Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe
Resource
win10v2004-20240802-en
General
-
Target
da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe
-
Size
511KB
-
MD5
3d9ff7ab008e83fa73805d2fb279b5e1
-
SHA1
ab25c30a8afd284f407b38282a54ccc4405f7ae4
-
SHA256
da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a
-
SHA512
9813558af0585c842f5048174ab7c97f2fc18e6bc28dddec3d485142939f036a32e1017bf8bd9fe6e84851100dbe3f0adb969d8547db93ff027473cea2c0a47f
-
SSDEEP
3072:ya23a5c8ZAdXWY7s/OJpAGiVBzoCeRZdxOnHiF2GBh3RkiBRK90fTXc:ya23a5c8Z88/Yad7e2uHP3K0c
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.top/
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files (x86)\desktop.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe -
Drops file in Program Files directory 54 IoCs
description ioc Process File opened for modification C:\Program Files\ResolveUninstall.mpv2 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\Internet Explorer\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\defaultagent.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\7-Zip\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.cfg da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\JoinConvert.m4v da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\StepStart.cr2 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\Accessible.tlb da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\RequestDismount.mp4 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\UseTrace.lock da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\soniccolorconverter.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\7-Zip\License.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\Eurosti.TTF da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\SecretST.TTF da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\omni.ja da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\OutConfirm.xps da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Internet Explorer\ie9props.propdesc da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files (x86)\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.cpu.xml da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\install.log da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\InitializeSkip.DVR da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\7-Zip\7z.sfx da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\Microsoft Office\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\Mozilla Firefox\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\7-Zip\descript.ion da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\offset.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\installation_telemetry.json da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\RepairMount.mpe da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\Common Files\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\Java\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files (x86)\desktop.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\DVD Maker\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\directshowtap.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\Google\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\ApproveProtect.wax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsource.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\sonicsptransform.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\locale.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\ImportNew.dib da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\7-Zip\History.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\audiodepthconverter.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File created C:\Program Files\Microsoft Games\readme.txt da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\application.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\Mozilla Firefox\defaultagent_localized.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\desktop.ini da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\bod_r.TTF da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\fieldswitch.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsink.ax da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2580 3036 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 1684 vssvc.exe Token: SeRestorePrivilege 1684 vssvc.exe Token: SeAuditPrivilege 1684 vssvc.exe Token: SeIncreaseQuotaPrivilege 3000 WMIC.exe Token: SeSecurityPrivilege 3000 WMIC.exe Token: SeTakeOwnershipPrivilege 3000 WMIC.exe Token: SeLoadDriverPrivilege 3000 WMIC.exe Token: SeSystemProfilePrivilege 3000 WMIC.exe Token: SeSystemtimePrivilege 3000 WMIC.exe Token: SeProfSingleProcessPrivilege 3000 WMIC.exe Token: SeIncBasePriorityPrivilege 3000 WMIC.exe Token: SeCreatePagefilePrivilege 3000 WMIC.exe Token: SeBackupPrivilege 3000 WMIC.exe Token: SeRestorePrivilege 3000 WMIC.exe Token: SeShutdownPrivilege 3000 WMIC.exe Token: SeDebugPrivilege 3000 WMIC.exe Token: SeSystemEnvironmentPrivilege 3000 WMIC.exe Token: SeRemoteShutdownPrivilege 3000 WMIC.exe Token: SeUndockPrivilege 3000 WMIC.exe Token: SeManageVolumePrivilege 3000 WMIC.exe Token: 33 3000 WMIC.exe Token: 34 3000 WMIC.exe Token: 35 3000 WMIC.exe Token: SeIncreaseQuotaPrivilege 3000 WMIC.exe Token: SeSecurityPrivilege 3000 WMIC.exe Token: SeTakeOwnershipPrivilege 3000 WMIC.exe Token: SeLoadDriverPrivilege 3000 WMIC.exe Token: SeSystemProfilePrivilege 3000 WMIC.exe Token: SeSystemtimePrivilege 3000 WMIC.exe Token: SeProfSingleProcessPrivilege 3000 WMIC.exe Token: SeIncBasePriorityPrivilege 3000 WMIC.exe Token: SeCreatePagefilePrivilege 3000 WMIC.exe Token: SeBackupPrivilege 3000 WMIC.exe Token: SeRestorePrivilege 3000 WMIC.exe Token: SeShutdownPrivilege 3000 WMIC.exe Token: SeDebugPrivilege 3000 WMIC.exe Token: SeSystemEnvironmentPrivilege 3000 WMIC.exe Token: SeRemoteShutdownPrivilege 3000 WMIC.exe Token: SeUndockPrivilege 3000 WMIC.exe Token: SeManageVolumePrivilege 3000 WMIC.exe Token: 33 3000 WMIC.exe Token: 34 3000 WMIC.exe Token: 35 3000 WMIC.exe Token: SeIncreaseQuotaPrivilege 2992 WMIC.exe Token: SeSecurityPrivilege 2992 WMIC.exe Token: SeTakeOwnershipPrivilege 2992 WMIC.exe Token: SeLoadDriverPrivilege 2992 WMIC.exe Token: SeSystemProfilePrivilege 2992 WMIC.exe Token: SeSystemtimePrivilege 2992 WMIC.exe Token: SeProfSingleProcessPrivilege 2992 WMIC.exe Token: SeIncBasePriorityPrivilege 2992 WMIC.exe Token: SeCreatePagefilePrivilege 2992 WMIC.exe Token: SeBackupPrivilege 2992 WMIC.exe Token: SeRestorePrivilege 2992 WMIC.exe Token: SeShutdownPrivilege 2992 WMIC.exe Token: SeDebugPrivilege 2992 WMIC.exe Token: SeSystemEnvironmentPrivilege 2992 WMIC.exe Token: SeRemoteShutdownPrivilege 2992 WMIC.exe Token: SeUndockPrivilege 2992 WMIC.exe Token: SeManageVolumePrivilege 2992 WMIC.exe Token: 33 2992 WMIC.exe Token: 34 2992 WMIC.exe Token: 35 2992 WMIC.exe Token: SeIncreaseQuotaPrivilege 2992 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2832 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 33 PID 3036 wrote to memory of 2832 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 33 PID 3036 wrote to memory of 2832 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 33 PID 3036 wrote to memory of 2832 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 33 PID 2832 wrote to memory of 3000 2832 cmd.exe 35 PID 2832 wrote to memory of 3000 2832 cmd.exe 35 PID 2832 wrote to memory of 3000 2832 cmd.exe 35 PID 3036 wrote to memory of 2316 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 36 PID 3036 wrote to memory of 2316 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 36 PID 3036 wrote to memory of 2316 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 36 PID 3036 wrote to memory of 2316 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 36 PID 2316 wrote to memory of 2992 2316 cmd.exe 38 PID 2316 wrote to memory of 2992 2316 cmd.exe 38 PID 2316 wrote to memory of 2992 2316 cmd.exe 38 PID 3036 wrote to memory of 2896 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 39 PID 3036 wrote to memory of 2896 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 39 PID 3036 wrote to memory of 2896 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 39 PID 3036 wrote to memory of 2896 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 39 PID 2896 wrote to memory of 1608 2896 cmd.exe 41 PID 2896 wrote to memory of 1608 2896 cmd.exe 41 PID 2896 wrote to memory of 1608 2896 cmd.exe 41 PID 3036 wrote to memory of 2836 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 42 PID 3036 wrote to memory of 2836 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 42 PID 3036 wrote to memory of 2836 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 42 PID 3036 wrote to memory of 2836 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 42 PID 2836 wrote to memory of 2588 2836 cmd.exe 44 PID 2836 wrote to memory of 2588 2836 cmd.exe 44 PID 2836 wrote to memory of 2588 2836 cmd.exe 44 PID 3036 wrote to memory of 2748 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 45 PID 3036 wrote to memory of 2748 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 45 PID 3036 wrote to memory of 2748 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 45 PID 3036 wrote to memory of 2748 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 45 PID 2748 wrote to memory of 1676 2748 cmd.exe 47 PID 2748 wrote to memory of 1676 2748 cmd.exe 47 PID 2748 wrote to memory of 1676 2748 cmd.exe 47 PID 3036 wrote to memory of 2620 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 48 PID 3036 wrote to memory of 2620 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 48 PID 3036 wrote to memory of 2620 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 48 PID 3036 wrote to memory of 2620 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 48 PID 2620 wrote to memory of 1560 2620 cmd.exe 50 PID 2620 wrote to memory of 1560 2620 cmd.exe 50 PID 2620 wrote to memory of 1560 2620 cmd.exe 50 PID 3036 wrote to memory of 2812 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 51 PID 3036 wrote to memory of 2812 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 51 PID 3036 wrote to memory of 2812 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 51 PID 3036 wrote to memory of 2812 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 51 PID 2812 wrote to memory of 2808 2812 cmd.exe 53 PID 2812 wrote to memory of 2808 2812 cmd.exe 53 PID 2812 wrote to memory of 2808 2812 cmd.exe 53 PID 3036 wrote to memory of 2076 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 54 PID 3036 wrote to memory of 2076 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 54 PID 3036 wrote to memory of 2076 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 54 PID 3036 wrote to memory of 2076 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 54 PID 2076 wrote to memory of 2780 2076 cmd.exe 56 PID 2076 wrote to memory of 2780 2076 cmd.exe 56 PID 2076 wrote to memory of 2780 2076 cmd.exe 56 PID 3036 wrote to memory of 400 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 57 PID 3036 wrote to memory of 400 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 57 PID 3036 wrote to memory of 400 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 57 PID 3036 wrote to memory of 400 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 57 PID 400 wrote to memory of 1660 400 cmd.exe 59 PID 400 wrote to memory of 1660 400 cmd.exe 59 PID 400 wrote to memory of 1660 400 cmd.exe 59 PID 3036 wrote to memory of 1644 3036 da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe 60 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe"C:\Users\Admin\AppData\Local\Temp\da05567a6e292ab184169166ca230edaf3e8e9bc5effcb649901f589105b1b3a.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6BFCA4DD-F833-46C4-8C7A-34E95C2BA98D}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6BFCA4DD-F833-46C4-8C7A-34E95C2BA98D}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4E377BB5-7946-4CC9-B06C-A324542D9B33}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4E377BB5-7946-4CC9-B06C-A324542D9B33}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F41F126A-5EA4-4E10-877E-BFA9AE351D79}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F41F126A-5EA4-4E10-877E-BFA9AE351D79}'" delete3⤵PID:1608
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{13A7411F-E079-4EB9-B759-910BB841EC6D}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{13A7411F-E079-4EB9-B759-910BB841EC6D}'" delete3⤵PID:2588
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{608F4BCA-54A0-49F0-B303-80AC1CBD1CD4}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{608F4BCA-54A0-49F0-B303-80AC1CBD1CD4}'" delete3⤵PID:1676
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A7A697E7-CA15-4B5B-9FDA-1DCF0DACE7C8}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A7A697E7-CA15-4B5B-9FDA-1DCF0DACE7C8}'" delete3⤵PID:1560
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{032B90A4-C853-447C-A88F-A616A1A16CEF}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{032B90A4-C853-447C-A88F-A616A1A16CEF}'" delete3⤵PID:2808
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{61F1A0FC-3C8B-4300-9FF3-C45246E1E778}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{61F1A0FC-3C8B-4300-9FF3-C45246E1E778}'" delete3⤵PID:2780
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B85D3269-615C-49B2-B074-DFBE05B579B5}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B85D3269-615C-49B2-B074-DFBE05B579B5}'" delete3⤵PID:1660
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E9BC02D9-FA78-421F-B720-4BBFB960E0DD}'" delete2⤵PID:1644
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E9BC02D9-FA78-421F-B720-4BBFB960E0DD}'" delete3⤵PID:1144
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C73DB226-6809-4751-ACCA-A4430E07C2D2}'" delete2⤵PID:1828
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C73DB226-6809-4751-ACCA-A4430E07C2D2}'" delete3⤵PID:2952
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1B655D79-AAB3-4069-958C-6DF22ABF6510}'" delete2⤵PID:2912
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1B655D79-AAB3-4069-958C-6DF22ABF6510}'" delete3⤵PID:2220
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E1161CFE-6437-43A9-BBA0-7936376D6009}'" delete2⤵PID:1032
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E1161CFE-6437-43A9-BBA0-7936376D6009}'" delete3⤵PID:316
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{748CC753-6941-4C85-9EC1-B37FB6C910A9}'" delete2⤵PID:1812
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{748CC753-6941-4C85-9EC1-B37FB6C910A9}'" delete3⤵PID:2964
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A84AFF1A-D5B8-4CEE-B0D4-72553726ACAB}'" delete2⤵PID:3024
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A84AFF1A-D5B8-4CEE-B0D4-72553726ACAB}'" delete3⤵PID:1472
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{793EE654-4AF1-454A-B02F-806B14DA0FF0}'" delete2⤵PID:1752
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{793EE654-4AF1-454A-B02F-806B14DA0FF0}'" delete3⤵PID:308
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{77D12B2A-E418-4CAF-8BA1-6BD69F34D1A0}'" delete2⤵PID:2244
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{77D12B2A-E418-4CAF-8BA1-6BD69F34D1A0}'" delete3⤵PID:2128
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2677F393-95CA-43BD-A668-B8F93CCAAB49}'" delete2⤵PID:1708
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2677F393-95CA-43BD-A668-B8F93CCAAB49}'" delete3⤵PID:1876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 17482⤵
- Program crash
PID:2580
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b09421db407d07cecd7aaa502f3d3285
SHA18eabdcbb000e14771f6fefac998eb561195dc940
SHA25695d94695f3c26ca2000a047d2d272a4552d452c8b3e6e3371ac427b3a43db30a
SHA512455e6a0494a640b4079e3b635e6d4311a55af3110f41de2c0e14c6e909d24d9839f123155a7b712012b6cc60838605857565ac7a6571dcef935a8eca7604460b