatt.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00224_.WMF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01013_.WMF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Median.eftx.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-actions.xml C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\security\US_export_policy.jar C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Internet Explorer\en-US\iedvtool.dll.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\settings.js C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AssemblyInfo.zip.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\picturePuzzle.html C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Rangoon C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-threaddump_zh_CN.jar.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0400002.PNG.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Slipstream.eftx C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\SpiderSolitaire.exe.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-time-l1-1-0.dll.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\DEEPBLUE.INF.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00164_.GIF C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME50.CSS.id[107A118A-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1244 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 2508 wrote to memory of 2640 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2508 wrote to memory of 2640 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2508 wrote to memory of 2640 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3004 wrote to memory of 2380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3004 wrote to memory of 2380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3004 wrote to memory of 2380 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3004 wrote to memory of 1732 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3004 wrote to memory of 1732 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3004 wrote to memory of 1732 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2508 wrote to memory of 3500 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2508 wrote to memory of 3500 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2508 wrote to memory of 3500 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2508 wrote to memory of 3952 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2508 wrote to memory of 3952 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2508 wrote to memory of 3952 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2508 wrote to memory of 3876 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2508 wrote to memory of 3876 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2508 wrote to memory of 3876 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2508 wrote to memory of 3864 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2508 wrote to memory of 3864 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2508 wrote to memory of 3864 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 1244 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1308 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1308 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1308 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 1308 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 1244 wrote to memory of 844 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 844 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 844 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 1244 wrote to memory of 844 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 844 wrote to memory of 1964 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 844 wrote to memory of 1964 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 844 wrote to memory of 1964 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 844 wrote to memory of 2088 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 844 wrote to memory of 2088 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 844 wrote to memory of 2088 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 844 wrote to memory of 2420 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 844 wrote to memory of 2420 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 844 wrote to memory of 2420 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 844 wrote to memory of 2152 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 844 wrote to memory of 2152 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 844 wrote to memory of 2152 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 844 wrote to memory of 3980 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 844 wrote to memory of 3980 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 844 wrote to memory of 3980 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe

"C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe"

C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe

"C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

N/A

Files

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW2.cab.id[107A118A-3483].[[email protected]].8base

MD5 d81a6db4b30d49656cc0a44228fb9e3d
SHA1 f45ffa288be5e9b60ac4612f380ba0b9bc679639
SHA256 1664000ded4f5aca0ffbf68a8c7d62590847049f7c3c109d6391bd3cfb5968dd
SHA512 9dd63d7185a35e0ca49637cadbc7af2f684bc6564e7a438f66cb65e7566d9e6ddc9ade45e16c438405c0838f6dd8989c461b09b512a49554540a859bf6965cd5

C:\info.hta

MD5 0194731ffdda82ae1865d5d986453316
SHA1 a257eb4935ea29fa61fd5a4ac6a589889bc017ab
SHA256 f517a1b3ed25a0c6e242e1718bb97a8b5cc4b782b95cb94ad6563aa834610be7
SHA512 8c7cf7bdd6debd05d83c05c0c14d1f6568c60cbd9006c0d1909591fe175882c754caacc1f3543ef21d8137d3ae7dc9539abb52585d6ed4fdb21f876a3bb63eb1

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-21 10:36

Reported

2024-03-21 10:39

Platform

win10v2004-20240319-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (624) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37 = "C:\\Users\\Admin\\AppData\\Local\\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe" C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37 = "C:\\Users\\Admin\\AppData\\Local\\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe" C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-817259280-2658881748-983986378-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-817259280-2658881748-983986378-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-256.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\api-ms-win-crt-filesystem-l1-1-0.dll.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_LogoSmall.targetsize-32.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Net.Requests.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.targetsize-256_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-60_altform-unplated_contrast-black.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\GeometryShader.cso C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Java\jre-1.8\lib\ext\meta-index.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\9px.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\clrcompression.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-40_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\plugin.js C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\VisualElements\SmallLogoCanary.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\iheart-radio.scale-100.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Pipes.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013bw.dotx.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\libwasapi_plugin.dll.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailBadge.scale-400.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\PlayStore_icon.svg.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteWideTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\MicrosoftEdgeUpdate.exe C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-phn.xrm-ms.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluNoInternetConnection_120x80.svg C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.scale-200_contrast-black.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\FetchingMail.scale-150.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-gb\ui-strings.js.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\7-Zip\Lang\mn.txt.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Sockets.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_200_percent.pak C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\mfc140rus.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\ui-strings.js C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\System.Windows.Forms.resources.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\CardViewIcon.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\HintBarEllipses.16.White.png.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SyncFusion.Core.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\host.luac.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionGroupWideTile.scale-400.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsWideTile.contrast-black_scale-200.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\LargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\onramp.dll.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Mozilla Firefox\fonts\TwemojiMozilla.ttf.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libtheora_plugin.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icucnv58.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\pl_get.svg.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\MSFT_PackageManagementSource.schema.mfl C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\sr-latn-cs\mso.acl C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\sqloledb.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.c C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ppd.xrm-ms.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-48_contrast-black.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\epdf\selector.js.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\ro.pak.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Common Files\System\ado\msader15.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\PresentationCore.resources.dll.id[FF25AF51-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.AppContext.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\ar.pak C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\javafx_iio.dll C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 C:\Windows\System32\vds.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 C:\Windows\System32\vds.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName C:\Windows\System32\vds.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3320 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 3320 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 3320 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 3320 wrote to memory of 220 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 220 wrote to memory of 4612 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 220 wrote to memory of 4612 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2924 wrote to memory of 3000 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2924 wrote to memory of 3000 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 220 wrote to memory of 4792 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 220 wrote to memory of 4792 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2924 wrote to memory of 4924 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2924 wrote to memory of 4924 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2924 wrote to memory of 3748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2924 wrote to memory of 3748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2924 wrote to memory of 3920 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2924 wrote to memory of 3920 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2924 wrote to memory of 4456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2924 wrote to memory of 4456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 3320 wrote to memory of 5464 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5464 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5464 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5468 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5468 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5468 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5856 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5856 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5856 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\SysWOW64\mshta.exe
PID 3320 wrote to memory of 5364 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 3320 wrote to memory of 5364 N/A C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe C:\Windows\system32\cmd.exe
PID 5364 wrote to memory of 5536 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 5364 wrote to memory of 5536 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 5364 wrote to memory of 5372 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 5364 wrote to memory of 5372 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 5364 wrote to memory of 5484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 5364 wrote to memory of 5484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 5364 wrote to memory of 5488 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 5364 wrote to memory of 5488 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 5364 wrote to memory of 5500 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 5364 wrote to memory of 5500 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe

"C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe"

C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe

"C:\Users\Admin\AppData\Local\Temp\159b55f019e153c1023e2f0f605bb46f1e7646332e0be96f960521d4c9144d37.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4116 --field-trial-handle=2268,i,4334050275411101233,11484630688883830558,262144 --variations-seed-version /prefetch:8

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

Country Destination Domain Proto
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
GB 13.105.221.16:443 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 209.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 26.178.89.13.in-addr.arpa udp

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll.id[FF25AF51-3483].[[email protected]].8base

MD5 60e8ec1dac7b33f696ff26811cdd6232
SHA1 260e94d8dcb1f619266fc56ab409a3b089892e91
SHA256 c2c93ed9f4fc82fde4e789c00c0c54ba8afcc721c3aaa3b86e4f6d5fabdfaad3
SHA512 21aab2bc06819ba1fda1d13145af11ab75dbcbf818c8e0bf7d17732b12f49b453454a9572def7cdf94b5c4fabaabccf2f47524814a4df30e766dfee7e89991dc

C:\info.hta

MD5 502fd73775487958d1f5e314d01a7cf3
SHA1 b13793a90d1ca188661f03e7980eb6f91f37a31a
SHA256 908922c7c86a10c8121f7600f44b6ded977656edc76b8ad0994d7907bd949e5c
SHA512 1adfcbeb75f67db2263c7f9ef887af0f773d432e875c611cf1dc7667617ad87db56c4a51f2462cc7852cb1b640db7d50b13253d11d3fc584d8eb5a7fe875eb6e