Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 09:52
Behavioral task
behavioral1
Sample
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
Resource
win10v2004-20240704-en
General
-
Target
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
-
Size
1.3MB
-
MD5
9e6c3801e0ac1c1fee4150e48777f3f6
-
SHA1
1e21dd960332e36051244fcc8180fa62a87d889d
-
SHA256
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263
-
SHA512
73f114f6a31e9a8267086b80c731c30a9c0808a775bdcf07b1fae439da79f789b4fdf2d1a0ef8906e8cd0139f85fc47bf7c76e4bf81753b4670c8cb777883845
-
SSDEEP
12288:QmHAIqyfF/5ebyz1dpPlRnMRTD410ALP68kG3Jz4S9FUmnyJtgoiOHmabd8ornXz:HHRFfauvpPXnMKqJtfiOHmUd8QTHj
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\da-DK\!!!HOW_TO_DECRYPT!!!.mht
[email protected]<BR>[email protected]<BR>In
http-equiv=3D"X
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3500 bcdedit.exe 932 bcdedit.exe -
Renames multiple (642) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 4356 wbadmin.exe 1400 wbadmin.exe -
Drops file in Drivers directory 13 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe\" e" 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-2753856825-3907105642-1818461144-1000\desktop.ini 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Enumerates connected drives 3 TTPs 39 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\B: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\O: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\T: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\F: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\P: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\S: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\N: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\J: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\U: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\E: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\K: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Z: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\A: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\L: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\M: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Y: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\G: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Q: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\R: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\X: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\H: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\I: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\V: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\W: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BCD-Template 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\7c991837-6009-486c-8163-046dffde8efe.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b806ed25-0594-4197-bf26-d6f9eb061fb2 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriImageListLowCost 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\SECURITY 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriImageList 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\COMPONENTS 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\DEFAULT 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e8fdd1f-67d4-4a86-8b43-69a7fb92d870 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\d6620d2d-aa84-4224-9392-3bc69a48722f.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Report policies.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriHMImageList 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BBI 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e8fdd1f-67d4-4a86-8b43-69a7fb92d870.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\USO_UxBroker 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BCD-Template.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\COMPONENTS.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\7c991837-6009-486c-8163-046dffde8efe 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b806ed25-0594-4197-bf26-d6f9eb061fb2.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Mozilla Firefox\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Google\Chrome\Application\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f14\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f4\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f2\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f33\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f3\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_w1\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f7\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{77924AE4-039E-4CA4-87B4-2F64180381F0}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{B175520C-86A2-35A7-8619-86DC379688B9} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9F51D16B-42E8-4A4A-8228-75045541A2AE}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E634F316-BEB6-4FB3-A612-F7102F576165} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F6080405-9FA8-4CAA-9982-14E95D1A3DAC} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{2BB73336-4F69-4141-9797-E9BD6FE3980A}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E634F316-BEB6-4FB3-A612-F7102F576165}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Panther\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Installer\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180381}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{79043ED0-7ED1-4227-A5E5-04C5594D21F7} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3324 vssadmin.exe 3056 vssadmin.exe 4276 vssadmin.exe 4768 vssadmin.exe 4192 vssadmin.exe 2912 vssadmin.exe 2036 vssadmin.exe 4468 vssadmin.exe 4296 vssadmin.exe 4332 vssadmin.exe 3380 vssadmin.exe 548 vssadmin.exe 5060 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeBackupPrivilege 4940 vssvc.exe Token: SeRestorePrivilege 4940 vssvc.exe Token: SeAuditPrivilege 4940 vssvc.exe Token: SeIncreaseQuotaPrivilege 2512 wmic.exe Token: SeSecurityPrivilege 2512 wmic.exe Token: SeTakeOwnershipPrivilege 2512 wmic.exe Token: SeLoadDriverPrivilege 2512 wmic.exe Token: SeSystemProfilePrivilege 2512 wmic.exe Token: SeSystemtimePrivilege 2512 wmic.exe Token: SeProfSingleProcessPrivilege 2512 wmic.exe Token: SeIncBasePriorityPrivilege 2512 wmic.exe Token: SeCreatePagefilePrivilege 2512 wmic.exe Token: SeBackupPrivilege 2512 wmic.exe Token: SeRestorePrivilege 2512 wmic.exe Token: SeShutdownPrivilege 2512 wmic.exe Token: SeDebugPrivilege 2512 wmic.exe Token: SeSystemEnvironmentPrivilege 2512 wmic.exe Token: SeRemoteShutdownPrivilege 2512 wmic.exe Token: SeUndockPrivilege 2512 wmic.exe Token: SeManageVolumePrivilege 2512 wmic.exe Token: 33 2512 wmic.exe Token: 34 2512 wmic.exe Token: 35 2512 wmic.exe Token: 36 2512 wmic.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1664 wrote to memory of 548 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 83 PID 1664 wrote to memory of 548 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 83 PID 1664 wrote to memory of 4276 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 88 PID 1664 wrote to memory of 4276 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 88 PID 1664 wrote to memory of 4768 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 90 PID 1664 wrote to memory of 4768 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 90 PID 1664 wrote to memory of 4296 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 92 PID 1664 wrote to memory of 4296 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 92 PID 1664 wrote to memory of 5060 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 94 PID 1664 wrote to memory of 5060 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 94 PID 1664 wrote to memory of 3380 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 97 PID 1664 wrote to memory of 3380 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 97 PID 1664 wrote to memory of 4332 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 99 PID 1664 wrote to memory of 4332 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 99 PID 1664 wrote to memory of 3324 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 101 PID 1664 wrote to memory of 3324 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 101 PID 1664 wrote to memory of 2912 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 103 PID 1664 wrote to memory of 2912 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 103 PID 1664 wrote to memory of 2036 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 106 PID 1664 wrote to memory of 2036 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 106 PID 1664 wrote to memory of 4468 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 108 PID 1664 wrote to memory of 4468 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 108 PID 1664 wrote to memory of 4192 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 110 PID 1664 wrote to memory of 4192 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 110 PID 1664 wrote to memory of 3056 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 112 PID 1664 wrote to memory of 3056 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 112 PID 1664 wrote to memory of 3500 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 114 PID 1664 wrote to memory of 3500 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 114 PID 1664 wrote to memory of 932 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 116 PID 1664 wrote to memory of 932 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 116 PID 1664 wrote to memory of 4356 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 118 PID 1664 wrote to memory of 4356 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 118 PID 1664 wrote to memory of 1400 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 120 PID 1664 wrote to memory of 1400 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 120 PID 1664 wrote to memory of 2512 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 122 PID 1664 wrote to memory of 2512 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 122 PID 1664 wrote to memory of 3256 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 124 PID 1664 wrote to memory of 3256 1664 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 124 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe"C:\Users\Admin\AppData\Local\Temp\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1664 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:548
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:4276
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4768
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4296
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5060
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3380
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4332
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3324
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2912
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2036
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4468
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4192
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:3056
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:3500
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:932
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:4356
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:1400
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\528502~1.EXE >> NUL2⤵PID:3256
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bdd74698b4cc25f85123c01dd03e5f78
SHA102ed05d44e81469d3b39f8b788c3b1131b0cc9e8
SHA2569afd656faeeb7ab16fea922bc28ec206deaaa8436479dc2ed373766b8d611dce
SHA512c2f3c636a2ab50070191766487f0387316534def29789df9ad2228f597a42633090c97cd94aa72b068fb59455f77d6fcc3431a2b3e7fad862899ddbcbfdc95cf