Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win10v2004-20241007-en
General
-
Target
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
-
Size
465KB
-
MD5
e4a4fc96188310b7b07e7c0525b5c0aa
-
SHA1
81185dd73f2e042a947a1bf77f429de08778b6e9
-
SHA256
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3
-
SHA512
72d27e3019954c3c98b8912842c42ee1fe5af5ca7b9717f7ee8bb61f16528c374f883f4b9697c1805ea59a5e854e4aa53aa6cfe06d87d87b181dd12def7d61d6
-
SSDEEP
12288:HZph8TCfS9dQ1GH4wKcmY8FYkEv+NTjUU1GaJyixE:HZpCTCfS9dQ104wdV8FImTjUYGViS
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Signatures
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Drops desktop.ini file(s) 22 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Users\Admin\Videos\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Music\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado25.tlb d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Hardcover.eftx d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLFLTR.DAT d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WPFT632.CNV d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Groove Starter Template.xsn d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSQRY32.CHM d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Essential.thmx d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSO0127.ACL d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.htm d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03011U.BMP d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\METCONV.TXT d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099181.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107042.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152568.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0215210.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285926.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\LICENSE d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107192.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0183574.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_08.MID d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00390_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187881.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387604.JPG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jni.h d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\MSWDS_FR.LEX d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00694_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationLeft_ButtonGraphic.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08808_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01434_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00542_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02738U.BMP d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00191_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\InstallDeny.pcx d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195254.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00255_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02282_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02957_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Waveform.xml d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circle_glass_Thumbnail.bmp d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107514.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304853.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02423_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ACTIP10.HLP d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382836.JPG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00286_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_COL.HXT d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD10890_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01630_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199609.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02262_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03012U.BMP d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\System\ado\msado26.tlb d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Slipstream.thmx d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Modifies data under HKEY_USERS 29 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300032002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c004d006900630072006f0073006f00660074005c004f006600660069006300650053006f00660074007700610072006500500072006f00740065006300740069006f006e0050006c006100740066006f0072006d005c0074006f006b0065006e0073002e0064006100740000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = b140312f73e380606282afe8baf90f5a4c641875d865be8a06e4d5e5b9894e0f d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Owner = 500b0000c00cf6b0883adb01 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = da996591622822ef9d381f431bda816cc8d95f18671d1331346e006d08cca030 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 41a628a23f8a92e300b670faf2b822ae201240de0e34ff2a77d22ecb758d558f d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 86cbaa79f76a8720e4122f016c77407505a789950e39cbdf6adb5d00e9998753 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700310000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "1" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 0ab06a885933549993986588673019c5a87bf7957bf66a5ef3dd2bf35d97c87a d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300031002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 8e4af2ff28dfecfaeb99ef65495dbe01a448131097817bab904832981dd823ba d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 6ca2920ff6755e4cc67faa29a28a0cadae9c045e668a9999d94b5d51de6347ae d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 4d6f84aea09324595aee30bb77b58595f64a63364a9ee2b7baf9bf0a8c2eeb07 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 641621bc8570222b7c7492b5056c2b373b0a1fc2803e5d5cb692e37aa50e46e1 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e0044004100540000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = a3ad44fb4ae8b36bc15461a95f0860817e7aba2a047808dad167069cd494d055 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700320000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 87516541fefb601a4492e11cb710559377a1f9e54ea4bae3b7bcf58b92e12be2 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = e165abef54d87d1ddbf0826058659c1ebaaa97f85df27154ff02f645a53a2665 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "2" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 07d5cbf522062fe689bca1847a0b3608d44c130c8a54d9542ee8ab0943200856 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d002e0062006c00660000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 0e2e0453c0098160c7e3a7173072c903807a58e31f59d727a376cc91e1d4261b d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exed4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exepid process 3064 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exeWMIC.exeWMIC.exeWMIC.exedescription pid process Token: SeBackupPrivilege 2880 vssvc.exe Token: SeRestorePrivilege 2880 vssvc.exe Token: SeAuditPrivilege 2880 vssvc.exe Token: SeCreateTokenPrivilege 2152 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2152 WMIC.exe Token: SeIncreaseQuotaPrivilege 2152 WMIC.exe Token: SeSecurityPrivilege 2152 WMIC.exe Token: SeTakeOwnershipPrivilege 2152 WMIC.exe Token: SeLoadDriverPrivilege 2152 WMIC.exe Token: SeSystemtimePrivilege 2152 WMIC.exe Token: SeBackupPrivilege 2152 WMIC.exe Token: SeRestorePrivilege 2152 WMIC.exe Token: SeShutdownPrivilege 2152 WMIC.exe Token: SeSystemEnvironmentPrivilege 2152 WMIC.exe Token: SeUndockPrivilege 2152 WMIC.exe Token: SeManageVolumePrivilege 2152 WMIC.exe Token: 31 2152 WMIC.exe Token: 32 2152 WMIC.exe Token: SeCreateTokenPrivilege 2152 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2152 WMIC.exe Token: SeIncreaseQuotaPrivilege 2152 WMIC.exe Token: SeSecurityPrivilege 2152 WMIC.exe Token: SeTakeOwnershipPrivilege 2152 WMIC.exe Token: SeLoadDriverPrivilege 2152 WMIC.exe Token: SeSystemtimePrivilege 2152 WMIC.exe Token: SeBackupPrivilege 2152 WMIC.exe Token: SeRestorePrivilege 2152 WMIC.exe Token: SeShutdownPrivilege 2152 WMIC.exe Token: SeSystemEnvironmentPrivilege 2152 WMIC.exe Token: SeUndockPrivilege 2152 WMIC.exe Token: SeManageVolumePrivilege 2152 WMIC.exe Token: 31 2152 WMIC.exe Token: 32 2152 WMIC.exe Token: SeCreateTokenPrivilege 2212 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2212 WMIC.exe Token: SeIncreaseQuotaPrivilege 2212 WMIC.exe Token: SeSecurityPrivilege 2212 WMIC.exe Token: SeTakeOwnershipPrivilege 2212 WMIC.exe Token: SeLoadDriverPrivilege 2212 WMIC.exe Token: SeSystemtimePrivilege 2212 WMIC.exe Token: SeBackupPrivilege 2212 WMIC.exe Token: SeRestorePrivilege 2212 WMIC.exe Token: SeShutdownPrivilege 2212 WMIC.exe Token: SeSystemEnvironmentPrivilege 2212 WMIC.exe Token: SeUndockPrivilege 2212 WMIC.exe Token: SeManageVolumePrivilege 2212 WMIC.exe Token: 31 2212 WMIC.exe Token: 32 2212 WMIC.exe Token: SeCreateTokenPrivilege 2212 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2212 WMIC.exe Token: SeIncreaseQuotaPrivilege 2212 WMIC.exe Token: SeSecurityPrivilege 2212 WMIC.exe Token: SeTakeOwnershipPrivilege 2212 WMIC.exe Token: SeLoadDriverPrivilege 2212 WMIC.exe Token: SeSystemtimePrivilege 2212 WMIC.exe Token: SeBackupPrivilege 2212 WMIC.exe Token: SeRestorePrivilege 2212 WMIC.exe Token: SeShutdownPrivilege 2212 WMIC.exe Token: SeSystemEnvironmentPrivilege 2212 WMIC.exe Token: SeUndockPrivilege 2212 WMIC.exe Token: SeManageVolumePrivilege 2212 WMIC.exe Token: 31 2212 WMIC.exe Token: 32 2212 WMIC.exe Token: SeCreateTokenPrivilege 1980 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2896 wrote to memory of 2712 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2712 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2712 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2712 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2712 wrote to memory of 2152 2712 cmd.exe WMIC.exe PID 2712 wrote to memory of 2152 2712 cmd.exe WMIC.exe PID 2712 wrote to memory of 2152 2712 cmd.exe WMIC.exe PID 2896 wrote to memory of 664 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 664 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 664 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 664 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 664 wrote to memory of 2212 664 cmd.exe WMIC.exe PID 664 wrote to memory of 2212 664 cmd.exe WMIC.exe PID 664 wrote to memory of 2212 664 cmd.exe WMIC.exe PID 2896 wrote to memory of 3000 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 3000 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 3000 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 3000 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 3000 wrote to memory of 1980 3000 cmd.exe WMIC.exe PID 3000 wrote to memory of 1980 3000 cmd.exe WMIC.exe PID 3000 wrote to memory of 1980 3000 cmd.exe WMIC.exe PID 2896 wrote to memory of 384 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 384 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 384 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 384 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 384 wrote to memory of 2172 384 cmd.exe WMIC.exe PID 384 wrote to memory of 2172 384 cmd.exe WMIC.exe PID 384 wrote to memory of 2172 384 cmd.exe WMIC.exe PID 2896 wrote to memory of 2532 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2532 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2532 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2532 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2532 wrote to memory of 1696 2532 cmd.exe WMIC.exe PID 2532 wrote to memory of 1696 2532 cmd.exe WMIC.exe PID 2532 wrote to memory of 1696 2532 cmd.exe WMIC.exe PID 2896 wrote to memory of 2392 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2392 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2392 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2392 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2392 wrote to memory of 2964 2392 cmd.exe WMIC.exe PID 2392 wrote to memory of 2964 2392 cmd.exe WMIC.exe PID 2392 wrote to memory of 2964 2392 cmd.exe WMIC.exe PID 2896 wrote to memory of 2860 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2860 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2860 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2860 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2860 wrote to memory of 3020 2860 cmd.exe WMIC.exe PID 2860 wrote to memory of 3020 2860 cmd.exe WMIC.exe PID 2860 wrote to memory of 3020 2860 cmd.exe WMIC.exe PID 2896 wrote to memory of 2440 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2440 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2440 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2440 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2440 wrote to memory of 2312 2440 cmd.exe WMIC.exe PID 2440 wrote to memory of 2312 2440 cmd.exe WMIC.exe PID 2440 wrote to memory of 2312 2440 cmd.exe WMIC.exe PID 2896 wrote to memory of 2992 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2992 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2992 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2896 wrote to memory of 2992 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2992 wrote to memory of 588 2992 cmd.exe WMIC.exe PID 2992 wrote to memory of 588 2992 cmd.exe WMIC.exe PID 2992 wrote to memory of 588 2992 cmd.exe WMIC.exe PID 2896 wrote to memory of 592 2896 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{096796F1-2149-464D-ACBB-03B5C167CC17}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{096796F1-2149-464D-ACBB-03B5C167CC17}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F892CD27-E23E-4515-87B3-8F8F21B9D9C9}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F892CD27-E23E-4515-87B3-8F8F21B9D9C9}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{32A7D592-2541-4316-9CBA-F77BBB019FC7}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{32A7D592-2541-4316-9CBA-F77BBB019FC7}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4322938B-E7D8-427C-9899-D8612A7A139D}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4322938B-E7D8-427C-9899-D8612A7A139D}'" delete4⤵PID:2172
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{40688390-1826-4849-9E8B-083873315E70}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{40688390-1826-4849-9E8B-083873315E70}'" delete4⤵PID:1696
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D6A7C606-A48C-4CE7-8835-04E81D7912DF}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D6A7C606-A48C-4CE7-8835-04E81D7912DF}'" delete4⤵PID:2964
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B7D60577-15EA-4C7B-BE0B-C497017039D0}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B7D60577-15EA-4C7B-BE0B-C497017039D0}'" delete4⤵PID:3020
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{BB1A373F-4301-4C27-8A7E-482A72564628}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{BB1A373F-4301-4C27-8A7E-482A72564628}'" delete4⤵PID:2312
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1E5A9288-DEC5-4D8F-9600-23F03936D215}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1E5A9288-DEC5-4D8F-9600-23F03936D215}'" delete4⤵PID:588
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{823E0A24-E393-468F-B11F-85124724B858}'" delete3⤵PID:592
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{823E0A24-E393-468F-B11F-85124724B858}'" delete4⤵PID:2512
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0A4CD207-FB7C-469F-9F7A-80D1BD4DFCFA}'" delete3⤵PID:2428
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0A4CD207-FB7C-469F-9F7A-80D1BD4DFCFA}'" delete4⤵PID:2488
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F64151A7-2488-4B24-9A4D-D03E41D3CAC7}'" delete3⤵PID:2384
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F64151A7-2488-4B24-9A4D-D03E41D3CAC7}'" delete4⤵PID:2236
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A40927C3-0F96-44E1-B89A-47B10F36A0E6}'" delete3⤵PID:1904
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A40927C3-0F96-44E1-B89A-47B10F36A0E6}'" delete4⤵PID:1292
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1C5B9C0E-6DDC-430F-9959-B1C7BC19DF79}'" delete3⤵PID:704
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1C5B9C0E-6DDC-430F-9959-B1C7BC19DF79}'" delete4⤵PID:2548
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0E322147-06DC-47C3-8F71-A37CFEE921A2}'" delete3⤵PID:2272
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0E322147-06DC-47C3-8F71-A37CFEE921A2}'" delete4⤵PID:652
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A273B3E7-11AE-4B3C-8748-31324B458734}'" delete3⤵PID:1080
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A273B3E7-11AE-4B3C-8748-31324B458734}'" delete4⤵PID:2368
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{41A049F0-5D90-4970-A62C-95EBA2C69DB2}'" delete3⤵PID:2584
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{41A049F0-5D90-4970-A62C-95EBA2C69DB2}'" delete4⤵PID:1116
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8E1A70E3-B89F-4CF4-95D7-7FBA75E2544E}'" delete3⤵PID:1740
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8E1A70E3-B89F-4CF4-95D7-7FBA75E2544E}'" delete4⤵PID:2188
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54ca7b5f6971bb9fd1b78b77a28a1ec06
SHA103ec6fe0224da8ab08130cc9b99d6072861a3853
SHA25634300e0aaa9d55c1d41426ee2f39fb3216e10f699228e20ade5972b38fc22e1a
SHA51291f99a037aaec17077a7a47794492a2cff2964e000d3782736bb35308e1522b71f8ad0f62d599c89be66ee2ce54771b155a7f4683bd0572d686bcfa5ceb60e41
-
Filesize
7KB
MD5967517a5f4d342de103c13efc7f17e08
SHA1302c5d67901c3684aaf94b8643d1122ca6fff3b9
SHA256066ef0600c987dbb1f2b6e10a328d4b55c13e27fc0f3d12861cf8e918d84e851
SHA51274865b6b6f56f53989f222d5df5b14c4b0a96d823100c36303a52c2d15feacc835a48431a1a91ff628ff8b25c67fc359e673684df41483953b7cb69e560123d0