Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe
Resource
win10v2004-20240802-en
General
-
Target
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe
-
Size
146KB
-
MD5
059175be5681a633190cd9631e2975f6
-
SHA1
fb4ad5d21f0d8c6755eb4addba0ac288bd2574b6
-
SHA256
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666
-
SHA512
3a6c7667161ad9122785b6ef988d59f473b517e32e93c786c6a551d4c631f0ca82de1d262a056928935f05aa6723a7fe983158011e53042743194899c3e912e7
-
SSDEEP
3072:sdjFOoTVq4m0zRilymyU3pQuz1T5SKiVi6:4M2ZmEoL3Cu6K
Malware Config
Extracted
C:\Program Files\7-Zip\!!readme!!!.txt
underground
http://undgrddapc4reaunnrdrmnagvdelqfvmgycuvilgwb5uxm25sxawaoqd.onion/
Signatures
-
Underground Team
Underground Team is a ransomware first seen in July 2023 that is primarily distriuted via exploting vulnerabilities.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops desktop.ini file(s) 40 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\dataservices\DESKTOP.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\links\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\spidersolitaire\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\stationery\Desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\music\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\videos\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\f:\$recycle.bin\s-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\Desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\hearts\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\documents\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\libraries\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\purble place\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\pictures\sample pictures\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\videos\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\searches\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\music\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\mahjong\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\recorded tv\sample media\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\$recycle.bin\s-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\downloads\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\recorded tv\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\videos\sample videos\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\freecell\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\favorites\links for united states\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\music\sample music\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\documents\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\desktop\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\pictures\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\chess\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\solitaire\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft analysis services\as oledb\10\cartridges\as90.xsl d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows media player\en-us\wmpnssui.dll.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\adobe\reader 9.0\resource\linguistics\providers\proximity\11.00\usa37.hyp d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\Customer Support.fdt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\weather.gadget\images\btn_close_over.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\jre\README.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-loaders_ja.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jre7\lib\zi\asia\Sakhalin d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0285808.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\NA01356_.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\document themes 14\theme effects\Pushpin.eftx d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\pubftscm\SCHEME04.css d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft visual studio 8\common7\ide\vsta\itemtemplates\csharp\1033\MDIParent.zip d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\jre\lib\zi\systemv\HST10 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-multiview.xml d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jre7\lib\zi\europe\Copenhagen d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows journal\de-de\Journal.exe.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows sidebar\gadgets\cpu.gadget\drag.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\media\office14\bullets\BD14794_.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\ENVELOPR.DLL.idx_dll d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\weather.gadget\images\docked_black_moon-waning-crescent.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows media player\it-it\wmpnetwk.exe.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows sidebar\gadgets\weather.gadget\images\undocked_black_moon-waxing-crescent.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms3\formsstyles\swirl\tab_on.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\Installed_schemas14.xss d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\mahjong\fr-fr\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0105398.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms\VIEW.css d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\weather.gadget\images\35.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\weather.gadget\images\search_background.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\meta-inf\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\spidersolitaire\it-it\SpiderSolitaire.exe.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\videolan\vlc\lua\http\dialogs\create_stream.html d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0089992.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0099176.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms\fieldtypepreview\StaticText.jpg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms4\button_mid.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\jre\lib\zi\america\Guyana d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_ja.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\videolan\vlc\locale\fr\lc_messages\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File created \??\c:\program files\videolan\vlc\locale\zu\lc_messages\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows mail\fr-fr\WinMail.exe.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File created \??\c:\program files (x86)\common files\microsoft shared\office14\office setup controller\infopath.en-us\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\grooveforms5\formsstyles\Earthy.css d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jre7\lib\zi\asia\Omsk d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows defender\ja-jp\MsMpRes.dll.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\PE02267_.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms4\formsstyles\brightyellow\TAB_ON.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\clock.gadget\images\novelty_m.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\common files\system\msadc\en-us\msadcor.dll.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\dvd maker\shared\dvdstyles\vignette\1047x576black.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File created \??\c:\program files\java\jre7\lib\zi\europe\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File created \??\c:\program files\microsoft games\minesweeper\it-it\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\mozilla firefox\platform.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\SO02252_.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\forms\1033\TASKDEC.cfg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows mail\en-us\msoeres.dll.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\dvd maker\shared\dvdstyles\WhiteDot.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\jre\lib\zi\america\Los_Angeles d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jre7\lib\jfr.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows sidebar\gadgets\slideshow.gadget\de-de\css\slideShow.css d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\document themes 14\theme effects\Slipstream.eftx d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\media\office14\lines\BD21309_.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\dvd maker\shared\dvdstyles\scene_button_style_default_Thumbnail.bmp d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2604 vssadmin.exe 2588 vssadmin.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2836 reg.exe 2100 reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2928 vssvc.exe Token: SeRestorePrivilege 2928 vssvc.exe Token: SeAuditPrivilege 2928 vssvc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 280 wrote to memory of 2588 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 29 PID 280 wrote to memory of 2588 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 29 PID 280 wrote to memory of 2588 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 29 PID 280 wrote to memory of 2836 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 31 PID 280 wrote to memory of 2836 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 31 PID 280 wrote to memory of 2836 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 31 PID 280 wrote to memory of 2744 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 33 PID 280 wrote to memory of 2744 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 33 PID 280 wrote to memory of 2744 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 33 PID 2744 wrote to memory of 2800 2744 net.exe 35 PID 2744 wrote to memory of 2800 2744 net.exe 35 PID 2744 wrote to memory of 2800 2744 net.exe 35 PID 280 wrote to memory of 2604 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 39 PID 280 wrote to memory of 2604 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 39 PID 280 wrote to memory of 2604 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 39 PID 280 wrote to memory of 2100 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 41 PID 280 wrote to memory of 2100 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 41 PID 280 wrote to memory of 2100 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 41 PID 280 wrote to memory of 2372 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 42 PID 280 wrote to memory of 2372 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 42 PID 280 wrote to memory of 2372 280 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 42 PID 2372 wrote to memory of 1624 2372 net.exe 45 PID 2372 wrote to memory of 1624 2372 net.exe 45 PID 2372 wrote to memory of 1624 2372 net.exe 45 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe"C:\Users\Admin\AppData\Local\Temp\d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2588
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services / v MaxDisconnectionTime / t REG_DWORD / d 1209600000 / f2⤵
- Modifies registry key
PID:2836
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop MSSQLSERVER /f /m2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /f /m3⤵PID:2800
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2604
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services / v MaxDisconnectionTime / t REG_DWORD / d 1209600000 / f2⤵
- Modifies registry key
PID:2100
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop MSSQLSERVER /f /m2⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /f /m3⤵PID:1624
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5138279c8f0163f97e43be9764db21a86
SHA1f95395e97a0668fb0770fbdf1fe0f2aa23398ed2
SHA256ea63e6798b94e184ce486048867abfd0f0fd2268c19909d5251dc07b137208f1
SHA5124d64f91ed7dedc6e1c6abe99b8fc110802ff52505a1bb8ce8f9c36378cb12dcce5aff45914220cba3026b3d4a089bc96499ac5979c99ce5e2c5ad347c8ad588a