Malware Analysis Report

2024-09-11 01:42

Sample ID 240617-hdr89ssflm
Target e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.7z
SHA256 3064d978153f5f761626b39f448bff3d47c62c54afd5112aa05b1705f94a52c8
Tags
agenda defense_evasion execution impact persistence ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3064d978153f5f761626b39f448bff3d47c62c54afd5112aa05b1705f94a52c8

Threat Level: Known bad

The file e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.7z was found to be: Known bad.

Malicious Activity Summary

agenda defense_evasion execution impact persistence ransomware

Agenda family

Deletes shadow copies

Renames multiple (165) files with added filename extension

Modifies WinLogon

Enumerates connected drives

Adds Run key to start application

Drops file in Windows directory

Drops file in Program Files directory

Command and Scripting Interpreter: PowerShell

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Uses Volume Shadow Copy service COM API

Interacts with shadow copies

Runs net.exe

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SendNotifyMessage

System policy modification

Suspicious use of FindShellTrayWindow

Checks SCSI registry key(s)

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-17 06:37

Signatures

Agenda family

agenda

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-17 06:37

Reported

2024-06-17 06:40

Platform

win11-20240611-en

Max time kernel

128s

Max time network

2s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe"

Signatures

Deletes shadow copies

ransomware defense_evasion impact execution

Renames multiple (165) files with added filename extension

ransomware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*aster = "C:\\Users\\Public\\enc.exe" C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A

Modifies WinLogon

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\StartupParameters = "-password \"same as login\" -encryption \"normal\" " C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\StartupParameters C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\NBSHhgXuCt-RECOVER-README.txt C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
File created C:\Program Files (x86)\NBSHhgXuCt-RECOVER-README.txt C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\NBSHhgXuCt-RECOVER-README.txt C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\svchost.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\svchost.exe N/A
Token: 33 N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe

"C:\Users\Admin\AppData\Local\Temp\e4a319f7afafbbd710ff2dbe8d0883ef332afcb0363efd4e919ed3c3faba0342.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet

C:\Windows\system32\vssadmin.exe

vssadmin.exe delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "\"{get-service LanmanWorkstation |Restart-Service –Force}\""

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService -p

C:\Windows\system32\net.exe

net use

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\NBSHhgXuCt-RECOVER-README.txt

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Network

Country Destination Domain Proto
IE 52.111.236.22:443 tcp

Files

memory/2376-0-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-2-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-1-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-6-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-7-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-12-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-11-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-10-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-9-0x0000021791990000-0x0000021791991000-memory.dmp

memory/2376-8-0x0000021791990000-0x0000021791991000-memory.dmp

memory/3700-15-0x0000025BFD6B0000-0x0000025BFD6D2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kddrppi4.ajf.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/484-32-0x000002065FB40000-0x000002065FB50000-memory.dmp

memory/484-24-0x000002065F560000-0x000002065F570000-memory.dmp

C:\Users\NBSHhgXuCt-RECOVER-README.txt

MD5 dc4896bee712a59e16536179117c4043
SHA1 11706d9537c43f6abaa9412907bf7b386d9ab9fb
SHA256 08d5ff40c311cae6dd91d359f230cca5036fe4161da6180cac79aec19b6724a2
SHA512 c7f89907bec388b3da6feca9e6d51a16c33eeafc20dc9d0c5f6ca7f9b26cf1d4af410ae760efb8d6ee659e925c7990151d984443877d048d2489081226e1a05e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

MD5 4228a74e3c04871fe7d294ffaf7ba541
SHA1 166aa74376c99ed86ddd27e576098e4c86aacf84
SHA256 cc517badf732c6a38c4a33efe6f7e54752695d9dcae1cba2b2dc72581e0301ba
SHA512 344e9fb947b59867d930d600c627989180441f381e6e7b7572ba09a9a5501958dc0a79a55299cabe8ec51d7f7025d8198412a427abd5017455a79142e061662c