Analysis
-
max time kernel
191s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
Resource
win11-20240412-en
General
-
Target
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe
-
Size
185KB
-
MD5
fe788ba47f0a49329fd241a942bab938
-
SHA1
186e444c12d81a6c18e2f8eb66459a354c2ed25b
-
SHA256
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2
-
SHA512
673f9770ff7e7e1ac39b33513959f78298df4102e4322dddd2e745a313c0ecbab2ca732d14e6a916ba2165c40a5e6e48d1377618ff3a7d73085ac860be4340de
-
SSDEEP
3072:XqS7gtGIeq8KxrvRp1MImcZeuLaxugfCJsOlq8WkJK0BOog/Tt3onM9kHpOBae4/:aS7gtyuzFxm16axugfqlMw5g5BkOdSlr
Malware Config
Extracted
C:\Program Files (x86)\R3ADM3.txt
conti
http://m232fdxbfmbrcehbrj5iayknxnggf6niqfj6x4iedrgtab4qupzjlaid.onion
https://contirecovery.info
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Renames multiple (7955) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 46 IoCs
Processes:
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exedescription ioc process File opened for modification C:\Users\Admin\Desktop\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Links\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Documents\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\Y3HLRHFA\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Music\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Videos\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\5B8DS9TT\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CJQLK5UF\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Music\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JQHF6B80\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe -
Drops file in Program Files directory 64 IoCs
Processes:
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185806.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\DISTLSTL.ICO 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-editor-mimelookup-impl.jar 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00235_.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Apothecary.eftx 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.httpcomponents.httpcore_4.2.5.v201311072007.jar 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02141_.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\custom.lua 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_F_COL.HXK 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-over-DOT.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\WARN.WAV 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00169_.GIF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0157177.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02223U.BMP 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Chagos 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.SE.XML 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15018_.GIF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR22F.GIF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\es-419.pak 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\JNGLE_01.MID 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14795_.GIF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14710_.GIF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\HST10 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\browse.xml 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-io-ui.jar 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-modules-startup.xml 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME33.CSS 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\StatusAway.ico 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Enderbury 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-dialogs_ja.jar 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Malta 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-border.png 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text.nl_ja_4.4.0.v20140623020002.jar 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\vlc.mo 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLBAR.INF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01680_.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00524_.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EXPLR_01.MID 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101866.BMP 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jerusalem 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DigitalInk.jpg 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\R3ADM3.txt 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\VCTRN_01.MID 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Custom.propdesc 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01244_.GIF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\THMBNAIL.PNG 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105502.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00212_.WMF 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exepid process 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exeWMIC.exeWMIC.exedescription pid process Token: SeBackupPrivilege 2620 vssvc.exe Token: SeRestorePrivilege 2620 vssvc.exe Token: SeAuditPrivilege 2620 vssvc.exe Token: SeIncreaseQuotaPrivilege 2748 WMIC.exe Token: SeSecurityPrivilege 2748 WMIC.exe Token: SeTakeOwnershipPrivilege 2748 WMIC.exe Token: SeLoadDriverPrivilege 2748 WMIC.exe Token: SeSystemProfilePrivilege 2748 WMIC.exe Token: SeSystemtimePrivilege 2748 WMIC.exe Token: SeProfSingleProcessPrivilege 2748 WMIC.exe Token: SeIncBasePriorityPrivilege 2748 WMIC.exe Token: SeCreatePagefilePrivilege 2748 WMIC.exe Token: SeBackupPrivilege 2748 WMIC.exe Token: SeRestorePrivilege 2748 WMIC.exe Token: SeShutdownPrivilege 2748 WMIC.exe Token: SeDebugPrivilege 2748 WMIC.exe Token: SeSystemEnvironmentPrivilege 2748 WMIC.exe Token: SeRemoteShutdownPrivilege 2748 WMIC.exe Token: SeUndockPrivilege 2748 WMIC.exe Token: SeManageVolumePrivilege 2748 WMIC.exe Token: 33 2748 WMIC.exe Token: 34 2748 WMIC.exe Token: 35 2748 WMIC.exe Token: SeIncreaseQuotaPrivilege 2748 WMIC.exe Token: SeSecurityPrivilege 2748 WMIC.exe Token: SeTakeOwnershipPrivilege 2748 WMIC.exe Token: SeLoadDriverPrivilege 2748 WMIC.exe Token: SeSystemProfilePrivilege 2748 WMIC.exe Token: SeSystemtimePrivilege 2748 WMIC.exe Token: SeProfSingleProcessPrivilege 2748 WMIC.exe Token: SeIncBasePriorityPrivilege 2748 WMIC.exe Token: SeCreatePagefilePrivilege 2748 WMIC.exe Token: SeBackupPrivilege 2748 WMIC.exe Token: SeRestorePrivilege 2748 WMIC.exe Token: SeShutdownPrivilege 2748 WMIC.exe Token: SeDebugPrivilege 2748 WMIC.exe Token: SeSystemEnvironmentPrivilege 2748 WMIC.exe Token: SeRemoteShutdownPrivilege 2748 WMIC.exe Token: SeUndockPrivilege 2748 WMIC.exe Token: SeManageVolumePrivilege 2748 WMIC.exe Token: 33 2748 WMIC.exe Token: 34 2748 WMIC.exe Token: 35 2748 WMIC.exe Token: SeIncreaseQuotaPrivilege 2448 WMIC.exe Token: SeSecurityPrivilege 2448 WMIC.exe Token: SeTakeOwnershipPrivilege 2448 WMIC.exe Token: SeLoadDriverPrivilege 2448 WMIC.exe Token: SeSystemProfilePrivilege 2448 WMIC.exe Token: SeSystemtimePrivilege 2448 WMIC.exe Token: SeProfSingleProcessPrivilege 2448 WMIC.exe Token: SeIncBasePriorityPrivilege 2448 WMIC.exe Token: SeCreatePagefilePrivilege 2448 WMIC.exe Token: SeBackupPrivilege 2448 WMIC.exe Token: SeRestorePrivilege 2448 WMIC.exe Token: SeShutdownPrivilege 2448 WMIC.exe Token: SeDebugPrivilege 2448 WMIC.exe Token: SeSystemEnvironmentPrivilege 2448 WMIC.exe Token: SeRemoteShutdownPrivilege 2448 WMIC.exe Token: SeUndockPrivilege 2448 WMIC.exe Token: SeManageVolumePrivilege 2448 WMIC.exe Token: 33 2448 WMIC.exe Token: 34 2448 WMIC.exe Token: 35 2448 WMIC.exe Token: SeIncreaseQuotaPrivilege 2448 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2092 wrote to memory of 2608 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2608 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2608 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2608 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2608 wrote to memory of 2748 2608 cmd.exe WMIC.exe PID 2608 wrote to memory of 2748 2608 cmd.exe WMIC.exe PID 2608 wrote to memory of 2748 2608 cmd.exe WMIC.exe PID 2092 wrote to memory of 2564 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2564 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2564 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2564 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2564 wrote to memory of 2448 2564 cmd.exe WMIC.exe PID 2564 wrote to memory of 2448 2564 cmd.exe WMIC.exe PID 2564 wrote to memory of 2448 2564 cmd.exe WMIC.exe PID 2092 wrote to memory of 2456 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2456 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2456 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2456 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2456 wrote to memory of 2352 2456 cmd.exe WMIC.exe PID 2456 wrote to memory of 2352 2456 cmd.exe WMIC.exe PID 2456 wrote to memory of 2352 2456 cmd.exe WMIC.exe PID 2092 wrote to memory of 2868 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2868 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2868 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 2868 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2868 wrote to memory of 1712 2868 cmd.exe WMIC.exe PID 2868 wrote to memory of 1712 2868 cmd.exe WMIC.exe PID 2868 wrote to memory of 1712 2868 cmd.exe WMIC.exe PID 2092 wrote to memory of 680 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 680 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 680 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 680 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 680 wrote to memory of 1160 680 cmd.exe WMIC.exe PID 680 wrote to memory of 1160 680 cmd.exe WMIC.exe PID 680 wrote to memory of 1160 680 cmd.exe WMIC.exe PID 2092 wrote to memory of 1112 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1112 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1112 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1112 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 1112 wrote to memory of 320 1112 cmd.exe WMIC.exe PID 1112 wrote to memory of 320 1112 cmd.exe WMIC.exe PID 1112 wrote to memory of 320 1112 cmd.exe WMIC.exe PID 2092 wrote to memory of 1048 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1048 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1048 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1048 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 1048 wrote to memory of 2380 1048 cmd.exe WMIC.exe PID 1048 wrote to memory of 2380 1048 cmd.exe WMIC.exe PID 1048 wrote to memory of 2380 1048 cmd.exe WMIC.exe PID 2092 wrote to memory of 1976 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1976 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1976 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1976 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 1976 wrote to memory of 2220 1976 cmd.exe WMIC.exe PID 1976 wrote to memory of 2220 1976 cmd.exe WMIC.exe PID 1976 wrote to memory of 2220 1976 cmd.exe WMIC.exe PID 2092 wrote to memory of 1956 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1956 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1956 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 2092 wrote to memory of 1956 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe PID 1956 wrote to memory of 2332 1956 cmd.exe WMIC.exe PID 1956 wrote to memory of 2332 1956 cmd.exe WMIC.exe PID 1956 wrote to memory of 2332 1956 cmd.exe WMIC.exe PID 2092 wrote to memory of 1004 2092 96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe"C:\Users\Admin\AppData\Local\Temp\96812dc56ffc07d9260b60dadd9729b1aaf29d426970f9385fad87d99d4578c2.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EFEC896E-B8B0-438A-9EE8-D170D121BF16}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EFEC896E-B8B0-438A-9EE8-D170D121BF16}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5E590083-238F-4C62-B7AA-879901885D03}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5E590083-238F-4C62-B7AA-879901885D03}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1560DEBB-796E-45DD-8E59-41AEBCFF317D}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1560DEBB-796E-45DD-8E59-41AEBCFF317D}'" delete3⤵PID:2352
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{577F18B6-B703-4463-B987-7DB378C2C720}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{577F18B6-B703-4463-B987-7DB378C2C720}'" delete3⤵PID:1712
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1B6887A2-62D1-442B-BFC3-8F1509D58113}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1B6887A2-62D1-442B-BFC3-8F1509D58113}'" delete3⤵PID:1160
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0A9C8F0A-5C21-46DA-A280-F9C8563A1D33}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0A9C8F0A-5C21-46DA-A280-F9C8563A1D33}'" delete3⤵PID:320
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EAC5C4B9-A630-49FF-A6FD-338AA76B6389}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EAC5C4B9-A630-49FF-A6FD-338AA76B6389}'" delete3⤵PID:2380
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{16944CD2-5BF0-4C73-9E88-DEC08BCBF6A4}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{16944CD2-5BF0-4C73-9E88-DEC08BCBF6A4}'" delete3⤵PID:2220
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{947F8720-5BD7-4FDA-9EC6-5D4FA1862651}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{947F8720-5BD7-4FDA-9EC6-5D4FA1862651}'" delete3⤵PID:2332
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3FE26E64-95BA-45D4-ACBA-E83EFACF64A1}'" delete2⤵PID:1004
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3FE26E64-95BA-45D4-ACBA-E83EFACF64A1}'" delete3⤵PID:1168
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C44D6103-1AEE-4D36-9CAC-3C47783BA1C6}'" delete2⤵PID:1724
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C44D6103-1AEE-4D36-9CAC-3C47783BA1C6}'" delete3⤵PID:1720
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E8AF5878-BBB7-4B81-ACAB-C1E45C500F21}'" delete2⤵PID:848
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E8AF5878-BBB7-4B81-ACAB-C1E45C500F21}'" delete3⤵PID:1592
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{00E5B278-6BF0-4721-87F3-4A9DD11F0405}'" delete2⤵PID:2728
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{00E5B278-6BF0-4721-87F3-4A9DD11F0405}'" delete3⤵PID:2656
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3737B366-2C07-4157-880F-0BD00F79B589}'" delete2⤵PID:2064
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3737B366-2C07-4157-880F-0BD00F79B589}'" delete3⤵PID:1676
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D338F28F-1914-4D9A-9B20-25504581CE12}'" delete2⤵PID:2996
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D338F28F-1914-4D9A-9B20-25504581CE12}'" delete3⤵PID:2140
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AA6642C6-2ADB-4CB1-A6F1-C58D87E54DAE}'" delete2⤵PID:1568
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AA6642C6-2ADB-4CB1-A6F1-C58D87E54DAE}'" delete3⤵PID:2168
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{02A23EE7-80B9-4021-BE3C-926444EA4DB0}'" delete2⤵PID:1144
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{02A23EE7-80B9-4021-BE3C-926444EA4DB0}'" delete3⤵PID:1688
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{72E69C31-FBAB-41AE-BA18-44633531E684}'" delete2⤵PID:1612
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{72E69C31-FBAB-41AE-BA18-44633531E684}'" delete3⤵PID:1764
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846B
MD51faf49045a09c14d8540fb0d9d595de4
SHA1bbf25516d2d69d397f1eabcc0c128b29f0627cc6
SHA25690a3c5e5ecd61cfc66f58049ddeb5b6c13c4b9eee78443778c5e57ee59fb2252
SHA512e38301a45bbf5c04542a52c677d7be4c66d2d44a284788a102139e05920ba4cb164e13dc77ada3fb326032223b554da3421334ba53abb87b85e2869e71dcef1e