Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 13:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe
Resource
win10v2004-20240802-en
General
-
Target
scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe
-
Size
159KB
-
MD5
80f4a1d42e2d4205cedf96909091cf84
-
SHA1
b9500d8a20ea3831f0843ca8636be11fef836625
-
SHA256
9d41b2f7c07110fb855c62b5e7e330a597860916599e73dd3505694fd1bbe163
-
SHA512
42168abc5f69ea35756fa71e1fd49c47b20b4111fc13e4593ae55f576e7f3d9d6583213547cbb01c245e7616b542ee160caa96022ca561eaf290db8818035fd3
-
SSDEEP
3072:/V2UzNeZWtTsi2OHAXDCtY6cgtz45qS7IfJJoSl:NHReZETV2UAXDzb2icl
Malware Config
Extracted
C:\Program Files\7-Zip\!!readme!!!.txt
underground
http://ehehqyhw3iev2vfso4vqs7kcrzltfebe5vbimq62p2ja7pslczs3q6qd.onion/
Signatures
-
Underground Team
Underground Team is a ransomware first seen in July 2023 that is primarily distriuted via exploting vulnerabilities.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe -
Drops desktop.ini file(s) 30 IoCs
description ioc Process File opened for modification \??\c:\users\admin\onedrive\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\searches\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\office16\1033\dataservices\DESKTOP.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\pictures\saved pictures\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\desktop\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\downloads\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\$recycle.bin\s-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\documents\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\libraries\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\links\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\pictures\camera roll\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\accountpictures\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\music\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\pictures\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\public\videos\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\f:\$recycle.bin\s-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\documents\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\music\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\videos\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\3d objects\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\createpdfupsell-app\images\example_icons.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\windows photo viewer\en-us\PhotoViewer.dll.mui scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.skypeapp_14.53.77.0_x64__kzf8qxf38zg5c\assets\audio\Skype_Incoming_Video_Available.m4a scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.vp9videoextensions_1.0.22681.0_x64__8wekyb3d8bbwe\assets\contrast-black\LargeTile.scale-200_contrast-black.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.office.onenote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinLearningTools.xml scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\tracked-send\images\new_icons.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\office16\msipc\MSIPCEvents.man scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.heifimageextension_1.0.22742.0_x64__8wekyb3d8bbwe\assets\contrast-black\StoreLogo.scale-200_contrast-black.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxMediumTile.scale-200.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\java\jre-1.8\legal\jdk\dynalink.md scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.webmediaextensions_1.0.20875.0_x64__8wekyb3d8bbwe\assets\contrast-black\AppList.targetsize-20_contrast-black.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\RHP_icons_2x.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windows defender\ja-jp\ProtectionManagement.mfl scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.webmediaextensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.mixedreality.portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\resources.pri scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Dark.scale-300.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.zunevideo_10.19071.19011.0_x64__8wekyb3d8bbwe\assets\contrast-black\AppList.targetsize-20_altform-unplated_contrast-black.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File created \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\on-boarding\images\themeless\localized_images\tr-tr\!!readme!!!.txt scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\licenses16\ProPlusR_Trial-ppd.xrm-ms scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.bingweather_4.25.20211.0_x64__8wekyb3d8bbwe\assets\apptiles\weathericons\30x30\28.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.zunemusic_10.19071.19011.0_x64__8wekyb3d8bbwe\assets\contrast-black\AppList.targetsize-24_contrast-black.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\digsig\images\themes\dark\s_checkbox_selected_18.svg scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\windowspowershell\modules\powershellget\1.0.0.1\de-de\!!readme!!!.txt scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\deletedalluserpackages\microsoft.windowsfeedbackhub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowsstore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Entertainment.winmd scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-20.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxWideTile.scale-400.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-60.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\office16\logoimages\FirstRunLogoSmall.contrast-white_scale-140.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\deletedalluserpackages\microsoft.windowsalarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\deletedalluserpackages\microsoft.skypeapp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\AppxManifest.xml scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscamera_2018.826.98.0_x64__8wekyb3d8bbwe\assets\windowsicons\WindowsCameraAppList.contrast-white_targetsize-72.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.xboxapp_48.49.31001.0_x64__8wekyb3d8bbwe\xboxapp.resource\Xbox.Smartglass.Loc.xml scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\unified-share\images\themes\dark\!!readme!!!.txt scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\licenses16\HomeStudentR_Grace-ul-oob.xrm-ms scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\office16\msipc\ar\msipc.dll.mui scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windows media player\fr-fr\wmpnetwk.exe.mui scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.office.onenote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageSmallTile.scale-150.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\deletedalluserpackages\microsoft.windowsmaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\assets\secondarytiles\car\ltr\contrast-black\MedTile.scale-125.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.microsoft3dviewer_6.1908.2042.0_x64__8wekyb3d8bbwe\assets\lighting\dark\Default.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.webmediaextensions_1.0.20875.0_x64__8wekyb3d8bbwe\assets\contrast-white\AppList.targetsize-16_contrast-white.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-100.HCBlack.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarBadge.scale-125.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowsfeedbackhub_1.1907.3152.0_x64__8wekyb3d8bbwe\assets\InsiderHubLargeTile.scale-200_contrast-white.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\licenses16\HomeBusiness2019DemoR_BypassTrial180-ul-oob.xrm-ms scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\office16\borders\MSART11.bdr scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowsfeedbackhub_1.1907.3152.0_x64__8wekyb3d8bbwe\assets\InsiderHubStoreLogo.scale-200_contrast-black.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\sendforcomments.svg scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files (x86)\adobe\acrobat reader dc\reader\webresources\resource0\static\images\selection-actions.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowsmaps_5.1906.1972.0_x64__8wekyb3d8bbwe\assets\images\suggestionsservice\FavoriteDark.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowspowershell\modules\psreadline\2.0.0\PSReadline.psm1 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.skypeapp_14.53.77.0_x64__kzf8qxf38zg5c\assets\audio\Skype_Dtmf_9.m4a scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\kb-unlocked.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\integration\!!readme!!!.txt scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.desktopappinstaller_1.0.30251.0_x64__8wekyb3d8bbwe\assets\contrast-white\AppPackageMedTile.scale-100_contrast-white.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowscamera_2018.826.98.0_x64__8wekyb3d8bbwe\assets\windowsicons\WindowsCameraAppList.targetsize-80_altform-unplated.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\microsoft office\root\licenses16\Word2019R_OEM_Perp-ul-oob.xrm-ms scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File created \??\c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\smart tag\1033\!!readme!!!.txt scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.microsoft3dviewer_6.1908.2042.0_x64__8wekyb3d8bbwe\common.view.uwp\strings\en-gb\view3d\3DViewerProductDescription-universal.xml scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.windowsfeedbackhub_1.1907.3152.0_x64__8wekyb3d8bbwe\assets\InsiderHubAppList.targetsize-48.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\common files\microsoft shared\ink\ipssrb.xml scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.bingweather_4.25.20211.0_x64__8wekyb3d8bbwe\assets\apptiles\contrast-white\Weather_TileLargeSquare.scale-200.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\windowsapps\microsoft.skypeapp_14.53.77.0_x64__kzf8qxf38zg5c\assets\images\SkypeLogo.scale-200.png scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe File opened for modification \??\c:\program files\7-zip\lang\id.txt scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2204 vssadmin.exe 1636 vssadmin.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2256 reg.exe 4076 reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3008 vssvc.exe Token: SeRestorePrivilege 3008 vssvc.exe Token: SeAuditPrivilege 3008 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2204 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 83 PID 1036 wrote to memory of 2204 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 83 PID 1036 wrote to memory of 2256 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 85 PID 1036 wrote to memory of 2256 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 85 PID 1036 wrote to memory of 1288 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 86 PID 1036 wrote to memory of 1288 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 86 PID 1288 wrote to memory of 764 1288 net.exe 90 PID 1288 wrote to memory of 764 1288 net.exe 90 PID 1036 wrote to memory of 1636 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 106 PID 1036 wrote to memory of 1636 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 106 PID 1036 wrote to memory of 4076 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 108 PID 1036 wrote to memory of 4076 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 108 PID 1036 wrote to memory of 8 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 110 PID 1036 wrote to memory of 8 1036 scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe 110 PID 8 wrote to memory of 1396 8 net.exe 112 PID 8 wrote to memory of 1396 8 net.exe 112 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe"C:\Users\Admin\AppData\Local\Temp\scenario_472897___e7418389-a33e-42a7-8a6f-0c5d03e00962.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2204
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services / v MaxDisconnectionTime / t REG_DWORD / d 1209600000 / f2⤵
- Modifies registry key
PID:2256
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop MSSQLSERVER /f /m2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /f /m3⤵PID:764
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1636
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services / v MaxDisconnectionTime / t REG_DWORD / d 1209600000 / f2⤵
- Modifies registry key
PID:4076
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop MSSQLSERVER /f /m2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /f /m3⤵PID:1396
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\!!readme!!!.txt1⤵PID:4832
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request64.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
64.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e3adffe7c5c5a0512861866a9fac99d0
SHA14e1bd7b5ac85d977354ef69aefa30b333e767a17
SHA25664baeebbf072ee1995a696b055beb290ec8adcf85a5104b3fe9c87d1ae5e2bd0
SHA5125653fb12d3d90d633be01720059339fa447c0e186d279db83e39025fd8b6bf0da8529a638c27151c0b3ca2ef3cd4f9c9efa85416fe35ec0c678facb2e4e0d5e6
-
Filesize
428B
MD52131f4290ef7cbf1a98893ed6b405662
SHA1ee8fe2b9cf8c1df5d9379bc85720773cc860eec1
SHA2561c0a0a78b4e97e4751095a014120b1252ebfbb74c3afc6f9b8003965e2234827
SHA512f93cf58be0862f6b8201db2834d4110cb7359122566e442e665811fd2d9a8524973dcc6fb94b18534a13e86d0c9e1c76b417f39f93bbb2de6358c642bfd30e51