Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe
Resource
win10v2004-20240802-en
General
-
Target
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe
-
Size
1.0MB
-
MD5
69a45130e5e5aadaae4f023c6ea37725
-
SHA1
28e1f0d8e479597f4d7b20c43bc8044482ebbc74
-
SHA256
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f
-
SHA512
357f9b5aca858c8a77b124674c4469a760cf7db340263217d02787eebeccef3c2e13676a8fbe44336cee6b3d3ff189b12ee197f4da6584be0ec6b9cedd7dc807
-
SSDEEP
24576:6QMc/LMx3+ZoXdEwZuS2+gYUdX4h3dHt:668uZoNEwBg3XSJ
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 2096 bcdedit.exe 2752 bcdedit.exe -
Drops startup file 2 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B8E97DF9C459131D818BC62B5A43BB5.exe 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7B8E97DF9C459131D818BC62B5A43BB5.exe 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Drops desktop.ini file(s) 36 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exedescription ioc process File opened for modification C:\program files\microsoft games\freecell\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\microsoft games\hearts\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\favorites\links for united states\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\recorded tv\sample media\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\microsoft games\spidersolitaire\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\music\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\pictures\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\microsoft games\purble place\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\desktop\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\favorites\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\recorded tv\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\microsoft games\mahjong\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\videos\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\downloads\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\music\sample music\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\microsoft games\chess\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\downloads\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\pictures\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\saved games\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\documents\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\videos\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\contacts\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\favorites\links\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\microsoft games\solitaire\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\searches\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\desktop\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\pictures\sample pictures\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\videos\sample videos\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\1033\dataservices\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\documents\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\links\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\admin\music\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\users\public\libraries\desktop.ini 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exedescription ioc process File opened (read-only) \??\F: 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\7B8E97DF9C459131D818BC62B5A43BB5.bmp" 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Drops file in Program Files directory 64 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exedescription ioc process File created C:\program files\microsoft games\hearts\es-es\#Read-for-recovery.txt 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\jre\lib\zi\etc\gmt+7 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator_1.1.0.v20131217-1203.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jre7\lib\zi\america\argentina\ushuaia 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\j0178632.jpg 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\sy01253_.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\media\office14\bullets\bd14754_.gif 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\dvd maker\shared\dvdstyles\whitedot.png 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formshomepage.html 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\jre\lib\zi\africa\casablanca 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\jre\lib\zi\asia\kabul 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\windows media player\es-es\wmlaunch.exe.mui 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\j0187893.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\pagesize\pglbl103.xml 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\dvd maker\shared\dvdstyles\specialoccasion\specialoccasion.png 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\j0214934.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\j0309904.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms3\formsstyles\slate.css 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\windows sidebar\gadgets\calendar.gadget\es-es\js\calendar.js 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher_1.1.0.v20131211-1531.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\so01954_.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\media\cagcat10\j0287005.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File created C:\program files\videolan\vlc\locale\sq\lc_messages\#Read-for-recovery.txt 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multitabs_zh_cn.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File created C:\program files\windows sidebar\gadgets\slideshow.gadget\images\on_desktop\#Read-for-recovery.txt 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\j0086428.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\document themes 14\theme colors\waveform.xml 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms3\formsstyles\brightorange.css 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms5\form.js 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.jasper.glassfish_2.2.2.v201205150955.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File created C:\program files (x86)\windows sidebar\gadgets\clock.gadget\es-es\css\#Read-for-recovery.txt 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jre7\lib\zi\europe\andorra 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File created C:\program files (x86)\windows sidebar\gadgets\weather.gadget\fr-fr\js\#Read-for-recovery.txt 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\j0232393.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\media\office14\bullets\bd14829_.gif 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\1033\onguide.onepkg 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\pubwiz\invite.xml 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\dvd maker\shared\dvdstyles\full\navigationright_buttongraphic.png 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\visualvm\visualvm\config\modules\org-netbeans-api-visual.xml_hidden 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\dvd maker\shared\dvdstyles\pets\notes_intro_bg.wmv 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\windows media player\ja-jp\setup_wm.exe.mui 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\fincl_01.mid 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\dvd maker\shared\dvdstyles\stacking\navigationleft_selectionsubpicture.png 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-profiling_ja.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\1033\pubspapr\pdir1f.gif 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_cn_5.5.0.165303.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\adobe\reader 9.0\reader\tracker\distribute_form.gif 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File created C:\program files\microsoft games\freecell\it-it\#Read-for-recovery.txt 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\windows sidebar\gadgets\weather.gadget\it-it\weather.html 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\1033\pubspapr\pdir39f.gif 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveprojecttoolset\projecttool\project report type\fancy\spacer.gif 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\jre\lib\zi\asia\urumqi 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\j0187829.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\clipart\pub60cor\pe02288_.wmf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\office14\pubwiz\contactinfobb.dpv 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File created C:\program files\videolan\vlc\locale\ku_iq\lc_messages\#Read-for-recovery.txt 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\microsoft office\media\office14\lines\bd21313_.gif 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_zh_cn.jar 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jre7\lib\cmm\ciexyz.pf 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\java\jre7\lib\zi\asia\oral 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files (x86)\windows sidebar\gadgets\rssfeeds.gadget\es-es\css\settings.css 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\dvd maker\shared\dvdstyles\specialoccasion\navigationright_selectionsubpicture.png 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe File opened for modification C:\program files\windows mail\ja-jp\winmail.exe.mui 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2328 vssadmin.exe -
Modifies Control Panel 3 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\WallpaperStyle = "2" 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\TileWallpaper = "0" 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exepid process 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exevssvc.exeWMIC.exeWMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2924 WMIC.exe Token: SeSecurityPrivilege 2924 WMIC.exe Token: SeTakeOwnershipPrivilege 2924 WMIC.exe Token: SeLoadDriverPrivilege 2924 WMIC.exe Token: SeSystemProfilePrivilege 2924 WMIC.exe Token: SeSystemtimePrivilege 2924 WMIC.exe Token: SeProfSingleProcessPrivilege 2924 WMIC.exe Token: SeIncBasePriorityPrivilege 2924 WMIC.exe Token: SeCreatePagefilePrivilege 2924 WMIC.exe Token: SeBackupPrivilege 2924 WMIC.exe Token: SeRestorePrivilege 2924 WMIC.exe Token: SeShutdownPrivilege 2924 WMIC.exe Token: SeDebugPrivilege 2924 WMIC.exe Token: SeSystemEnvironmentPrivilege 2924 WMIC.exe Token: SeRemoteShutdownPrivilege 2924 WMIC.exe Token: SeUndockPrivilege 2924 WMIC.exe Token: SeManageVolumePrivilege 2924 WMIC.exe Token: 33 2924 WMIC.exe Token: 34 2924 WMIC.exe Token: 35 2924 WMIC.exe Token: SeBackupPrivilege 2704 vssvc.exe Token: SeRestorePrivilege 2704 vssvc.exe Token: SeAuditPrivilege 2704 vssvc.exe Token: SeIncreaseQuotaPrivilege 2992 WMIC.exe Token: SeSecurityPrivilege 2992 WMIC.exe Token: SeTakeOwnershipPrivilege 2992 WMIC.exe Token: SeLoadDriverPrivilege 2992 WMIC.exe Token: SeSystemProfilePrivilege 2992 WMIC.exe Token: SeSystemtimePrivilege 2992 WMIC.exe Token: SeProfSingleProcessPrivilege 2992 WMIC.exe Token: SeIncBasePriorityPrivilege 2992 WMIC.exe Token: SeCreatePagefilePrivilege 2992 WMIC.exe Token: SeBackupPrivilege 2992 WMIC.exe Token: SeRestorePrivilege 2992 WMIC.exe Token: SeShutdownPrivilege 2992 WMIC.exe Token: SeDebugPrivilege 2992 WMIC.exe Token: SeSystemEnvironmentPrivilege 2992 WMIC.exe Token: SeRemoteShutdownPrivilege 2992 WMIC.exe Token: SeUndockPrivilege 2992 WMIC.exe Token: SeManageVolumePrivilege 2992 WMIC.exe Token: 33 2992 WMIC.exe Token: 34 2992 WMIC.exe Token: 35 2992 WMIC.exe Token: SeIncreaseQuotaPrivilege 884 WMIC.exe Token: SeSecurityPrivilege 884 WMIC.exe Token: SeTakeOwnershipPrivilege 884 WMIC.exe Token: SeLoadDriverPrivilege 884 WMIC.exe Token: SeSystemProfilePrivilege 884 WMIC.exe Token: SeSystemtimePrivilege 884 WMIC.exe Token: SeProfSingleProcessPrivilege 884 WMIC.exe Token: SeIncBasePriorityPrivilege 884 WMIC.exe Token: SeCreatePagefilePrivilege 884 WMIC.exe Token: SeBackupPrivilege 884 WMIC.exe Token: SeRestorePrivilege 884 WMIC.exe Token: SeShutdownPrivilege 884 WMIC.exe Token: SeDebugPrivilege 884 WMIC.exe Token: SeSystemEnvironmentPrivilege 884 WMIC.exe Token: SeRemoteShutdownPrivilege 884 WMIC.exe Token: SeUndockPrivilege 884 WMIC.exe Token: SeManageVolumePrivilege 884 WMIC.exe Token: 33 884 WMIC.exe Token: 34 884 WMIC.exe Token: 35 884 WMIC.exe Token: SeIncreaseQuotaPrivilege 580 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2272 wrote to memory of 1604 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1604 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1604 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2308 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2308 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2308 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 1604 wrote to memory of 2328 1604 cmd.exe vssadmin.exe PID 1604 wrote to memory of 2328 1604 cmd.exe vssadmin.exe PID 1604 wrote to memory of 2328 1604 cmd.exe vssadmin.exe PID 2272 wrote to memory of 2896 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2896 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2896 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2308 wrote to memory of 2096 2308 cmd.exe bcdedit.exe PID 2308 wrote to memory of 2096 2308 cmd.exe bcdedit.exe PID 2308 wrote to memory of 2096 2308 cmd.exe bcdedit.exe PID 2272 wrote to memory of 3060 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 3060 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 3060 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2896 wrote to memory of 2752 2896 cmd.exe bcdedit.exe PID 2896 wrote to memory of 2752 2896 cmd.exe bcdedit.exe PID 2896 wrote to memory of 2752 2896 cmd.exe bcdedit.exe PID 3060 wrote to memory of 2924 3060 cmd.exe WMIC.exe PID 3060 wrote to memory of 2924 3060 cmd.exe WMIC.exe PID 3060 wrote to memory of 2924 3060 cmd.exe WMIC.exe PID 2272 wrote to memory of 2560 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2560 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2560 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2616 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2616 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2616 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2984 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2984 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2984 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2560 wrote to memory of 2992 2560 cmd.exe WMIC.exe PID 2560 wrote to memory of 2992 2560 cmd.exe WMIC.exe PID 2560 wrote to memory of 2992 2560 cmd.exe WMIC.exe PID 2272 wrote to memory of 2996 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2996 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 2996 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2616 wrote to memory of 884 2616 cmd.exe WMIC.exe PID 2616 wrote to memory of 884 2616 cmd.exe WMIC.exe PID 2616 wrote to memory of 884 2616 cmd.exe WMIC.exe PID 2272 wrote to memory of 1068 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1068 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1068 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1988 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1988 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1988 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2984 wrote to memory of 580 2984 cmd.exe WMIC.exe PID 2984 wrote to memory of 580 2984 cmd.exe WMIC.exe PID 2984 wrote to memory of 580 2984 cmd.exe WMIC.exe PID 2996 wrote to memory of 1620 2996 cmd.exe WMIC.exe PID 2996 wrote to memory of 1620 2996 cmd.exe WMIC.exe PID 2996 wrote to memory of 1620 2996 cmd.exe WMIC.exe PID 2272 wrote to memory of 1220 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1220 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1220 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1984 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1984 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 2272 wrote to memory of 1984 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe PID 1068 wrote to memory of 1700 1068 cmd.exe WMIC.exe PID 1068 wrote to memory of 1700 1068 cmd.exe WMIC.exe PID 1068 wrote to memory of 1700 1068 cmd.exe WMIC.exe PID 2272 wrote to memory of 2040 2272 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe cmd.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "Encrypted by Kuza" 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Email us for recovery: [email protected]\n In case of no answer, send to this email: [email protected]\nYour unqiue ID:\n7B8E97DF9C459131D818BC62B5A43BB5" 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe"C:\Users\Admin\AppData\Local\Temp\814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2752
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic SHADOWCOPY /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{114FEB11-1D2C-4EBD-9FE3-460FEDCE7D1C}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{114FEB11-1D2C-4EBD-9FE3-460FEDCE7D1C}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DFB62530-39DF-4AF1-BA3F-5C49383B0D41}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DFB62530-39DF-4AF1-BA3F-5C49383B0D41}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F2BDEC03-18F3-4EA9-ABD4-D53CDBF9E0AC}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F2BDEC03-18F3-4EA9-ABD4-D53CDBF9E0AC}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6F47B8E0-A76F-42B8-80C5-2B902F5E5749}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6F47B8E0-A76F-42B8-80C5-2B902F5E5749}'" delete3⤵PID:1620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{021F038D-EF98-4277-807F-D9D2C31761FE}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{021F038D-EF98-4277-807F-D9D2C31761FE}'" delete3⤵PID:1700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{522CFB70-E966-4631-B951-39079840FC86}'" delete2⤵PID:1988
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{522CFB70-E966-4631-B951-39079840FC86}'" delete3⤵PID:2020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{39A60542-2909-4674-A9B2-FCD89B71F373}'" delete2⤵PID:1220
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{39A60542-2909-4674-A9B2-FCD89B71F373}'" delete3⤵PID:1436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{09D614CE-B995-49B2-AD78-718627D30B0D}'" delete2⤵PID:1984
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{09D614CE-B995-49B2-AD78-718627D30B0D}'" delete3⤵PID:2620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9A213CE1-2A1D-4404-85E9-A877A57FF56E}'" delete2⤵PID:2040
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9A213CE1-2A1D-4404-85E9-A877A57FF56E}'" delete3⤵PID:1496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07126393-5C20-4FEC-84EB-08FDE444B0C2}'" delete2⤵PID:2044
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07126393-5C20-4FEC-84EB-08FDE444B0C2}'" delete3⤵PID:2084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{569F095D-1CBC-4EAB-A3CC-4EDACD8A6278}'" delete2⤵PID:2536
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{569F095D-1CBC-4EAB-A3CC-4EDACD8A6278}'" delete3⤵PID:1168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{25D60D36-2134-4703-B70F-C1E5670E2758}'" delete2⤵PID:3004
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{25D60D36-2134-4703-B70F-C1E5670E2758}'" delete3⤵PID:112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E62387E8-4164-4550-873D-246FB783FDA4}'" delete2⤵PID:1332
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E62387E8-4164-4550-873D-246FB783FDA4}'" delete3⤵PID:2168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EBF372D1-ABDA-4550-BCFA-E589781243CB}'" delete2⤵PID:2212
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EBF372D1-ABDA-4550-BCFA-E589781243CB}'" delete3⤵PID:2864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{223604F6-39C9-4351-83D1-90EEE67EC572}'" delete2⤵PID:1252
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{223604F6-39C9-4351-83D1-90EEE67EC572}'" delete3⤵PID:2204
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E3902E7F-7A32-4261-A3EE-B17FE1936361}'" delete2⤵PID:1048
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E3902E7F-7A32-4261-A3EE-B17FE1936361}'" delete3⤵PID:2076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7CD00F17-C743-4154-B479-2E288FF81CB4}'" delete2⤵PID:2356
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7CD00F17-C743-4154-B479-2E288FF81CB4}'" delete3⤵PID:2336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{47BC8E53-5A59-4C7C-AEF0-C0F1C41CFCA7}'" delete2⤵PID:888
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{47BC8E53-5A59-4C7C-AEF0-C0F1C41CFCA7}'" delete3⤵PID:2828
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5153a1cdc8ad4ddcc04f51e316e880e2f
SHA1127eed32f73cdf3bafae7e04bd3573b64ccbe50a
SHA256306a329356400e59f097093cee1d2ffdfcf726f512f1e8f6d4c415c4659fedd6
SHA512561a3c6e753e1db94502239fa3c09f2f759b67f1d86f303d712948605e1cb34d9ef3736ad49d29801abd7e26f71cf92a2f0f5fa989329d6fbc58dd096793ffbf