Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 10:48
Behavioral task
behavioral1
Sample
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
Resource
win10v2004-20240704-en
General
-
Target
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe
-
Size
1.3MB
-
MD5
9e6c3801e0ac1c1fee4150e48777f3f6
-
SHA1
1e21dd960332e36051244fcc8180fa62a87d889d
-
SHA256
528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263
-
SHA512
73f114f6a31e9a8267086b80c731c30a9c0808a775bdcf07b1fae439da79f789b4fdf2d1a0ef8906e8cd0139f85fc47bf7c76e4bf81753b4670c8cb777883845
-
SSDEEP
12288:QmHAIqyfF/5ebyz1dpPlRnMRTD410ALP68kG3Jz4S9FUmnyJtgoiOHmabd8ornXz:HHRFfauvpPXnMKqJtfiOHmUd8QTHj
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\bg-BG\!!!HOW_TO_DECRYPT!!!.mht
[email protected]<BR>[email protected]<BR>In
http-equiv=3D"X
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 760 bcdedit.exe 2256 bcdedit.exe -
Renames multiple (622) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 4284 wbadmin.exe 700 wbadmin.exe -
Drops file in Drivers directory 13 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\protocol 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\drivers\etc\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\drivers\etc\services 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe\" e" 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-2494989678-839960665-2515455429-1000\desktop.ini 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Enumerates connected drives 3 TTPs 39 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\I: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\H: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\V: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\J: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\M: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\N: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Q: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\R: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\T: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\A: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\K: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\L: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\P: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\X: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Z: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\F: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\G: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\W: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\Y: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\E: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\O: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\U: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\S: 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\SOFTWARE 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\e43c9bdb-f82d-4cc6-8ebc-ad646f816421 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\0b6cf3eb-4bc8-44ef-8821-23828e8ac96f.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\UpdateModelTask.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\ELAM 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriHMImageList 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BCD-Template.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\COMPONENTS 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\e43c9bdb-f82d-4cc6-8ebc-ad646f816421.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\UpdateModelTask 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriHMImageListLowCost 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\DEFAULT 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\DRIVERS 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Report policies.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\ELAM.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\BCD-Template 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\ResPriImageListLowCost 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\17e03686-8677-4001-ac4a-fd9cdc5767ec.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\e43c9bdb-f82d-4cc6-8ebc-ad646f816421.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Report policies 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\COMPONENTS.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f3\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f4\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f33\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Mozilla Firefox\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f7\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Google\Chrome\Application\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_w1\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f14\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f2\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{C7B73281-AB0A-4DAD-A09F-5C30D40679AC} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E634F316-BEB6-4FB3-A612-F7102F576165}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Installer\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{2BB73336-4F69-4141-9797-E9BD6FE3980A} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{77924AE4-039E-4CA4-87B4-2F64180381F0} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{B175520C-86A2-35A7-8619-86DC379688B9}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{79043ED0-7ED1-4227-A5E5-04C5594D21F7}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9F51D16B-42E8-4A4A-8228-75045541A2AE}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Boot\DVD\EFI\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{77924AE4-039E-4CA4-87B4-2F64180381F0}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Panther\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Boot\PCAT\bootnxt 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_3391016d-f0b6-457a-866d-88b771c7b6ac.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{2BB73336-4F69-4141-9797-E9BD6FE3980A}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{BF08E976-B92E-4336-B56F-2171179476C4}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180381}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Boot\DVD\PCAT\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{9F51D16B-42E8-4A4A-8228-75045541A2AE}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File created C:\Windows\Boot\PCAT\!!!HOW_TO_DECRYPT!!!.mht 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{77924AE4-039E-4CA4-87B4-2F64180381F0}.inprocess 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.1btc 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe File opened for modification C:\Windows\Installer\SourceHash{E30D8B21-D82D-3211-82CC-0F0A5D1495E8} 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 928 vssadmin.exe 3380 vssadmin.exe 3388 vssadmin.exe 2980 vssadmin.exe 892 vssadmin.exe 1136 vssadmin.exe 1988 vssadmin.exe 4240 vssadmin.exe 2228 vssadmin.exe 3572 vssadmin.exe 2948 vssadmin.exe 732 vssadmin.exe 4948 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeBackupPrivilege 4032 vssvc.exe Token: SeRestorePrivilege 4032 vssvc.exe Token: SeAuditPrivilege 4032 vssvc.exe Token: SeIncreaseQuotaPrivilege 2556 wmic.exe Token: SeSecurityPrivilege 2556 wmic.exe Token: SeTakeOwnershipPrivilege 2556 wmic.exe Token: SeLoadDriverPrivilege 2556 wmic.exe Token: SeSystemProfilePrivilege 2556 wmic.exe Token: SeSystemtimePrivilege 2556 wmic.exe Token: SeProfSingleProcessPrivilege 2556 wmic.exe Token: SeIncBasePriorityPrivilege 2556 wmic.exe Token: SeCreatePagefilePrivilege 2556 wmic.exe Token: SeBackupPrivilege 2556 wmic.exe Token: SeRestorePrivilege 2556 wmic.exe Token: SeShutdownPrivilege 2556 wmic.exe Token: SeDebugPrivilege 2556 wmic.exe Token: SeSystemEnvironmentPrivilege 2556 wmic.exe Token: SeRemoteShutdownPrivilege 2556 wmic.exe Token: SeUndockPrivilege 2556 wmic.exe Token: SeManageVolumePrivilege 2556 wmic.exe Token: 33 2556 wmic.exe Token: 34 2556 wmic.exe Token: 35 2556 wmic.exe Token: 36 2556 wmic.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1652 wrote to memory of 4240 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 81 PID 1652 wrote to memory of 4240 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 81 PID 1652 wrote to memory of 2228 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 86 PID 1652 wrote to memory of 2228 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 86 PID 1652 wrote to memory of 3572 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 88 PID 1652 wrote to memory of 3572 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 88 PID 1652 wrote to memory of 2948 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 91 PID 1652 wrote to memory of 2948 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 91 PID 1652 wrote to memory of 3380 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 93 PID 1652 wrote to memory of 3380 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 93 PID 1652 wrote to memory of 1136 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 96 PID 1652 wrote to memory of 1136 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 96 PID 1652 wrote to memory of 732 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 98 PID 1652 wrote to memory of 732 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 98 PID 1652 wrote to memory of 928 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 100 PID 1652 wrote to memory of 928 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 100 PID 1652 wrote to memory of 3388 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 102 PID 1652 wrote to memory of 3388 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 102 PID 1652 wrote to memory of 4948 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 104 PID 1652 wrote to memory of 4948 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 104 PID 1652 wrote to memory of 1988 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 106 PID 1652 wrote to memory of 1988 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 106 PID 1652 wrote to memory of 2980 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 109 PID 1652 wrote to memory of 2980 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 109 PID 1652 wrote to memory of 892 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 111 PID 1652 wrote to memory of 892 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 111 PID 1652 wrote to memory of 760 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 113 PID 1652 wrote to memory of 760 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 113 PID 1652 wrote to memory of 2256 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 115 PID 1652 wrote to memory of 2256 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 115 PID 1652 wrote to memory of 4284 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 117 PID 1652 wrote to memory of 4284 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 117 PID 1652 wrote to memory of 700 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 119 PID 1652 wrote to memory of 700 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 119 PID 1652 wrote to memory of 2556 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 121 PID 1652 wrote to memory of 2556 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 121 PID 1652 wrote to memory of 3244 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 123 PID 1652 wrote to memory of 3244 1652 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe 123 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe"C:\Users\Admin\AppData\Local\Temp\528502657c770fd56ebd10c11c1a7fab24be2a41ad8f24af617222c069310263.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1652 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:4240
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:2228
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3572
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2948
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3380
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1136
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:732
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:928
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3388
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4948
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1988
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2980
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:892
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:760
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:2256
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:4284
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:700
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\528502~1.EXE >> NUL2⤵PID:3244
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4032
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50cb353b3ecb14f62c98aeef498069ce2
SHA165e233b506299a5a094e94eed2ef227bb15ecaf2
SHA256cb76556e8580ecfb176d118e3c0dbde648973e2c437ddf7d1b3eae9436b5ca98
SHA512789679e0d0fac7eb71d4962ca4440819fdf5b64b26f0b3d9ba307acec97a1f3a61d7db1ac5bb88f9e76d34b532864f4f7622323819831e382526e3c3c6f341ae