Overview
overview
10Static
static
32272954a2c...5a.exe
windows7-x64
1072716d15ea...21.exe
windows7-x64
7Bit Paymer.exe
windows7-x64
10KeepCalm.exe
windows7-x64
1LockedIn.exe
windows7-x64
9NotPetya.dll
windows7-x64
10Purge.exe
windows7-x64
1Scarab.exe
windows7-x64
10a631ad1b1a...4b.exe
windows7-x64
6a9053a3a52...bc.exe
windows7-x64
7b764629e1f...1c.exe
windows7-x64
10cf89f70633...5c.exe
windows7-x64
1e951e82867...50.exe
windows7-x64
1fa0c321e1a...d2.exe
windows7-x64
9fc184274ad...27.exe
windows7-x64
10Resubmissions
18-07-2024 07:25
240718-h84wjs1hpb 1018-07-2024 07:19
240718-h51pqa1gng 1017-07-2024 20:55
240717-zqkhmaydmq 1017-07-2024 19:21
240717-x2pwdaycjb 10Analysis
-
max time kernel
1560s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
Bit Paymer.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
KeepCalm.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
LockedIn.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
NotPetya.dll
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
Purge.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Scarab.exe
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240708-en
General
-
Target
Scarab.exe
-
Size
342KB
-
MD5
6899003aaa63ab4397f9e32e0a1daf43
-
SHA1
c22272ff0944d127992b393562871473b23ef8ea
-
SHA256
53f73dc2e8af9c059136029b3b535e885d4452d3375586eb9a0336d7a389aad5
-
SHA512
d8895f96e12d1b0b5907f7b1e7b976a37ff0cbe6db929cfbea5c931d905fb8269dc91bf44db83743920b63affc64ba88a0933d3111bc68f71ee266971b91b6bc
-
SSDEEP
6144:zmTLRf45/wAfqj6pjohSws+wZQtmk6LnAlnZ:eq5/tyjMLd+Rtmkc0
Malware Config
Extracted
C:\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (295) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
mshta.exepid process 2896 mshta.exe -
Executes dropped EXE 2 IoCs
Processes:
sevnz.exesevnz.exepid process 2364 sevnz.exe 2608 sevnz.exe -
Loads dropped DLL 2 IoCs
Processes:
Scarab.exepid process 2024 Scarab.exe 2024 Scarab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mshta.exesevnz.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\{45E73A27-D16C-4EDB-ADE8-0C069E54AF30} = "C:\\Users\\Admin\\AppData\\Roaming\\sevnz.exe" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\{45E73A27-D16C-4EDB-ADE8-0C069E54AF30} = "notepad.exe \"C:\\Users\\Admin\\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT\"" sevnz.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Scarab.exeScarab.exesevnz.exedescription pid process target process PID 2028 set thread context of 2356 2028 Scarab.exe Scarab.exe PID 2696 set thread context of 2024 2696 Scarab.exe Scarab.exe PID 2364 set thread context of 2608 2364 sevnz.exe sevnz.exe -
Drops file in Program Files directory 64 IoCs
Processes:
sevnz.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pmd.cer.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_email.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\AdobePiStd.otf sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.hyp.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ROMANIAN.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\TURKISH.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search5.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.STP sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Bold.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng.hyp sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_all.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_shared.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa37.hyp sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviewers.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-It.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa37.hyp.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\create_form.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_all.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd.otf.[[email protected]].scarab sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\MakeAccessible.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\distribute_form.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search5.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-It.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\XDPFile_8.ico sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-BoldIt.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\DigSig.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\MyriadCAD.otf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\submission_history.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_CA.txt.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SendMail.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\end_review.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_issue.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PPKLite.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_initiator.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\open_original_form.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CROATIAN.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_received.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif.[[email protected]].scarab sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annots.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\distribute_form.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Regular.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\SY______.PFM sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\APIFile_8.ico.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\AcroRead.msi.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_email.gif.[[email protected]].scarab sevnz.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
Processes:
Scarab.exeScarab.exepid process 2696 Scarab.exe 2024 Scarab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2900 vssadmin.exe -
Processes:
mshta.exemshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sevnz.exepid process 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe 2608 sevnz.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
WMIC.exevssvc.exedescription pid process Token: SeIncreaseQuotaPrivilege 932 WMIC.exe Token: SeSecurityPrivilege 932 WMIC.exe Token: SeTakeOwnershipPrivilege 932 WMIC.exe Token: SeLoadDriverPrivilege 932 WMIC.exe Token: SeSystemProfilePrivilege 932 WMIC.exe Token: SeSystemtimePrivilege 932 WMIC.exe Token: SeProfSingleProcessPrivilege 932 WMIC.exe Token: SeIncBasePriorityPrivilege 932 WMIC.exe Token: SeCreatePagefilePrivilege 932 WMIC.exe Token: SeBackupPrivilege 932 WMIC.exe Token: SeRestorePrivilege 932 WMIC.exe Token: SeShutdownPrivilege 932 WMIC.exe Token: SeDebugPrivilege 932 WMIC.exe Token: SeSystemEnvironmentPrivilege 932 WMIC.exe Token: SeRemoteShutdownPrivilege 932 WMIC.exe Token: SeUndockPrivilege 932 WMIC.exe Token: SeManageVolumePrivilege 932 WMIC.exe Token: 33 932 WMIC.exe Token: 34 932 WMIC.exe Token: 35 932 WMIC.exe Token: SeIncreaseQuotaPrivilege 932 WMIC.exe Token: SeSecurityPrivilege 932 WMIC.exe Token: SeTakeOwnershipPrivilege 932 WMIC.exe Token: SeLoadDriverPrivilege 932 WMIC.exe Token: SeSystemProfilePrivilege 932 WMIC.exe Token: SeSystemtimePrivilege 932 WMIC.exe Token: SeProfSingleProcessPrivilege 932 WMIC.exe Token: SeIncBasePriorityPrivilege 932 WMIC.exe Token: SeCreatePagefilePrivilege 932 WMIC.exe Token: SeBackupPrivilege 932 WMIC.exe Token: SeRestorePrivilege 932 WMIC.exe Token: SeShutdownPrivilege 932 WMIC.exe Token: SeDebugPrivilege 932 WMIC.exe Token: SeSystemEnvironmentPrivilege 932 WMIC.exe Token: SeRemoteShutdownPrivilege 932 WMIC.exe Token: SeUndockPrivilege 932 WMIC.exe Token: SeManageVolumePrivilege 932 WMIC.exe Token: 33 932 WMIC.exe Token: 34 932 WMIC.exe Token: 35 932 WMIC.exe Token: SeBackupPrivilege 2296 vssvc.exe Token: SeRestorePrivilege 2296 vssvc.exe Token: SeAuditPrivilege 2296 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Scarab.exeScarab.exeScarab.exeScarab.exesevnz.exesevnz.exedescription pid process target process PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2028 wrote to memory of 2356 2028 Scarab.exe Scarab.exe PID 2356 wrote to memory of 2916 2356 Scarab.exe cmd.exe PID 2356 wrote to memory of 2916 2356 Scarab.exe cmd.exe PID 2356 wrote to memory of 2916 2356 Scarab.exe cmd.exe PID 2356 wrote to memory of 2916 2356 Scarab.exe cmd.exe PID 2356 wrote to memory of 2696 2356 Scarab.exe Scarab.exe PID 2356 wrote to memory of 2696 2356 Scarab.exe Scarab.exe PID 2356 wrote to memory of 2696 2356 Scarab.exe Scarab.exe PID 2356 wrote to memory of 2696 2356 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2696 wrote to memory of 2024 2696 Scarab.exe Scarab.exe PID 2024 wrote to memory of 2744 2024 Scarab.exe cmd.exe PID 2024 wrote to memory of 2744 2024 Scarab.exe cmd.exe PID 2024 wrote to memory of 2744 2024 Scarab.exe cmd.exe PID 2024 wrote to memory of 2744 2024 Scarab.exe cmd.exe PID 2024 wrote to memory of 2364 2024 Scarab.exe sevnz.exe PID 2024 wrote to memory of 2364 2024 Scarab.exe sevnz.exe PID 2024 wrote to memory of 2364 2024 Scarab.exe sevnz.exe PID 2024 wrote to memory of 2364 2024 Scarab.exe sevnz.exe PID 2024 wrote to memory of 2896 2024 Scarab.exe mshta.exe PID 2024 wrote to memory of 2896 2024 Scarab.exe mshta.exe PID 2024 wrote to memory of 2896 2024 Scarab.exe mshta.exe PID 2024 wrote to memory of 2896 2024 Scarab.exe mshta.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2364 wrote to memory of 2608 2364 sevnz.exe sevnz.exe PID 2608 wrote to memory of 3052 2608 sevnz.exe mshta.exe PID 2608 wrote to memory of 3052 2608 sevnz.exe mshta.exe PID 2608 wrote to memory of 3052 2608 sevnz.exe mshta.exe PID 2608 wrote to memory of 3052 2608 sevnz.exe mshta.exe PID 2608 wrote to memory of 1892 2608 sevnz.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\Scarab.exe" "C:\Users\Admin\AppData\Roaming\sevnz.exe"3⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe" runas3⤵
- Suspicious use of SetThreadContext
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe" runas4⤵
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\Scarab.exe" "C:\Users\Admin\AppData\Roaming\sevnz.exe"5⤵PID:2744
-
C:\Users\Admin\AppData\Roaming\sevnz.exe"C:\Users\Admin\AppData\Roaming\sevnz.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\sevnz.exe"C:\Users\Admin\AppData\Roaming\sevnz.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('WScript.Shell');x=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{i=x.GetFile('sevnz.exe').Path;o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\{45E73A27-D16C-4EDB-ADE8-0C069E54AF30}',i);}catch(e){}},10);"7⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:3052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:07⤵PID:1892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic SHADOWCOPY DELETE7⤵PID:2780
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE8⤵
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin Delete Shadows /All /Quiet7⤵PID:1920
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /All /Quiet8⤵
- Interacts with shadow copies
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled No7⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures7⤵PID:2940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start /max notepad.exe "C:\Users\Admin\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT"7⤵PID:1092
-
C:\Windows\SysWOW64\notepad.exenotepad.exe "C:\Users\Admin\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT"8⤵PID:3028
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('sevnz.exe');close()}catch(e){}},10);"7⤵
- Modifies Internet Explorer settings
PID:2156 -
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('Scarab.exe');close()}catch(e){}},10);"5⤵
- Deletes itself
- Modifies Internet Explorer settings
PID:2896
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b15343de4ce64597d9bde395e7a642a8
SHA1ff162dba42584cd7a96093e69b13fdf52017e868
SHA2563a134d189040c9a46f7aaa2f75c86d9599ef8ab43cdb835b0e71709ea16916cc
SHA51278679b0894d999f369ed9607d68ea2d289aa750af2ecaddf0d17812380b5be2d1dccf9528cb284a7a0b9475c47fc242a24bfecb8839f8ba00ddc8e7c7daa784c
-
Filesize
342KB
MD56899003aaa63ab4397f9e32e0a1daf43
SHA1c22272ff0944d127992b393562871473b23ef8ea
SHA25653f73dc2e8af9c059136029b3b535e885d4452d3375586eb9a0336d7a389aad5
SHA512d8895f96e12d1b0b5907f7b1e7b976a37ff0cbe6db929cfbea5c931d905fb8269dc91bf44db83743920b63affc64ba88a0933d3111bc68f71ee266971b91b6bc