Analysis
-
max time kernel
134s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win10v2004-20241007-en
General
-
Target
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
-
Size
465KB
-
MD5
e4a4fc96188310b7b07e7c0525b5c0aa
-
SHA1
81185dd73f2e042a947a1bf77f429de08778b6e9
-
SHA256
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3
-
SHA512
72d27e3019954c3c98b8912842c42ee1fe5af5ca7b9717f7ee8bb61f16528c374f883f4b9697c1805ea59a5e854e4aa53aa6cfe06d87d87b181dd12def7d61d6
-
SSDEEP
12288:HZph8TCfS9dQ1GH4wKcmY8FYkEv+NTjUU1GaJyixE:HZpCTCfS9dQ104wdV8FImTjUYGViS
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Signatures
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 26 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Music\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\tesselate.x3d d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18217_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Hovd d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02028_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\management.properties d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00910_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR13F.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Merida d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\TAB_ON.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Common Files\System\msadc\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGTOC.DPV d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02503U.BMP d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14983_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Opulent.xml d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME46.CSS d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Phoenix d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00120_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB00760L.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\vlc.mo d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\03_lastfm.luac d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105380.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238333.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaTypewriterRegular.ttf d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Common Files\System\ado\fr-FR\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB01741L.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01563_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-execution.xml d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\SpaceSelector.ico d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_F_COL.HXK d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_it.jar d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0103058.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-ImageMask.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\VelvetRose.css d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIcon.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\vlc.mo d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Vilnius d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Copenhagen d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Back-48.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\eula.rtf d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0292152.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository.nl_ja_4.4.0.v20140623020002.jar d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuala_Lumpur d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02158_.WMF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21337_.GIF d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\background.gif d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382944.JPG d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_SelectionSubpicture.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Modifies data under HKEY_USERS 36 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300032002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c004d006900630072006f0073006f00660074005c004f006600660069006300650053006f00660074007700610072006500500072006f00740065006300740069006f006e0050006c006100740066006f0072006d005c0074006f006b0065006e0073002e0064006100740000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = b21a332a536b5a0bc209962f8c7420a18f4e572ed7bfec884a50d45a01faa5e5 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d002e0062006c00660000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = f71a171a1d8ee469537fa2751822a2984023639317581f2e43553d5bc910b083 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = ffe93650d93eaac194bc57e317e8478e1252a5dff256a0aaa4643a21cbd06940 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 0d7cf2f2b2ae3a9537393c70007335836e21aec68c6a8eb7e1567c769e2b7c9d d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = c810d0e2536ca30e84a24c18eb21e3f53a91fa57c77dfbc627d5faf5d152f925 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = ae145ebeacf00fd91f28e7a54b28319d084a0ec048391483d1e9c9726a04a195 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 271c67c28b60cc552a23bec80ed3e2e9c10656ba2ea3af5d91da62fa18d7bee4 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00300031003600380038003800620064002d0036006300360066002d0031003100640065002d0038006400310064002d003000300031006500300062006300640065003300650063007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300031002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = c01de9218c8991abb3cd239a01ed15113ad060c8c6c0e95322ff2e83711f94a5 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e0044004100540000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = fddd8c1ae041b986a5d1cd0425d3b6a61539d34c5a357a6717d42ae27d9eacfb d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 8b5b7f52669cf4b46191b3626f9f310b1a28a9d2a1bdab4ca6c77bf9a992e145 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d002000460069006c00650073005c0043006f006d006d006f006e002000460069006c00650073005c004d006900630072006f0073006f006600740020005300680061007200650064005c004f0046004600490043004500310034005c00430075006c00740075007200650073005c004f00460046004900430045002e004f004400460000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = a2c2f78dee85c82a845d46b9a0b0caf74d7dffa7be702bcb75373df51264466b d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 061f63bbf0bac8b5cc478da38f57106f6a99adb5d0a1131ea7dce3cc42d74505 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\Sequence = "1" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\Sequence = "2" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 61e42aebf8f7035fc37680e7978b00d266973b1b5d8f2e70085387ce12d5b54e d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = 291b7a46fb592ff7eb17af93a585fe32abd9a0f2500642455625d1063adf6ed1 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c004d006900630072006f0073006f00660074005c004e006500740077006f0072006b005c0044006f0077006e006c006f0061006400650072005c0071006d006700720030002e0064006100740000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\Owner = 8c0a0000d093653afd3adb01 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700310000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = e7e74832b2fbe85d63b73b4110c59d864cd7e5aaab84ab2f12ab6cf76a1ddfbe d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700320000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 921649de05b93ab667050772389b7d888bae65e968cfb180c05256aa861972ef d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\RegFilesHash = 4adb588db7263975c4bb261179fc6c24757c5fadca0e2eba5dc32d9af8351831 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\RestartManager\Session0000\SessionHash = a16549f1a447dfecb335446aa242c0b67f4bd8d72e9f881b22a8cd27dda7bb45 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exed4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exepid process 764 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 476 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exeWMIC.exeWMIC.exeWMIC.exedescription pid process Token: SeBackupPrivilege 2328 vssvc.exe Token: SeRestorePrivilege 2328 vssvc.exe Token: SeAuditPrivilege 2328 vssvc.exe Token: SeCreateTokenPrivilege 1384 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1384 WMIC.exe Token: SeIncreaseQuotaPrivilege 1384 WMIC.exe Token: SeSecurityPrivilege 1384 WMIC.exe Token: SeTakeOwnershipPrivilege 1384 WMIC.exe Token: SeLoadDriverPrivilege 1384 WMIC.exe Token: SeSystemtimePrivilege 1384 WMIC.exe Token: SeBackupPrivilege 1384 WMIC.exe Token: SeRestorePrivilege 1384 WMIC.exe Token: SeShutdownPrivilege 1384 WMIC.exe Token: SeSystemEnvironmentPrivilege 1384 WMIC.exe Token: SeUndockPrivilege 1384 WMIC.exe Token: SeManageVolumePrivilege 1384 WMIC.exe Token: 31 1384 WMIC.exe Token: 32 1384 WMIC.exe Token: SeCreateTokenPrivilege 1384 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1384 WMIC.exe Token: SeIncreaseQuotaPrivilege 1384 WMIC.exe Token: SeSecurityPrivilege 1384 WMIC.exe Token: SeTakeOwnershipPrivilege 1384 WMIC.exe Token: SeLoadDriverPrivilege 1384 WMIC.exe Token: SeSystemtimePrivilege 1384 WMIC.exe Token: SeBackupPrivilege 1384 WMIC.exe Token: SeRestorePrivilege 1384 WMIC.exe Token: SeShutdownPrivilege 1384 WMIC.exe Token: SeSystemEnvironmentPrivilege 1384 WMIC.exe Token: SeUndockPrivilege 1384 WMIC.exe Token: SeManageVolumePrivilege 1384 WMIC.exe Token: 31 1384 WMIC.exe Token: 32 1384 WMIC.exe Token: SeCreateTokenPrivilege 2896 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2896 WMIC.exe Token: SeIncreaseQuotaPrivilege 2896 WMIC.exe Token: SeSecurityPrivilege 2896 WMIC.exe Token: SeTakeOwnershipPrivilege 2896 WMIC.exe Token: SeLoadDriverPrivilege 2896 WMIC.exe Token: SeSystemtimePrivilege 2896 WMIC.exe Token: SeBackupPrivilege 2896 WMIC.exe Token: SeRestorePrivilege 2896 WMIC.exe Token: SeShutdownPrivilege 2896 WMIC.exe Token: SeSystemEnvironmentPrivilege 2896 WMIC.exe Token: SeUndockPrivilege 2896 WMIC.exe Token: SeManageVolumePrivilege 2896 WMIC.exe Token: 31 2896 WMIC.exe Token: 32 2896 WMIC.exe Token: SeCreateTokenPrivilege 2896 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2896 WMIC.exe Token: SeIncreaseQuotaPrivilege 2896 WMIC.exe Token: SeSecurityPrivilege 2896 WMIC.exe Token: SeTakeOwnershipPrivilege 2896 WMIC.exe Token: SeLoadDriverPrivilege 2896 WMIC.exe Token: SeSystemtimePrivilege 2896 WMIC.exe Token: SeBackupPrivilege 2896 WMIC.exe Token: SeRestorePrivilege 2896 WMIC.exe Token: SeShutdownPrivilege 2896 WMIC.exe Token: SeSystemEnvironmentPrivilege 2896 WMIC.exe Token: SeUndockPrivilege 2896 WMIC.exe Token: SeManageVolumePrivilege 2896 WMIC.exe Token: 31 2896 WMIC.exe Token: 32 2896 WMIC.exe Token: SeCreateTokenPrivilege 3036 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2700 wrote to memory of 3000 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 3000 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 3000 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 3000 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 3000 wrote to memory of 1384 3000 cmd.exe WMIC.exe PID 3000 wrote to memory of 1384 3000 cmd.exe WMIC.exe PID 3000 wrote to memory of 1384 3000 cmd.exe WMIC.exe PID 2700 wrote to memory of 1356 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1356 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1356 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1356 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 1356 wrote to memory of 2896 1356 cmd.exe WMIC.exe PID 1356 wrote to memory of 2896 1356 cmd.exe WMIC.exe PID 1356 wrote to memory of 2896 1356 cmd.exe WMIC.exe PID 2700 wrote to memory of 2988 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2988 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2988 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2988 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2988 wrote to memory of 3036 2988 cmd.exe WMIC.exe PID 2988 wrote to memory of 3036 2988 cmd.exe WMIC.exe PID 2988 wrote to memory of 3036 2988 cmd.exe WMIC.exe PID 2700 wrote to memory of 2180 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2180 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2180 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2180 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2180 wrote to memory of 1264 2180 cmd.exe WMIC.exe PID 2180 wrote to memory of 1264 2180 cmd.exe WMIC.exe PID 2180 wrote to memory of 1264 2180 cmd.exe WMIC.exe PID 2700 wrote to memory of 1616 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1616 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1616 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1616 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 1616 wrote to memory of 1564 1616 cmd.exe WMIC.exe PID 1616 wrote to memory of 1564 1616 cmd.exe WMIC.exe PID 1616 wrote to memory of 1564 1616 cmd.exe WMIC.exe PID 2700 wrote to memory of 484 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 484 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 484 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 484 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 484 wrote to memory of 1644 484 cmd.exe WMIC.exe PID 484 wrote to memory of 1644 484 cmd.exe WMIC.exe PID 484 wrote to memory of 1644 484 cmd.exe WMIC.exe PID 2700 wrote to memory of 1216 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1216 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1216 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1216 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 1216 wrote to memory of 2652 1216 cmd.exe WMIC.exe PID 1216 wrote to memory of 2652 1216 cmd.exe WMIC.exe PID 1216 wrote to memory of 2652 1216 cmd.exe WMIC.exe PID 2700 wrote to memory of 2784 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2784 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2784 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 2784 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2784 wrote to memory of 608 2784 cmd.exe WMIC.exe PID 2784 wrote to memory of 608 2784 cmd.exe WMIC.exe PID 2784 wrote to memory of 608 2784 cmd.exe WMIC.exe PID 2700 wrote to memory of 1848 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1848 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1848 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 2700 wrote to memory of 1848 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 1848 wrote to memory of 1700 1848 cmd.exe WMIC.exe PID 1848 wrote to memory of 1700 1848 cmd.exe WMIC.exe PID 1848 wrote to memory of 1700 1848 cmd.exe WMIC.exe PID 2700 wrote to memory of 1416 2700 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C0A7565B-A19F-4402-9B8C-EE58F5677206}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C0A7565B-A19F-4402-9B8C-EE58F5677206}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4EEC8685-DBBC-40B7-83F7-EBE9F961E50A}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4EEC8685-DBBC-40B7-83F7-EBE9F961E50A}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D3EF019B-3827-46D5-AAE6-7A5F9B72E352}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D3EF019B-3827-46D5-AAE6-7A5F9B72E352}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C46025E1-89AE-4E89-A6B2-627BD36BEBA7}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C46025E1-89AE-4E89-A6B2-627BD36BEBA7}'" delete4⤵PID:1264
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7FEB2B6D-C65D-4F8B-96F4-5C290BF1392E}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7FEB2B6D-C65D-4F8B-96F4-5C290BF1392E}'" delete4⤵PID:1564
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{38024B4B-EA00-4E0B-9254-7847544CB184}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{38024B4B-EA00-4E0B-9254-7847544CB184}'" delete4⤵PID:1644
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{070F76DF-8D94-4D9C-8D5E-8288E6D99D33}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{070F76DF-8D94-4D9C-8D5E-8288E6D99D33}'" delete4⤵PID:2652
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0DBC292F-1D3D-47BB-98CD-05C9763CDD70}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0DBC292F-1D3D-47BB-98CD-05C9763CDD70}'" delete4⤵PID:608
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{BFDEA41B-0C5B-4A69-8904-D0D8C8B4BD52}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{BFDEA41B-0C5B-4A69-8904-D0D8C8B4BD52}'" delete4⤵PID:1700
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{661ADE96-9D98-4439-A4A3-21497C149A84}'" delete3⤵PID:1416
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{661ADE96-9D98-4439-A4A3-21497C149A84}'" delete4⤵PID:2148
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{49F9E8B9-5C23-4EFC-922F-403BF3CF1CD8}'" delete3⤵PID:2224
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{49F9E8B9-5C23-4EFC-922F-403BF3CF1CD8}'" delete4⤵PID:2204
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B00B17C0-9080-4AFD-B9FE-5625D3C964B6}'" delete3⤵PID:2020
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B00B17C0-9080-4AFD-B9FE-5625D3C964B6}'" delete4⤵PID:2108
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B42A6924-C6F8-405C-A922-10D4551D692A}'" delete3⤵PID:2132
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B42A6924-C6F8-405C-A922-10D4551D692A}'" delete4⤵PID:2044
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4EE259E2-D2AC-45D1-9714-41C32E03FEA5}'" delete3⤵PID:1536
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4EE259E2-D2AC-45D1-9714-41C32E03FEA5}'" delete4⤵PID:1800
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{06EF4E8E-D39F-475F-AFE4-9F81C5C17F7B}'" delete3⤵PID:928
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{06EF4E8E-D39F-475F-AFE4-9F81C5C17F7B}'" delete4⤵PID:1004
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B30B3BC9-99AA-45F9-A653-DBB54ECA8A3A}'" delete3⤵PID:592
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B30B3BC9-99AA-45F9-A653-DBB54ECA8A3A}'" delete4⤵PID:1712
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{BD7099CD-3DAF-4D00-874E-B6365BD7580B}'" delete3⤵PID:1896
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{BD7099CD-3DAF-4D00-874E-B6365BD7580B}'" delete4⤵PID:1920
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AA251BFA-C949-4FDE-98A2-277792D6DA8E}'" delete3⤵PID:3052
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AA251BFA-C949-4FDE-98A2-277792D6DA8E}'" delete4⤵PID:2064
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f5e818547e1ad8df2b3305703cf022d
SHA1d70b12bda8562a10e0a6ea84c908b49e85b46229
SHA2564f81a2a46025f9e0972bce9df22155545a0ec21bb22e11f4d3f1b8b62e0d74f6
SHA512258707a2c7bb5af0fd11f8d9ab86b0fa746031d26ae6c9e96eee9e81e1c8b285f45fd77c9a457ed27411180740e310acf2770fe85891f8342b27db6f30a23e31
-
Filesize
4KB
MD569428eb801cde345f1a4dfed0507fb4c
SHA154d46e3caff1597b0e791b5b281a1338e85acb7b
SHA256b62310b75fbf9900b9568210fb6cf382d4d647c7678ee5db8bf889ed9d6f58c6
SHA512e25e36bae933dec06cc1509d790968500c471e9877aa60abdf854148f1206077b9297a43e9f1fb1d5a191989a9361ad35f3ab87858a94cea27e762590d9da355