Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
1001D2E2B398...A9.exe
windows7-x64
100B760ABF10...23.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100D0E7D8626...E5.exe
windows7-x64
100E9765528C...69.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101CB8203982...26.exe
windows7-x64
101CF69170F7...5E.exe
windows7-x64
101CFEDCBA10...0E.exe
windows7-x64
71DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
101F5FEB3211...6D.exe
windows7-x64
101FD11B5CBB...ED.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
18b04af13b7...21.exe
windows7-x64
10Analysis
-
max time kernel
1795s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 19:21
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
01D2E2B398D6017D5114464E39C40E9243AE492106CCA8B2D3EB1A95F9E228A9.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
0B760ABF108DB9BF5EA14F96A53F6D8E1B36FCC28BC75114E923482157B89A23.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240705-en
Behavioral task
behavioral5
Sample
0D0E7D86268F7ACD51E9D4AC94F016034FB949B605B21405CBA0B5581E4532E5.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
0E9765528C4E8FDCFF83FA07A78F5E73B41B3D9295159C823FE3B1F97C113469.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
1CB82039822CB89811F42B2C3BDBB4256D85D66E942CD69F38D3CB123596C926.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
1CF69170F7419E097EB71B514C01D2A028C95D0605F8B91C90A2E28B3216775E.exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
1CFEDCBA10B4C90789F2C4A6A1CE2C3D4197058E574942400F571BC5D06DF70E.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
1F5FEB3211A640804B3951DE9EA2037EFCB0D6EE1019D8853F98DAFD6132A76D.exe
Resource
win7-20240705-en
Behavioral task
behavioral15
Sample
1FD11B5CBB32F4CD5E7947F25E900BB4E59C1C5A21922F0A842EC62C20FAF2ED.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240704-en
General
-
Target
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
-
Size
236KB
-
MD5
6aa5d9b03d34c87026ac11a6f30524fe
-
SHA1
c0c532d64bc1d16aeb12ea58c9e94c48eb3d64d4
-
SHA256
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0
-
SHA512
1e0cdbfd5399c03e6db32b309d38f56dc0761d6a9d2319c712f771fecc9fec8aac0c2dd2ee00e4674b26168265558e4d02a810a6326c73e36a1e453ecc394069
-
SSDEEP
3072:A2XIX/5EEAmkN7HqOaeV/RPMObiZif2fXSF9uvm8dDuCb4NeIAg0Fuj3RK3o1yL:AliN3qO1hR0UiZi+fC+iAObo41I
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!#_READ_ME_#!.inf
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (278) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\DECRYPTINFO = "\"C:\\Users\\Admin\\AppData\\Roaming\\!#_READ_ME_#!.inf\"" 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Music\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Videos\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Cookies\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Links\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Music\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Users\Public\Documents\desktop.ini 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\1.bmp" 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Firebird\!#_READ_ME_#!.inf 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Program Files (x86)\Firebird\lãUwÅ8xè¾ 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File created C:\Program Files (x86)\MSSQL.1\!#_READ_ME_#!.inf 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Program Files (x86)\MSSQL.1\lãUwÅ8xè¾ 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File created C:\Program Files\MySQL\!#_READ_ME_#!.inf 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe File opened for modification C:\Program Files\MySQL\lãUwÅ8xè¾ 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1368 vssadmin.exe 2684 vssadmin.exe 2904 vssadmin.exe 1856 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2720 vssvc.exe Token: SeRestorePrivilege 2720 vssvc.exe Token: SeAuditPrivilege 2720 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3024 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 2676 wrote to memory of 3024 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 2676 wrote to memory of 3024 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 2676 wrote to memory of 3024 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 30 PID 2676 wrote to memory of 2536 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 31 PID 2676 wrote to memory of 2536 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 31 PID 2676 wrote to memory of 2536 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 31 PID 2676 wrote to memory of 2536 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 31 PID 2676 wrote to memory of 2224 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 32 PID 2676 wrote to memory of 2224 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 32 PID 2676 wrote to memory of 2224 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 32 PID 2676 wrote to memory of 2224 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 32 PID 2676 wrote to memory of 2104 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 2676 wrote to memory of 2104 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 2676 wrote to memory of 2104 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 2676 wrote to memory of 2104 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 35 PID 3024 wrote to memory of 2904 3024 cmd.exe 38 PID 3024 wrote to memory of 2904 3024 cmd.exe 38 PID 3024 wrote to memory of 2904 3024 cmd.exe 38 PID 3024 wrote to memory of 2904 3024 cmd.exe 38 PID 2104 wrote to memory of 2684 2104 cmd.exe 39 PID 2104 wrote to memory of 2684 2104 cmd.exe 39 PID 2104 wrote to memory of 2684 2104 cmd.exe 39 PID 2104 wrote to memory of 2684 2104 cmd.exe 39 PID 2676 wrote to memory of 1192 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2676 wrote to memory of 1192 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2676 wrote to memory of 1192 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2676 wrote to memory of 1192 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 42 PID 2676 wrote to memory of 764 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2676 wrote to memory of 764 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2676 wrote to memory of 764 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2676 wrote to memory of 764 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 44 PID 2676 wrote to memory of 2308 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 45 PID 2676 wrote to memory of 2308 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 45 PID 2676 wrote to memory of 2308 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 45 PID 2676 wrote to memory of 2308 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 45 PID 2676 wrote to memory of 492 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2676 wrote to memory of 492 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2676 wrote to memory of 492 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2676 wrote to memory of 492 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 47 PID 2676 wrote to memory of 888 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 50 PID 2676 wrote to memory of 888 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 50 PID 2676 wrote to memory of 888 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 50 PID 2676 wrote to memory of 888 2676 5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe 50 PID 1192 wrote to memory of 1368 1192 cmd.exe 51 PID 1192 wrote to memory of 1368 1192 cmd.exe 51 PID 1192 wrote to memory of 1368 1192 cmd.exe 51 PID 1192 wrote to memory of 1368 1192 cmd.exe 51 PID 492 wrote to memory of 1856 492 cmd.exe 52 PID 492 wrote to memory of 1856 492 cmd.exe 52 PID 492 wrote to memory of 1856 492 cmd.exe 52 PID 492 wrote to memory of 1856 492 cmd.exe 52 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe"C:\Users\Admin\AppData\Local\Temp\5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:2536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} recoveryenabled No2⤵PID:764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1856
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!#_READ_ME_#!.inf2⤵PID:888
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5c788d4895d5cd0153c0f1b05601a318f
SHA1ee6a61d785769a502ae37610ffd8bd0261a4fe36
SHA25672bcb27bb274e4a425a3cf25d5c74464b5f7cbce9baa9b9b9bb8e7223c95cb44
SHA512254d5a4fe323de6148c40fb9611c273eada0ed4b27e042602bc27f4122abae2de2200f993b07ece7ad6fbe33e5f3e3e7e3f17051f571c445a5c7e0b0aac9070d
-
Filesize
14KB
MD5096ae6899d6708be770bd3aacff81176
SHA1824915d9bcd602b1f1f94b08c9bda8d8982e1568
SHA256a46d73fb099f392beb9f1b64277166b21060a61035b3a474fa1f7427d780186f
SHA5120de7041015bed7d2048e9c419c46cc27c4b3fd8ded1e4ada0fecdeaa365d005d4b5e836e66e4e512f16a9ac759ead3ef574fc3bf453dff9e11f4adb226b07bf4
-
Filesize
48KB
MD561e8e744bf0d30ea10a734a6b4eb8f97
SHA163404aa73bac4bd4c850cce13d2e4f17e86d4e5c
SHA256bc6fa041fede28a3d1c3518d212a2abb8ae397bd0286917e2f9d1019019e0f47
SHA512cec326dd3d723fbc47cc3d5f90b55783f51a45b4ef2fe62187a0e490c26ed65ee0f756a4f713e199c2bfb4defb89a52dc465dfb2b1ea45b9d0de7c52aa30f9ca
-
C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\vc_runtimeAdditional_x64.msi
Filesize140KB
MD57d25d70a046782353428fce7534a7fe8
SHA1f3944242b4664995da572fa23afd3a9b3a5f22f4
SHA2564ee587d23f773163cc7add10e4d784f078ba752e541386b682d44ae003a90345
SHA51267e38c522c5b165c09d741b7c45424ec428ab70887dd08df90bb1462f350eb747a6503e611ed42d62b04102e1e2fcef13be3faf10c7a54d745d71e4ae945fdf8
-
Filesize
1KB
MD566734f6dc11963cf91583df1fe7f4a99
SHA1fda2bd512bf37c1eb395ac158f5b84c10aebe644
SHA256664db968ce7b1213367497cd2d9647bd909b981ba3bc3c44f8cdf3db66875fc2
SHA512e1f87f04d2bdbc6758163af5bca31db4f365923b11ab810ea4255113cdbd05df9eb04aabe587d028b35d1a0d99ba958b3a73b783be385277245a9ea3a2b83684
-
Filesize
242KB
MD5ff7c4dca8c9586a10526e5b14adca92c
SHA19ead64b0f3e459db09c6b16f343017d39c7b5ba4
SHA2568f5cc68db9e2404cfa0b1492029bb962ca360ef40caae4d087b8e0a8a512e186
SHA5120f2ccadb019eba39a769819ef48a8e673ae7e120eedcb6104e61671b0f1c1302eef7ed46beb6ce13a694c1d94400c8098c5797f88129fca33c3e5b237451ec8b
-
Filesize
88KB
MD539454936af459c948a371022ebc7f894
SHA10833bb8b323885581ebdf807658ced715402fc3f
SHA256dab9cc77401c2cba84cb81082f097f9dfec6dc030300fa5b8797c8d4a1c6de59
SHA512d07cda1da7678cfb2d14e53c274f6665dcf19c679a7bc028cf6a5be523df722c7d192baf62f6216d896aff440e5cbf2b5f740722cb46a30515104f03f7f1e452
-
Filesize
11KB
MD58a5827a88463d5131127791e24525032
SHA10e950a0a0e91ef1434c7994e47580a9798373b85
SHA25699f9c83ae2c6784d781aa2be8019576f5edf2a49b539490e2e98ba28327057d5
SHA512a2f2d744f25b3e2492f9f463584cc20b5772a5641b1560528fd1177b507c545d99ea2986bcaa6f65a34d9aaedd66290cccc0836735f241588a264cbd0b82a089
-
Filesize
86KB
MD54b9573e055799d1281259329865cd1d7
SHA1cf3c85b899fb5bbfe37ac57d263efe6a6566bd78
SHA2565419a93b12d8afaaa00695a5b98f9fa393478e87202d63b0a64035061b97b9f6
SHA512d6789e1f7be0586581526efc424494e3e6372ed0c6e7327a22cdab45005f7546d3be3f7816a5244a27cb61822c3e22254ad980d9ea57911da52b47913f60ba0f