Overview
overview
10Static
static
1007117c02a0...99.dll
windows7-x64
107117c02a0...99.dll
windows10-2004-x64
11391c20a26...80.dll
windows7-x64
101391c20a26...80.dll
windows10-2004-x64
10350ba7fca6...bd.exe
windows7-x64
9350ba7fca6...bd.exe
windows10-2004-x64
1051eb749d6c...3e.dll
windows7-x64
351eb749d6c...3e.dll
windows10-2004-x64
1017205c4318...90.exe
windows7-x64
917205c4318...90.exe
windows10-2004-x64
95d2204f3a2...aa.exe
windows7-x64
5d2204f3a2...aa.exe
windows10-2004-x64
7883f01096...8a.exe
windows7-x64
107883f01096...8a.exe
windows10-2004-x64
10ae7c868713...6e.exe
windows7-x64
10ae7c868713...6e.exe
windows10-2004-x64
10Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 12:59
Behavioral task
behavioral1
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral13
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10v2004-20240226-en
General
-
Target
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
-
Size
737KB
-
MD5
0bf7bc20496143a9f028e77ab47b4698
-
SHA1
aa54013aeb502b4a936331deb76a6411f1f1ade7
-
SHA256
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd
-
SHA512
5e94cd77c4ad6dfa1064915ca0f4d117a2e3a4e924d05a16df0b223a5a0cbcb6124627e41d184aa0584f3ff3bbd5f9f913964887c7eb140e105317d4f5709981
-
SSDEEP
12288:bO+sm75a7DI9Mv53VI/XfaUs442JbV24chSS1i2wZbDFMMWzVFq:rh75a7M9S3VYa4npY4cFM2MWhY
Malware Config
Extracted
C:\Program Files\instructions_read_me.txt
blackbasta
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (4589) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-180.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\instructions_read_me.txt 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-24_altform-unplated_contrast-black.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-256.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Offline\instructions_read_me.txt 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\sawindbg.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial-ppd.xrm-ms 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpostproc_plugin.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\AppxManifest.xml 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-36_altform-unplated.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\15.rsrc 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-24.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroSup64.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Runtime.InteropServices.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Globalization.Extensions.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-64.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\instructions_read_me.txt 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderLogoExtensions.targetsize-336.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\instructions_read_me.txt 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\JavaAccessBridge-64.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ul-oob.xrm-ms 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\FileVisio32x32.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.scale-200.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libddummy_plugin.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\SubmitConvertTo.vsd 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Runtime.Serialization.Json.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-ppd.xrm-ms 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_ne.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\System\mfcm140u.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_COL.HXT 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GKWord.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mfc140u.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\instructions_read_me.txt 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-16.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-256_altform-lightunplated.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files (x86)\Common Files\System\uk-UA\wab32res.dll.mui 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tabskb.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-32_altform-unplated.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File created C:\Program Files\instructions_read_me.txt 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Mozilla Firefox\installation_telemetry.json 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-256.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\pkcs11wrapper.md 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\iacom2im.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\vccorlib140.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.513.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_KMS_Client_AE-ppd.xrm-ms 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\bg1a.jpg 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderWideTile.contrast-black_scale-100.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-multibyte-l1-1-0.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PowerPointInterProviderRanker.bin 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\complete.contrast-black.png 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\mshwLatin.dll.mui 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\PresentationFramework.Royale.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\System.Security.Permissions.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\SystemX86\vcruntime140.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\AppxSignature.p7x 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Reflection.Metadata.dll 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2472 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.taovhsr3u\DefaultIcon 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.taovhsr3u 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.taovhsr3u\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2076 vssvc.exe Token: SeRestorePrivilege 2076 vssvc.exe Token: SeAuditPrivilege 2076 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.execmd.exedescription pid process target process PID 2608 wrote to memory of 4644 2608 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe cmd.exe PID 2608 wrote to memory of 4644 2608 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe cmd.exe PID 2608 wrote to memory of 4644 2608 350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe cmd.exe PID 4644 wrote to memory of 2472 4644 cmd.exe vssadmin.exe PID 4644 wrote to memory of 2472 4644 cmd.exe vssadmin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe"C:\Users\Admin\AppData\Local\Temp\350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2472
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a1a6d0c7e20ae10a8cb242dd863187a5
SHA1edd3eca74ab92940d909e349ae773c59caa49a56
SHA256d50b0df979cb67d1a7f11833bda6c5d4c2cd355e05bf02c420458aaa56d7f9ab
SHA5123e0c90d6d9910411ddc358281a4f776d0b94b923ea9119d4fdb0a6eb6830bcc2aab29abf0019a30008f6d37f50e967739de332a99dad60b7d87c415092982999