Overview
overview
10Static
static
32272954a2c...5a.exe
windows7-x64
102272954a2c...5a.exe
windows10-2004-x64
1072716d15ea...21.exe
windows7-x64
772716d15ea...21.exe
windows10-2004-x64
7Bit Paymer.exe
windows7-x64
10Bit Paymer.exe
windows10-2004-x64
10KeepCalm.exe
windows7-x64
1KeepCalm.exe
windows10-2004-x64
1LockedIn.exe
windows7-x64
9LockedIn.exe
windows10-2004-x64
9NotPetya.dll
windows7-x64
10NotPetya.dll
windows10-2004-x64
10Purge.exe
windows7-x64
1Purge.exe
windows10-2004-x64
1Scarab.exe
windows7-x64
10Scarab.exe
windows10-2004-x64
10a631ad1b1a...4b.exe
windows7-x64
6a631ad1b1a...4b.exe
windows10-2004-x64
6a9053a3a52...bc.exe
windows7-x64
7a9053a3a52...bc.exe
windows10-2004-x64
7b764629e1f...1c.exe
windows7-x64
10b764629e1f...1c.exe
windows10-2004-x64
10cf89f70633...5c.exe
windows7-x64
1cf89f70633...5c.exe
windows10-2004-x64
3e951e82867...50.exe
windows7-x64
1e951e82867...50.exe
windows10-2004-x64
1fa0c321e1a...d2.exe
windows7-x64
9fa0c321e1a...d2.exe
windows10-2004-x64
8fc184274ad...27.exe
windows7-x64
10fc184274ad...27.exe
windows10-2004-x64
10Resubmissions
18-07-2024 07:25
240718-h84wjs1hpb 1018-07-2024 07:19
240718-h51pqa1gng 1017-07-2024 20:55
240717-zqkhmaydmq 1017-07-2024 19:21
240717-x2pwdaycjb 10Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Bit Paymer.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Bit Paymer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
KeepCalm.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
KeepCalm.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
LockedIn.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
LockedIn.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
NotPetya.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
NotPetya.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Purge.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Purge.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Scarab.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Scarab.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win10v2004-20240709-en
General
-
Target
Scarab.exe
-
Size
342KB
-
MD5
6899003aaa63ab4397f9e32e0a1daf43
-
SHA1
c22272ff0944d127992b393562871473b23ef8ea
-
SHA256
53f73dc2e8af9c059136029b3b535e885d4452d3375586eb9a0336d7a389aad5
-
SHA512
d8895f96e12d1b0b5907f7b1e7b976a37ff0cbe6db929cfbea5c931d905fb8269dc91bf44db83743920b63affc64ba88a0933d3111bc68f71ee266971b91b6bc
-
SSDEEP
6144:zmTLRf45/wAfqj6pjohSws+wZQtmk6LnAlnZ:eq5/tyjMLd+Rtmkc0
Malware Config
Extracted
C:\IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS.TXT
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (224) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation Scarab.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation Scarab.exe -
Executes dropped EXE 2 IoCs
pid Process 4368 sevnz.exe 3048 sevnz.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1576 set thread context of 2104 1576 Scarab.exe 89 PID 4972 set thread context of 4784 4972 Scarab.exe 96 PID 4368 set thread context of 3048 4368 sevnz.exe 102 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\warning.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\warning.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\plugins.js sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\AddressBook2x.png.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filterselected-focus_32.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Updater.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\br.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_lg.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\trash.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\JSByteCodeWin.bin.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\AddressBook.png.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\illustrations_retina.png sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_anonymoususer_24.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\large_trefoil.png.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview-hover.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\main.css sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PPKLite.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\review_browser.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-down.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\spectrum_spinner.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\sendforsignature.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\apple-touch-icon-114x114-precomposed.png sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\illustrations_retina.png.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-default_32.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\JSByteCodeWin.bin sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\trash.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_anonymoususer_18.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\ReadMe.htm.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\AddressBook.png sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions2x.png.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-focus_32.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\cef_100_percent.pak sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\DefaultID.pdf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\forms_distributed.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\form_responses.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Accessibility.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\MakeAccessible.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-default.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\comment.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PPKLite.api.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\bl.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\next-arrow-down.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\organize.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\forms_received.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\apple-touch-icon-72x72-precomposed.png.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\forms_distributed.gif sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_cancel_18.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_ellipses-hover.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\DVA.api sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\pdf.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_download_audit_report_18.svg.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\over-arrow-navigation.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_ellipses_selected.svg sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\manifest.json.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\Words.pdf sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_issue.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\turnOffNotificationInAcrobat.gif.[[email protected]].scarab sevnz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_ellipses_selected-hover.svg sevnz.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 4972 Scarab.exe 4784 Scarab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe 3048 sevnz.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3088 WMIC.exe Token: SeSecurityPrivilege 3088 WMIC.exe Token: SeTakeOwnershipPrivilege 3088 WMIC.exe Token: SeLoadDriverPrivilege 3088 WMIC.exe Token: SeSystemProfilePrivilege 3088 WMIC.exe Token: SeSystemtimePrivilege 3088 WMIC.exe Token: SeProfSingleProcessPrivilege 3088 WMIC.exe Token: SeIncBasePriorityPrivilege 3088 WMIC.exe Token: SeCreatePagefilePrivilege 3088 WMIC.exe Token: SeBackupPrivilege 3088 WMIC.exe Token: SeRestorePrivilege 3088 WMIC.exe Token: SeShutdownPrivilege 3088 WMIC.exe Token: SeDebugPrivilege 3088 WMIC.exe Token: SeSystemEnvironmentPrivilege 3088 WMIC.exe Token: SeRemoteShutdownPrivilege 3088 WMIC.exe Token: SeUndockPrivilege 3088 WMIC.exe Token: SeManageVolumePrivilege 3088 WMIC.exe Token: 33 3088 WMIC.exe Token: 34 3088 WMIC.exe Token: 35 3088 WMIC.exe Token: 36 3088 WMIC.exe Token: SeIncreaseQuotaPrivilege 3088 WMIC.exe Token: SeSecurityPrivilege 3088 WMIC.exe Token: SeTakeOwnershipPrivilege 3088 WMIC.exe Token: SeLoadDriverPrivilege 3088 WMIC.exe Token: SeSystemProfilePrivilege 3088 WMIC.exe Token: SeSystemtimePrivilege 3088 WMIC.exe Token: SeProfSingleProcessPrivilege 3088 WMIC.exe Token: SeIncBasePriorityPrivilege 3088 WMIC.exe Token: SeCreatePagefilePrivilege 3088 WMIC.exe Token: SeBackupPrivilege 3088 WMIC.exe Token: SeRestorePrivilege 3088 WMIC.exe Token: SeShutdownPrivilege 3088 WMIC.exe Token: SeDebugPrivilege 3088 WMIC.exe Token: SeSystemEnvironmentPrivilege 3088 WMIC.exe Token: SeRemoteShutdownPrivilege 3088 WMIC.exe Token: SeUndockPrivilege 3088 WMIC.exe Token: SeManageVolumePrivilege 3088 WMIC.exe Token: 33 3088 WMIC.exe Token: 34 3088 WMIC.exe Token: 35 3088 WMIC.exe Token: 36 3088 WMIC.exe Token: SeBackupPrivilege 2964 vssvc.exe Token: SeRestorePrivilege 2964 vssvc.exe Token: SeAuditPrivilege 2964 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 1576 wrote to memory of 2104 1576 Scarab.exe 89 PID 2104 wrote to memory of 1768 2104 Scarab.exe 90 PID 2104 wrote to memory of 1768 2104 Scarab.exe 90 PID 2104 wrote to memory of 1768 2104 Scarab.exe 90 PID 2104 wrote to memory of 4972 2104 Scarab.exe 92 PID 2104 wrote to memory of 4972 2104 Scarab.exe 92 PID 2104 wrote to memory of 4972 2104 Scarab.exe 92 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4972 wrote to memory of 4784 4972 Scarab.exe 96 PID 4784 wrote to memory of 3116 4784 Scarab.exe 97 PID 4784 wrote to memory of 3116 4784 Scarab.exe 97 PID 4784 wrote to memory of 3116 4784 Scarab.exe 97 PID 4784 wrote to memory of 4368 4784 Scarab.exe 99 PID 4784 wrote to memory of 4368 4784 Scarab.exe 99 PID 4784 wrote to memory of 4368 4784 Scarab.exe 99 PID 4784 wrote to memory of 4124 4784 Scarab.exe 100 PID 4784 wrote to memory of 4124 4784 Scarab.exe 100 PID 4784 wrote to memory of 4124 4784 Scarab.exe 100 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 4368 wrote to memory of 3048 4368 sevnz.exe 102 PID 3048 wrote to memory of 3496 3048 sevnz.exe 103 PID 3048 wrote to memory of 3496 3048 sevnz.exe 103 PID 3048 wrote to memory of 3496 3048 sevnz.exe 103 PID 3048 wrote to memory of 4496 3048 sevnz.exe 104 PID 3048 wrote to memory of 4496 3048 sevnz.exe 104 PID 3048 wrote to memory of 4496 3048 sevnz.exe 104 PID 3048 wrote to memory of 2428 3048 sevnz.exe 105 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\Scarab.exe" "C:\Users\Admin\AppData\Roaming\sevnz.exe"3⤵PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe" runas3⤵
- Suspicious use of SetThreadContext
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Scarab.exe"C:\Users\Admin\AppData\Local\Temp\Scarab.exe" runas4⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\Scarab.exe" "C:\Users\Admin\AppData\Roaming\sevnz.exe"5⤵PID:3116
-
-
C:\Users\Admin\AppData\Roaming\sevnz.exe"C:\Users\Admin\AppData\Roaming\sevnz.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Roaming\sevnz.exe"C:\Users\Admin\AppData\Roaming\sevnz.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('WScript.Shell');x=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{i=x.GetFile('sevnz.exe').Path;o.RegWrite('HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\{45E73A27-D16C-4EDB-ADE8-0C069E54AF30}',i);}catch(e){}},10);"7⤵PID:3496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin DELETE SYSTEMSTATEBACKUP -keepVersions:07⤵PID:4496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic SHADOWCOPY DELETE7⤵PID:2428
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic SHADOWCOPY DELETE8⤵
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vssadmin Delete Shadows /All /Quiet7⤵PID:4388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled No7⤵PID:2172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures7⤵PID:864
-
-
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "javascript:o=new ActiveXObject('Scripting.FileSystemObject');setInterval(function(){try{o.DeleteFile('Scarab.exe');close()}catch(e){}},10);"5⤵PID:4124
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD53e4b14e9531773cfac0b2b9a31b46e42
SHA1b4a004919ad7a743103338fe910dcda078bb3ab6
SHA256afd70092309d8caa0dc29efaa61791aedef78a3704e10b8f37474d5a2ee228a3
SHA512a16e6949317ed76c4d9ffd15ea694bc8f6eb2c1bf5216befb7760ef33d93b67cb603c091f1907fedc6347ec01e9dafc053bebf2536497da422c1f8e9542ffafd
-
Filesize
342KB
MD56899003aaa63ab4397f9e32e0a1daf43
SHA1c22272ff0944d127992b393562871473b23ef8ea
SHA25653f73dc2e8af9c059136029b3b535e885d4452d3375586eb9a0336d7a389aad5
SHA512d8895f96e12d1b0b5907f7b1e7b976a37ff0cbe6db929cfbea5c931d905fb8269dc91bf44db83743920b63affc64ba88a0933d3111bc68f71ee266971b91b6bc