Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe
-
Size
103KB
-
MD5
72df7fd0854935ba0b5e07f723589392
-
SHA1
d628cb84d232f83dcd291e43ff079fb481290a7d
-
SHA256
2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183
-
SHA512
12dfc847064842207c3b87119145fb50ebd647f9eb6ef997ad47c1f5e451f2f2033635169aed28a8f6288f718fbce56d8a67c2178dd26dc016de52bed2520e67
-
SSDEEP
3072:vomnzVincQDKgcp3bsOW+NMY7sDti0dP0L0nLn:vtZVsyNMYytiFL4j
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\readme-warning.txt
makop
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8252) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 1780 wbadmin.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 iplogger.org 5 iplogger.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1988 set thread context of 2712 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 30 PID 2512 set thread context of 2720 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 43 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.Runtime.xml 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\wmplayer.exe.mui 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository.nl_zh_4.4.0.v20140623020002.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.eclipse.nl_zh_4.4.0.v20140623020002.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14533_.GIF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedZhengMa.txt 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.DEV_COL.HXT 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\settings.html 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\TAB_ON.GIF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_joined.gif.[5EEF8B23].[[email protected]].mammon 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105490.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107544.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\FreeCell.exe.mui 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153299.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02736U.BMP 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00170_.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\RSSFeeds.html 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Moncton 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt.nl_ja_4.4.0.v20140623020002.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_cloudy.png 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\plugins.dat 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0291794.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\settings.css 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\charsets.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\PYCC.pf 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Rothera 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\InkObj.dll.mui 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185776.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21313_.GIF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\TOC98.POC 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\flyout.css 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\play-static.png 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_zh_4.4.0.v20140623020002.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Windows Journal\Templates\Music.jtp 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FLAP.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\TAB_OFF.GIF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME05.CSS 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN086.XML 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_ja_4.4.0.v20140623020002.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\SONORA.INF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msadomd28.tlb 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR39F.GIF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Elegant.dotx 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_dot.png 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.properties 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_zh_CN.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR50F.GIF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\TAB_OFF.GIF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_zh_4.4.0.v20140623020002.jar 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\FAXEXT.ECF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCDRESNS.ICO 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.HXS 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Eucla 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105588.WMF 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\VIEW.JS 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msadcer.dll.mui 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-application-views.xml 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files\Windows Journal\de-DE\Journal.exe.mui 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\readme-warning.txt 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\SplashScreen.zip 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\WinMail.exe.mui 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\readme-warning.txt 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2552 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2712 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2500 vssvc.exe Token: SeRestorePrivilege 2500 vssvc.exe Token: SeAuditPrivilege 2500 vssvc.exe Token: SeBackupPrivilege 2492 wbengine.exe Token: SeRestorePrivilege 2492 wbengine.exe Token: SeSecurityPrivilege 2492 wbengine.exe Token: SeIncreaseQuotaPrivilege 2396 WMIC.exe Token: SeSecurityPrivilege 2396 WMIC.exe Token: SeTakeOwnershipPrivilege 2396 WMIC.exe Token: SeLoadDriverPrivilege 2396 WMIC.exe Token: SeSystemProfilePrivilege 2396 WMIC.exe Token: SeSystemtimePrivilege 2396 WMIC.exe Token: SeProfSingleProcessPrivilege 2396 WMIC.exe Token: SeIncBasePriorityPrivilege 2396 WMIC.exe Token: SeCreatePagefilePrivilege 2396 WMIC.exe Token: SeBackupPrivilege 2396 WMIC.exe Token: SeRestorePrivilege 2396 WMIC.exe Token: SeShutdownPrivilege 2396 WMIC.exe Token: SeDebugPrivilege 2396 WMIC.exe Token: SeSystemEnvironmentPrivilege 2396 WMIC.exe Token: SeRemoteShutdownPrivilege 2396 WMIC.exe Token: SeUndockPrivilege 2396 WMIC.exe Token: SeManageVolumePrivilege 2396 WMIC.exe Token: 33 2396 WMIC.exe Token: 34 2396 WMIC.exe Token: 35 2396 WMIC.exe Token: SeIncreaseQuotaPrivilege 2396 WMIC.exe Token: SeSecurityPrivilege 2396 WMIC.exe Token: SeTakeOwnershipPrivilege 2396 WMIC.exe Token: SeLoadDriverPrivilege 2396 WMIC.exe Token: SeSystemProfilePrivilege 2396 WMIC.exe Token: SeSystemtimePrivilege 2396 WMIC.exe Token: SeProfSingleProcessPrivilege 2396 WMIC.exe Token: SeIncBasePriorityPrivilege 2396 WMIC.exe Token: SeCreatePagefilePrivilege 2396 WMIC.exe Token: SeBackupPrivilege 2396 WMIC.exe Token: SeRestorePrivilege 2396 WMIC.exe Token: SeShutdownPrivilege 2396 WMIC.exe Token: SeDebugPrivilege 2396 WMIC.exe Token: SeSystemEnvironmentPrivilege 2396 WMIC.exe Token: SeRemoteShutdownPrivilege 2396 WMIC.exe Token: SeUndockPrivilege 2396 WMIC.exe Token: SeManageVolumePrivilege 2396 WMIC.exe Token: 33 2396 WMIC.exe Token: 34 2396 WMIC.exe Token: 35 2396 WMIC.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2712 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 30 PID 1988 wrote to memory of 2712 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 30 PID 1988 wrote to memory of 2712 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 30 PID 1988 wrote to memory of 2712 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 30 PID 1988 wrote to memory of 2712 1988 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 30 PID 2712 wrote to memory of 2876 2712 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 32 PID 2712 wrote to memory of 2876 2712 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 32 PID 2712 wrote to memory of 2876 2712 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 32 PID 2712 wrote to memory of 2876 2712 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 32 PID 2876 wrote to memory of 2552 2876 cmd.exe 34 PID 2876 wrote to memory of 2552 2876 cmd.exe 34 PID 2876 wrote to memory of 2552 2876 cmd.exe 34 PID 2876 wrote to memory of 1780 2876 cmd.exe 37 PID 2876 wrote to memory of 1780 2876 cmd.exe 37 PID 2876 wrote to memory of 1780 2876 cmd.exe 37 PID 2876 wrote to memory of 2396 2876 cmd.exe 41 PID 2876 wrote to memory of 2396 2876 cmd.exe 41 PID 2876 wrote to memory of 2396 2876 cmd.exe 41 PID 2512 wrote to memory of 2720 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 43 PID 2512 wrote to memory of 2720 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 43 PID 2512 wrote to memory of 2720 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 43 PID 2512 wrote to memory of 2720 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 43 PID 2512 wrote to memory of 2720 2512 2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe"C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe"C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe"C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe" n27123⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe"C:\Users\Admin\AppData\Local\Temp\2aae8c4c79d6332be6f899936c662326250d402f13b1ef85f930d61d4179e183.exe" n27124⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2552
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1780
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:288
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50f44a19896202f3a9f8dd0747e54c5eb
SHA103f490800892428e0791deeccbe5fa56b0b97226
SHA256994aaeff999041819c380948d93a44265440d63d5b6e7a9cc9ef82d646fcd1ef
SHA512f5323173a37308cdaf5c8480c4a4a3536211a41d2c52eb87a0c1a187f0c590e062507cdeca3720ae67a4b3579a0aa65da3da1f57014e101336f275b921e2b5f6
-
Filesize
58KB
MD5b4533f8b01e2e179998682317734f26c
SHA1ca4a9b99abd124908540ca283b47a5c5a1660f09
SHA256e27627e2cddbaf7a865cf135834ce66d036b1ec5bb3a55fee268f1d373e161fc
SHA5125bb7379d3a7a2f6fd3e95a7fab9bf4c2aa8d22ab9db3cc9dde97e1d441dfbaa014b860db46c4fe55dee053aa896ae268b73cec29e4bed3fc65923e147883643f
-
Filesize
57KB
MD522bcb89336d9bb23b7d043e832c6db25
SHA120c808d956528cda0c780aee937092dc8151b3ed
SHA256b8c09432f5d84b39eade26cc54e589042b318c19014fd9723e04b055eccf4dd8
SHA5125c123e5aa6c4dcee781cf89e3cc1d611d3e05dee6cc88530381f3b144d76f8debe4f2c76ce80ef9bfcee6f85861318355827d2644e9ac5402a4e46a5d044538c
-
Filesize
1KB
MD5c4d55217327b3d606d0953816d3683b6
SHA1aaa68c0a9ebef5ed62e87c83c559f7a3956f1590
SHA25674aaff5db49a066472c4c444109818d48b0dee39d5047621636f035fa02a78a7
SHA5127b67447567a8670e257ff0e152292e1d45e7b27cda052d840dcb81e37a5c41f7a8e7e67ff52c86ded32181feae4869a1071221a8c24e19130dbf9579e04e08bd
-
Filesize
1KB
MD50497bfbf9a91c83ce6b9e1eeec900ec5
SHA1a7c7e96379dcaf5cf469defe09b1ffae7170d382
SHA256c5faa5689c832a5ad0e572931c4ef20db3a93f6de20f1d4fec909fbb4adfcd0c
SHA51268759ba0cefb037d2777dbda46a034ba7e96a26ee3e0c32577249a500b13a2ece8525e9b736f58aa8f87398eba470f561c3fd461ea118588eade542bf28086aa
-
Filesize
1KB
MD5b6507e88b0738f8b537af300660a08ad
SHA1ced35d7c76ca99d50cc0a8ae7b2d37f36fe1b4a1
SHA2565a34ffad0e024b5a0e0f3bab4810e62e4e5dd43e6e175a199eeb81a56328b78a
SHA5124dc5c931022559b51e899caebf56197d8e29b2ccfaf395fb35c339f5ef4e448327ac8da9ea95a7f8ed1d8828581533cecd33fadc42fa44ee1d724a630b0e3bce
-
Filesize
1KB
MD5e8f5aaedbca826dcba99eeda23a4c43f
SHA19f0c9991ff192367f23bceb7c90d026fd5648a0d
SHA2561a93b3730c889f3bc449edd1927272edd2e10f36f9305bda8f6fd52ea8a76399
SHA5124bc39cb7b3c92a7a115a839e9c2df7b949e9572fbe7b3851c24773c663d8f4ed4263c010d7d71d9c827c79d713bacf56d7b88b0875baad3404027c394ad47394
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0