Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe
Resource
win10v2004-20240802-en
General
-
Target
70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe
-
Size
511KB
-
MD5
add17a96054956ec615befc7cd34d153
-
SHA1
b74bc91e22b2999417c0ac704c9727b91a36f470
-
SHA256
70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c
-
SHA512
6c1976ad2301ef1e12b499c8ed20a29ed113e81c1b32d1e7542da743878b486a1e9aa6b7b41f287e8000013e795f8a3434d4c270f3f4d59bda95609a6c6caeca
-
SSDEEP
3072:/Y2TIW6NmG0jQm78u+aXJzuDyyUmaP/E61VoMU9FLBD9PKigvPXNYzA9QK:/VTIt0GkQ2JziBUma0oVmJDhKkuQ
Malware Config
Extracted
C:\ProgramData\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.best
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (7696) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\Music\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\Videos\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\Documents\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Links\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\desktop.ini 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial1-pl.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\1033\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0409-1000-0000000FF1CE.xml 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\127.0.2651.86.manifest 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reminders_18.svg 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fi-fi\ui-strings.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription4-pl.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_PrepidBypass-ppd.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\unicode.md 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\GRAPH_COL.HXT 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\vlc.mo 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Combine_R_RHP.aapp 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\ui-strings.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ui-strings.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\zh-tw\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Java\jre-1.8\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ul-oob.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ko-kr\ui-strings.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nb-no\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sk-sk\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\VideoLAN\VLC\skins\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\x_2x.png 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PowerPointNaiveBayesCommandRanker.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\ind_prog.gif 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\Java\jre-1.8\lib\ext\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_listview_selected.svg 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sk-sk\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\pkeyconfig-office-client15.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\be_get.svg 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\da-dk\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-il\ui-strings.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\adobe_spinner.gif 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filterselected-dark-hover_32.svg 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\new_icons_retina.png 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\bun.png 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessDemoR_BypassTrial365-ul-oob.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-ppd.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Trust Protection Lists\Mu\Social 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\PlayStore_icon.svg 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgePackages.h 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ESEN\WT61ES.LEX 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\delete.svg 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_reject_18.svg 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\plugin.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-gb\ui-strings.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\cs-cz\ui-strings.js 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\VideoLAN\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription-pl.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Retail-ul-phn.xrm-ms 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\readme.txt 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 3960 vssvc.exe Token: SeRestorePrivilege 3960 vssvc.exe Token: SeAuditPrivilege 3960 vssvc.exe Token: SeIncreaseQuotaPrivilege 912 WMIC.exe Token: SeSecurityPrivilege 912 WMIC.exe Token: SeTakeOwnershipPrivilege 912 WMIC.exe Token: SeLoadDriverPrivilege 912 WMIC.exe Token: SeSystemProfilePrivilege 912 WMIC.exe Token: SeSystemtimePrivilege 912 WMIC.exe Token: SeProfSingleProcessPrivilege 912 WMIC.exe Token: SeIncBasePriorityPrivilege 912 WMIC.exe Token: SeCreatePagefilePrivilege 912 WMIC.exe Token: SeBackupPrivilege 912 WMIC.exe Token: SeRestorePrivilege 912 WMIC.exe Token: SeShutdownPrivilege 912 WMIC.exe Token: SeDebugPrivilege 912 WMIC.exe Token: SeSystemEnvironmentPrivilege 912 WMIC.exe Token: SeRemoteShutdownPrivilege 912 WMIC.exe Token: SeUndockPrivilege 912 WMIC.exe Token: SeManageVolumePrivilege 912 WMIC.exe Token: 33 912 WMIC.exe Token: 34 912 WMIC.exe Token: 35 912 WMIC.exe Token: 36 912 WMIC.exe Token: SeIncreaseQuotaPrivilege 912 WMIC.exe Token: SeSecurityPrivilege 912 WMIC.exe Token: SeTakeOwnershipPrivilege 912 WMIC.exe Token: SeLoadDriverPrivilege 912 WMIC.exe Token: SeSystemProfilePrivilege 912 WMIC.exe Token: SeSystemtimePrivilege 912 WMIC.exe Token: SeProfSingleProcessPrivilege 912 WMIC.exe Token: SeIncBasePriorityPrivilege 912 WMIC.exe Token: SeCreatePagefilePrivilege 912 WMIC.exe Token: SeBackupPrivilege 912 WMIC.exe Token: SeRestorePrivilege 912 WMIC.exe Token: SeShutdownPrivilege 912 WMIC.exe Token: SeDebugPrivilege 912 WMIC.exe Token: SeSystemEnvironmentPrivilege 912 WMIC.exe Token: SeRemoteShutdownPrivilege 912 WMIC.exe Token: SeUndockPrivilege 912 WMIC.exe Token: SeManageVolumePrivilege 912 WMIC.exe Token: 33 912 WMIC.exe Token: 34 912 WMIC.exe Token: 35 912 WMIC.exe Token: 36 912 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3236 wrote to memory of 1036 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 95 PID 3236 wrote to memory of 1036 3236 70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe 95 PID 1036 wrote to memory of 912 1036 cmd.exe 97 PID 1036 wrote to memory of 912 1036 cmd.exe 97 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe"C:\Users\Admin\AppData\Local\Temp\70338cda06c6a4eabb037d06f5a944af4c5d54330282681461b4a7c729a6f12c.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CA4F2488-C812-4D6A-99DF-8A006EE3F21F}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CA4F2488-C812-4D6A-99DF-8A006EE3F21F}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58f6296784a2d2a437c579768503f8737
SHA1937b7bab4c20d01d8c9d324c830a14f73cb534a8
SHA256946ca299d775712a93ca6d5daf44b96c986385a584001bf40730eebe86df9071
SHA512f798844b0b44ee8baeba06caf9ac994bc8ad454a9923894567f04154eeeaccd5a171262bf8d0f69356cbed40356f194bf0d7d069ab3c7ba6741642d1e0b0673d