Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 12:19
Behavioral task
behavioral1
Sample
e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe
Resource
win10v2004-20240226-en
General
-
Target
e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe
-
Size
128KB
-
MD5
99e949ddd57dbc19457eba5f235516f3
-
SHA1
99f9270e85ec53b8dada459279d30e8b169462c1
-
SHA256
e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b
-
SHA512
4b4746c6d23be8d445876e5e6931d48ebbac8eca6c4ad545b6dc94c400f768df87ad03984c1c83a7e7d0225fd8cdd6305e4f7ef4d580378b42424288def7fa41
-
SSDEEP
3072:pfco6OkRGbNsjjZviLhrafY1Cv95dzo5:pf6OwGBs3Z6LhrqYGNzo
Malware Config
Extracted
C:\Program Files\DVD Maker\How to decrypt files.txt
targetcompany
http://eghv5cpdsmuj5e6tpyjk5icgq642hqubildf6yrfnqlq3rmsqk2zanid.onion/contact
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2640 bcdedit.exe 2568 bcdedit.exe -
Renames multiple (6841) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1732 cmd.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\F: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\B: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\G: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\R: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\T: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\U: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\V: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\H: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\I: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\N: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\O: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\P: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\S: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\X: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\A: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\E: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\K: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\M: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\Q: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\W: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\J: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\L: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened (read-only) \??\Z: e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Bermuda e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00636_.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143753.GIF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\cli.luac e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15056_.GIF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\TAB_ON.GIF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-tools.jar e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\VelvetRose.css e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01143_.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_SlateBlue.gif e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert.css e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03041I.JPG e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\javaws.jar e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Mahe e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Pitchbook.potx e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLPERF.H e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04196_.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-nodes.xml e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00130_.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Slipstream.xml e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Couture.eftx e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00444_.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd.otf e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\LucidaBrightRegular.ttf e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152432.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jre7\lib\fontconfig.properties.src e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Detroit e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196358.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099195.GIF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0232797.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14677_.GIF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Black Tie.xml e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195248.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Macquarie e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Manila e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Perspective.xml e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\macroprogress.gif e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00157_.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files\VideoLAN\VLC\lua\http\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Vladivostok e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.JP.XML e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Flow.xml e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239997.WMF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Thunder_Bay e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Palmer e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-progress-ui.xml e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099186.JPG e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-charts_ja.jar e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\How to decrypt files.txt e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-uisupport.xml e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382931.JPG e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01242_.GIF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageSmall.jpg e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145904.JPG e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files\Java\jre7\release e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14752_.GIF e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2776 vssadmin.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1844 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe Token: SeDebugPrivilege 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe Token: SeBackupPrivilege 2916 vssvc.exe Token: SeRestorePrivilege 2916 vssvc.exe Token: SeAuditPrivilege 2916 vssvc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2776 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 29 PID 2032 wrote to memory of 2776 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 29 PID 2032 wrote to memory of 2776 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 29 PID 2032 wrote to memory of 2776 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 29 PID 2032 wrote to memory of 2068 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 30 PID 2032 wrote to memory of 2068 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 30 PID 2032 wrote to memory of 2068 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 30 PID 2032 wrote to memory of 2068 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 30 PID 2032 wrote to memory of 2464 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 31 PID 2032 wrote to memory of 2464 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 31 PID 2032 wrote to memory of 2464 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 31 PID 2032 wrote to memory of 2464 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 31 PID 2464 wrote to memory of 2640 2464 cmd.exe 35 PID 2464 wrote to memory of 2640 2464 cmd.exe 35 PID 2464 wrote to memory of 2640 2464 cmd.exe 35 PID 2068 wrote to memory of 2568 2068 cmd.exe 36 PID 2068 wrote to memory of 2568 2068 cmd.exe 36 PID 2068 wrote to memory of 2568 2068 cmd.exe 36 PID 2032 wrote to memory of 1732 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 45 PID 2032 wrote to memory of 1732 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 45 PID 2032 wrote to memory of 1732 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 45 PID 2032 wrote to memory of 1732 2032 e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe 45 PID 1732 wrote to memory of 1844 1732 cmd.exe 47 PID 1732 wrote to memory of 1844 1732 cmd.exe 47 PID 1732 wrote to memory of 1844 1732 cmd.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe"C:\Users\Admin\AppData\Local\Temp\e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\vssadmin.exe"C:\Windows\sysnative\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2776
-
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2568
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2640
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\e351d4a21e6f455c6fca41ed4c410c045b136fa47d40d4f2669416ee2574124b.exe" >> NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1844
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ef0b6f818162e1cb90f601e0d1fbcecf
SHA133fab6593738af52393884c589fb40417d9292aa
SHA2560b2fd826cd23e013dba97e5e398af8992b9b48d69a0bbb6cffa1ea5fa896b4fe
SHA51289c141064843766fbd10fc64e0be403cd40e79788ced2934a99d435ae0643290f6f697ae7214c0f0fb23c62b37d8074ee2bd7881005541e272231dca62849502