Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 09:52
Behavioral task
behavioral1
Sample
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
Resource
win10v2004-20240704-en
General
-
Target
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
-
Size
1.3MB
-
MD5
9e6c3801e0ac1c1fee4150e48777f3f6
-
SHA1
1e21dd960332e36051244fcc8180fa62a87d889d
-
SHA256
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263
-
SHA512
73f114f6a31e9a8267086b80c731c30a9c0808a775bdcf07b1fae439da79f789b4fdf2d1a0ef8906e8cd0139f85fc47bf7c76e4bf81753b4670c8cb777883845
-
SSDEEP
12288:QmHAIqyfF/5ebyz1dpPlRnMRTD410ALP68kG3Jz4S9FUmnyJtgoiOHmabd8ornXz:HHRFfauvpPXnMKqJtfiOHmUd8QTHj
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\da-DK\!!!HOW_TO_DECRYPT!!!.mht
[email protected]<BR>[email protected]<BR>In
http-equiv=3D"X
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3500 bcdedit.exe 932 bcdedit.exe -
Renames multiple (642) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exewbadmin.exepid process 4356 wbadmin.exe 1400 wbadmin.exe -
Drops file in Drivers directory 13 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription ioc process File created C:\Windows\System32\drivers\etc\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe\" e" 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription ioc process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-2753856825-3907105642-1818461144-1000\desktop.ini 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Enumerates connected drives 3 TTPs 39 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exe528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc process File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\B: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\O: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\T: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\F: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\P: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\S: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\N: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\J: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\U: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\E: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\K: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Z: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\A: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\L: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\M: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Y: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\G: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Q: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\R: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\X: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\H: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\I: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\V: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\W: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in System32 directory 64 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription ioc process File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BCD-Template 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\7c991837-6009-486c-8163-046dffde8efe.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b806ed25-0594-4197-bf26-d6f9eb061fb2 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriImageListLowCost 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\SECURITY 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriImageList 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\COMPONENTS 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\DEFAULT 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e8fdd1f-67d4-4a86-8b43-69a7fb92d870 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\d6620d2d-aa84-4224-9392-3bc69a48722f.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Report policies.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriHMImageList 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BBI 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e8fdd1f-67d4-4a86-8b43-69a7fb92d870.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BCD-Template.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\COMPONENTS.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\7c991837-6009-486c-8163-046dffde8efe 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b806ed25-0594-4197-bf26-d6f9eb061fb2.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in Program Files directory 64 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Mozilla Firefox\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Google\Chrome\Application\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f14\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f4\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f2\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f33\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f3\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_w1\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f7\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in Windows directory 64 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exewbadmin.exewbadmin.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{77924AE4-039E-4CA4-87B4-2F64180381F0}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{B175520C-86A2-35A7-8619-86DC379688B9} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9F51D16B-42E8-4A4A-8228-75045541A2AE}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E634F316-BEB6-4FB3-A612-F7102F576165} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F6080405-9FA8-4CAA-9982-14E95D1A3DAC} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{2BB73336-4F69-4141-9797-E9BD6FE3980A}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E634F316-BEB6-4FB3-A612-F7102F576165}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Panther\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Installer\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180381}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{79043ED0-7ED1-4227-A5E5-04C5594D21F7} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 3324 vssadmin.exe 3056 vssadmin.exe 4276 vssadmin.exe 4768 vssadmin.exe 4192 vssadmin.exe 2912 vssadmin.exe 2036 vssadmin.exe 4468 vssadmin.exe 4296 vssadmin.exe 4332 vssadmin.exe 3380 vssadmin.exe 548 vssadmin.exe 5060 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exepid process 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
vssvc.exewmic.exedescription pid process Token: SeBackupPrivilege 4940 vssvc.exe Token: SeRestorePrivilege 4940 vssvc.exe Token: SeAuditPrivilege 4940 vssvc.exe Token: SeIncreaseQuotaPrivilege 2512 wmic.exe Token: SeSecurityPrivilege 2512 wmic.exe Token: SeTakeOwnershipPrivilege 2512 wmic.exe Token: SeLoadDriverPrivilege 2512 wmic.exe Token: SeSystemProfilePrivilege 2512 wmic.exe Token: SeSystemtimePrivilege 2512 wmic.exe Token: SeProfSingleProcessPrivilege 2512 wmic.exe Token: SeIncBasePriorityPrivilege 2512 wmic.exe Token: SeCreatePagefilePrivilege 2512 wmic.exe Token: SeBackupPrivilege 2512 wmic.exe Token: SeRestorePrivilege 2512 wmic.exe Token: SeShutdownPrivilege 2512 wmic.exe Token: SeDebugPrivilege 2512 wmic.exe Token: SeSystemEnvironmentPrivilege 2512 wmic.exe Token: SeRemoteShutdownPrivilege 2512 wmic.exe Token: SeUndockPrivilege 2512 wmic.exe Token: SeManageVolumePrivilege 2512 wmic.exe Token: 33 2512 wmic.exe Token: 34 2512 wmic.exe Token: 35 2512 wmic.exe Token: 36 2512 wmic.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription pid process target process PID 1664 wrote to memory of 548 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 548 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4276 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4276 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4768 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4768 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4296 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4296 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 5060 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 5060 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 3380 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 3380 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4332 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4332 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 3324 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 3324 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 2912 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 2912 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 2036 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 2036 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4468 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4468 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4192 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 4192 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 3056 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 3056 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe vssadmin.exe PID 1664 wrote to memory of 3500 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe bcdedit.exe PID 1664 wrote to memory of 3500 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe bcdedit.exe PID 1664 wrote to memory of 932 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe bcdedit.exe PID 1664 wrote to memory of 932 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe bcdedit.exe PID 1664 wrote to memory of 4356 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe wbadmin.exe PID 1664 wrote to memory of 4356 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe wbadmin.exe PID 1664 wrote to memory of 1400 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe wbadmin.exe PID 1664 wrote to memory of 1400 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe wbadmin.exe PID 1664 wrote to memory of 2512 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe wmic.exe PID 1664 wrote to memory of 2512 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe wmic.exe PID 1664 wrote to memory of 3256 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe cmd.exe PID 1664 wrote to memory of 3256 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe cmd.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe"C:\Users\Admin\AppData\Local\Temp\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1664 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:548
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:4276
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4768
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4296
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5060
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3380
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4332
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3324
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2912
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2036
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4468
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4192
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:3056
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:3500
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:932
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:4356
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:1400
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\528502~1.EXE >> NUL2⤵PID:3256
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bdd74698b4cc25f85123c01dd03e5f78
SHA102ed05d44e81469d3b39f8b788c3b1131b0cc9e8
SHA2569afd656faeeb7ab16fea922bc28ec206deaaa8436479dc2ed373766b8d611dce
SHA512c2f3c636a2ab50070191766487f0387316534def29789df9ad2228f597a42633090c97cd94aa72b068fb59455f77d6fcc3431a2b3e7fad862899ddbcbfdc95cf