Analysis
-
max time kernel
123s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win10v2004-20241007-en
General
-
Target
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
-
Size
465KB
-
MD5
e4a4fc96188310b7b07e7c0525b5c0aa
-
SHA1
81185dd73f2e042a947a1bf77f429de08778b6e9
-
SHA256
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3
-
SHA512
72d27e3019954c3c98b8912842c42ee1fe5af5ca7b9717f7ee8bb61f16528c374f883f4b9697c1805ea59a5e854e4aa53aa6cfe06d87d87b181dd12def7d61d6
-
SSDEEP
12288:HZph8TCfS9dQ1GH4wKcmY8FYkEv+NTjUU1GaJyixE:HZpCTCfS9dQ104wdV8FImTjUYGViS
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Signatures
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Drops desktop.ini file(s) 25 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc Process File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Music\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.INF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21348_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Perspective.thmx d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-next-over-select.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287645.JPG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00423_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00129_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00390_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Google\CrashReports\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00262_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALSO98.POC d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Mozilla Firefox\platform.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Internet Explorer\fr-FR\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME39.CSS d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0183198.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185774.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.HXS d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Scene_loop_PAL.wmv d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref.wmv d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prcr.x3d d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01169_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01196_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\APPT.CFG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7ES.LEX d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\CAPSULES.ELM d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00269_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00097_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178632.JPG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21364_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR38F.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Form_StatusImage.jpg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01772_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0148798.JPG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01265U.BMP d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\bear_formatted_rgb6.wmv d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_browse.html d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.felix.gogo.command_0.10.0.v201209301215.jar d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01066_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-border.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14691_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.commons.logging_1.1.1.v201101211721.jar d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099150.JPG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287024.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\FreeSans.ttf d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\Identity-V d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Thatch.dotx d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\javafx-doclet.jar d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00252_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\MMSS.ICO d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierDisableDownArrow.jpg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185790.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309920.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00693_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB_COL.HXC d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Modifies data under HKEY_USERS 36 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = c2dc6752a58b0eacb0f9d9afdcf059937f4aae32f346cce556e11cd05c539bb1 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c004d006900630072006f0073006f00660074005c004e006500740077006f0072006b005c0044006f0077006e006c006f0061006400650072005c0071006d006700720030002e0064006100740000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 96efdeb87b47b1391230062714c1de14a400e59c24129a14b01c74cf7d7847e9 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 2e70324158454e409a93831cc4b096a2ea85108fa11f766a343e6cc2f93d8a9a d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700310000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 8c978950f032ff110d1cfac1ff84d10e7a83fe21ee332269ba3ebf56f4eb6564 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = c93489fc4d9de175d847e4b3323743180fa83df44021096517ebc23e7dc1bbf9 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = bb91466a8f8cd399e00793cea3e7ffd8b1c33da1e13d010d935e52f59cc9d479 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = d7b1f2eed2b49d68b95c5349625540bb784e590782050e159b05710909befcac d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 50b68a6ae25177e16b85e03b501e0bf3c9b5010707458619858c0e9e34e764db d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d002000460069006c00650073005c0043006f006d006d006f006e002000460069006c00650073005c004d006900630072006f0073006f006600740020005300680061007200650064005c004f0046004600490043004500310034005c00430075006c00740075007200650073005c004f00460046004900430045002e004f004400460000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = d020818a622be09ec3038ad214ef6b38b58eccd0a3440eed11a94a71534905bf d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700320000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 5800502454a13256dc4b05db9cc107a2db8abc4614073947167fab9dac54d455 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = b7757ccbf979b85c68142590ca31597c9bcd3687126a2a9af7a6f95a5e7b44c8 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300032002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 5d2c1bd3f7ac031bdba3b284fa3026872fcd800da9f7d8ffdc07b53532bf5610 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c004d006900630072006f0073006f00660074005c004f006600660069006300650053006f00660074007700610072006500500072006f00740065006300740069006f006e0050006c006100740066006f0072006d005c0074006f006b0065006e0073002e0064006100740000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 88c018a91a4ec593f6e250c6e5eb7d7a9a7376d99ca1e91b41a251cce2312e5b d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\Owner = b8080000e08d749f893adb01 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\Sequence = "2" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d002e0062006c00660000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = e110108935dec0b64086137b7d8923065c9f6b3a3d8d4f779916e640e50c55ef d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300031002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 6ae61342b8bf9a576506459c10a86f392aa7da162f9048f5cff4657e45e2fadb d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\Sequence = "1" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = c5a546b6232c718612793432c0cfc9d9866850833b52f1ac3ed9c97ac9d183ba d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e0044004100540000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 24ba2e7865aeefd47a92588778cca72bec3742f964dd2ed62718d852f5380e48 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 7d5b6bd58b1c154a4a4a6b19d22a7529a293bc3a4d1b16bedf5ec1a1f24dc8cc d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exed4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exepid Process 2828 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 480 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exeWMIC.exeWMIC.exeWMIC.exedescription pid Process Token: SeBackupPrivilege 2584 vssvc.exe Token: SeRestorePrivilege 2584 vssvc.exe Token: SeAuditPrivilege 2584 vssvc.exe Token: SeCreateTokenPrivilege 2600 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2600 WMIC.exe Token: SeIncreaseQuotaPrivilege 2600 WMIC.exe Token: SeSecurityPrivilege 2600 WMIC.exe Token: SeTakeOwnershipPrivilege 2600 WMIC.exe Token: SeLoadDriverPrivilege 2600 WMIC.exe Token: SeSystemtimePrivilege 2600 WMIC.exe Token: SeBackupPrivilege 2600 WMIC.exe Token: SeRestorePrivilege 2600 WMIC.exe Token: SeShutdownPrivilege 2600 WMIC.exe Token: SeSystemEnvironmentPrivilege 2600 WMIC.exe Token: SeUndockPrivilege 2600 WMIC.exe Token: SeManageVolumePrivilege 2600 WMIC.exe Token: 31 2600 WMIC.exe Token: 32 2600 WMIC.exe Token: SeCreateTokenPrivilege 2600 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2600 WMIC.exe Token: SeIncreaseQuotaPrivilege 2600 WMIC.exe Token: SeSecurityPrivilege 2600 WMIC.exe Token: SeTakeOwnershipPrivilege 2600 WMIC.exe Token: SeLoadDriverPrivilege 2600 WMIC.exe Token: SeSystemtimePrivilege 2600 WMIC.exe Token: SeBackupPrivilege 2600 WMIC.exe Token: SeRestorePrivilege 2600 WMIC.exe Token: SeShutdownPrivilege 2600 WMIC.exe Token: SeSystemEnvironmentPrivilege 2600 WMIC.exe Token: SeUndockPrivilege 2600 WMIC.exe Token: SeManageVolumePrivilege 2600 WMIC.exe Token: 31 2600 WMIC.exe Token: 32 2600 WMIC.exe Token: SeCreateTokenPrivilege 2220 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2220 WMIC.exe Token: SeIncreaseQuotaPrivilege 2220 WMIC.exe Token: SeSecurityPrivilege 2220 WMIC.exe Token: SeTakeOwnershipPrivilege 2220 WMIC.exe Token: SeLoadDriverPrivilege 2220 WMIC.exe Token: SeSystemtimePrivilege 2220 WMIC.exe Token: SeBackupPrivilege 2220 WMIC.exe Token: SeRestorePrivilege 2220 WMIC.exe Token: SeShutdownPrivilege 2220 WMIC.exe Token: SeSystemEnvironmentPrivilege 2220 WMIC.exe Token: SeUndockPrivilege 2220 WMIC.exe Token: SeManageVolumePrivilege 2220 WMIC.exe Token: 31 2220 WMIC.exe Token: 32 2220 WMIC.exe Token: SeCreateTokenPrivilege 2220 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2220 WMIC.exe Token: SeIncreaseQuotaPrivilege 2220 WMIC.exe Token: SeSecurityPrivilege 2220 WMIC.exe Token: SeTakeOwnershipPrivilege 2220 WMIC.exe Token: SeLoadDriverPrivilege 2220 WMIC.exe Token: SeSystemtimePrivilege 2220 WMIC.exe Token: SeBackupPrivilege 2220 WMIC.exe Token: SeRestorePrivilege 2220 WMIC.exe Token: SeShutdownPrivilege 2220 WMIC.exe Token: SeSystemEnvironmentPrivilege 2220 WMIC.exe Token: SeUndockPrivilege 2220 WMIC.exe Token: SeManageVolumePrivilege 2220 WMIC.exe Token: 31 2220 WMIC.exe Token: 32 2220 WMIC.exe Token: SeCreateTokenPrivilege 2612 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 2232 wrote to memory of 2560 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 34 PID 2232 wrote to memory of 2560 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 34 PID 2232 wrote to memory of 2560 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 34 PID 2232 wrote to memory of 2560 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 34 PID 2560 wrote to memory of 2600 2560 cmd.exe 36 PID 2560 wrote to memory of 2600 2560 cmd.exe 36 PID 2560 wrote to memory of 2600 2560 cmd.exe 36 PID 2232 wrote to memory of 2592 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 37 PID 2232 wrote to memory of 2592 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 37 PID 2232 wrote to memory of 2592 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 37 PID 2232 wrote to memory of 2592 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 37 PID 2592 wrote to memory of 2220 2592 cmd.exe 39 PID 2592 wrote to memory of 2220 2592 cmd.exe 39 PID 2592 wrote to memory of 2220 2592 cmd.exe 39 PID 2232 wrote to memory of 1944 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 40 PID 2232 wrote to memory of 1944 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 40 PID 2232 wrote to memory of 1944 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 40 PID 2232 wrote to memory of 1944 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 40 PID 1944 wrote to memory of 2612 1944 cmd.exe 42 PID 1944 wrote to memory of 2612 1944 cmd.exe 42 PID 1944 wrote to memory of 2612 1944 cmd.exe 42 PID 2232 wrote to memory of 2788 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 43 PID 2232 wrote to memory of 2788 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 43 PID 2232 wrote to memory of 2788 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 43 PID 2232 wrote to memory of 2788 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 43 PID 2788 wrote to memory of 2852 2788 cmd.exe 45 PID 2788 wrote to memory of 2852 2788 cmd.exe 45 PID 2788 wrote to memory of 2852 2788 cmd.exe 45 PID 2232 wrote to memory of 1724 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 46 PID 2232 wrote to memory of 1724 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 46 PID 2232 wrote to memory of 1724 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 46 PID 2232 wrote to memory of 1724 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 46 PID 1724 wrote to memory of 664 1724 cmd.exe 48 PID 1724 wrote to memory of 664 1724 cmd.exe 48 PID 1724 wrote to memory of 664 1724 cmd.exe 48 PID 2232 wrote to memory of 336 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 49 PID 2232 wrote to memory of 336 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 49 PID 2232 wrote to memory of 336 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 49 PID 2232 wrote to memory of 336 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 49 PID 336 wrote to memory of 2020 336 cmd.exe 51 PID 336 wrote to memory of 2020 336 cmd.exe 51 PID 336 wrote to memory of 2020 336 cmd.exe 51 PID 2232 wrote to memory of 556 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 52 PID 2232 wrote to memory of 556 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 52 PID 2232 wrote to memory of 556 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 52 PID 2232 wrote to memory of 556 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 52 PID 556 wrote to memory of 1440 556 cmd.exe 54 PID 556 wrote to memory of 1440 556 cmd.exe 54 PID 556 wrote to memory of 1440 556 cmd.exe 54 PID 2232 wrote to memory of 676 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 55 PID 2232 wrote to memory of 676 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 55 PID 2232 wrote to memory of 676 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 55 PID 2232 wrote to memory of 676 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 55 PID 676 wrote to memory of 1528 676 cmd.exe 57 PID 676 wrote to memory of 1528 676 cmd.exe 57 PID 676 wrote to memory of 1528 676 cmd.exe 57 PID 2232 wrote to memory of 1740 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 58 PID 2232 wrote to memory of 1740 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 58 PID 2232 wrote to memory of 1740 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 58 PID 2232 wrote to memory of 1740 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 58 PID 1740 wrote to memory of 1432 1740 cmd.exe 60 PID 1740 wrote to memory of 1432 1740 cmd.exe 60 PID 1740 wrote to memory of 1432 1740 cmd.exe 60 PID 2232 wrote to memory of 2792 2232 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 61 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2694AF99-FDF7-49F7-B181-A2004D5482B1}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2694AF99-FDF7-49F7-B181-A2004D5482B1}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2A80DE52-B0CB-41B0-9669-313B2599E475}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2A80DE52-B0CB-41B0-9669-313B2599E475}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{73C5C1C0-3F77-45F6-B50F-23BDC2C02E98}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{73C5C1C0-3F77-45F6-B50F-23BDC2C02E98}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2DEACCA9-045C-4866-8437-90AD68CCCB0C}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2DEACCA9-045C-4866-8437-90AD68CCCB0C}'" delete4⤵PID:2852
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{162056E6-9C86-4ED1-836E-5F89AA0EFFBA}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{162056E6-9C86-4ED1-836E-5F89AA0EFFBA}'" delete4⤵PID:664
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E4C33247-29E3-45A6-AD37-56B389A599B4}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E4C33247-29E3-45A6-AD37-56B389A599B4}'" delete4⤵PID:2020
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DCF8E05D-0974-4DAC-888B-3035D8D322A9}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DCF8E05D-0974-4DAC-888B-3035D8D322A9}'" delete4⤵PID:1440
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{85B548A2-CB8A-4CB1-9850-48087069BEAF}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{85B548A2-CB8A-4CB1-9850-48087069BEAF}'" delete4⤵PID:1528
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3088B38E-281C-4CE5-BD17-2833A615E25C}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3088B38E-281C-4CE5-BD17-2833A615E25C}'" delete4⤵PID:1432
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A2E772B6-4BC9-4135-A446-B7056CD0C2E6}'" delete3⤵PID:2792
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A2E772B6-4BC9-4135-A446-B7056CD0C2E6}'" delete4⤵PID:2092
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{09B65AED-511B-48D2-B04C-DBFB47B36371}'" delete3⤵PID:2356
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{09B65AED-511B-48D2-B04C-DBFB47B36371}'" delete4⤵PID:2920
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7CDEB008-C24C-47D4-8207-2D68EBF5A0D0}'" delete3⤵PID:2928
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7CDEB008-C24C-47D4-8207-2D68EBF5A0D0}'" delete4⤵PID:2140
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F3531FB7-3B78-4B74-9F87-BDF5E277A498}'" delete3⤵PID:1080
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F3531FB7-3B78-4B74-9F87-BDF5E277A498}'" delete4⤵PID:2408
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FE562E1E-046A-4042-BCEE-28FCA0DD5DD2}'" delete3⤵PID:1772
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FE562E1E-046A-4042-BCEE-28FCA0DD5DD2}'" delete4⤵PID:2520
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3E5DC812-7A9B-4AAC-9FCA-D404103283B4}'" delete3⤵PID:1704
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3E5DC812-7A9B-4AAC-9FCA-D404103283B4}'" delete4⤵PID:1512
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{51DCF14C-5695-41B4-866E-6E434D914D77}'" delete3⤵PID:2940
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{51DCF14C-5695-41B4-866E-6E434D914D77}'" delete4⤵PID:1340
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{30B1EF98-A88B-4190-A656-8079645E317F}'" delete3⤵PID:2272
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{30B1EF98-A88B-4190-A656-8079645E317F}'" delete4⤵PID:1516
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1A11EC94-9E83-4CCA-96AA-0F67FADCFA7F}'" delete3⤵PID:2956
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1A11EC94-9E83-4CCA-96AA-0F67FADCFA7F}'" delete4⤵PID:1328
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a546eb832a0a9e1d52cfa0d62e7ee8b0
SHA1ef598ad7ed7e43d131665981418164319f27b5f8
SHA25658c55039eb9e3b5a41d875b17e0d3e29be68ca0001fe1aec16336ec747a2a8bd
SHA512c7bbbe9c6ef4ae2b663b26c507db738627bf53a3c3e02ca1c2a84a77b4b68de9910bf16b5256323b7712e6a72a95b54967a5162df8316db25553ed462ab0c982
-
Filesize
4KB
MD5c3f8ec5108e7203ec95a3bc0ac46e903
SHA1f313ef4cf083bda6b75c6e3267f42f5e6ee14d07
SHA2564d0333688581d27b018cf9d99f0af81e78559b3ba58122e6089ac5c577e1f014
SHA512277c2be096da89ba15a968af4b69e88277969360b2e867d88b0f4c2507bcf86e82415569f054409f1d525f191e1556777bb50122c6ca8730cc4ce181136f7b5a