Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
Resource
win10v2004-20241007-en
General
-
Target
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe
-
Size
465KB
-
MD5
e4a4fc96188310b7b07e7c0525b5c0aa
-
SHA1
81185dd73f2e042a947a1bf77f429de08778b6e9
-
SHA256
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3
-
SHA512
72d27e3019954c3c98b8912842c42ee1fe5af5ca7b9717f7ee8bb61f16528c374f883f4b9697c1805ea59a5e854e4aa53aa6cfe06d87d87b181dd12def7d61d6
-
SSDEEP
12288:HZph8TCfS9dQ1GH4wKcmY8FYkEv+NTjUU1GaJyixE:HZpCTCfS9dQ104wdV8FImTjUYGViS
Malware Config
Extracted
C:\ProgramData\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Signatures
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 22 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Music\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\browse.json d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sqlpdw.xsl d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\cs-cz\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Common Files\System\de-DE\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN086.XML d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\vlc.mo d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pl-pl\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-black_scale-80.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\vlc.mo d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\css\main.css d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\fillandsign.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\nub.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\es-es\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_OEM_Perp-ul-phn.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ul-oob.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\adc_logo.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ul-oob.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\cmm\LINEAR_RGB.pf d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\tr_get.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Retail-ul-phn.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-180.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\uk-ua\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hr-hr\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\TPN.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\VisualElements\SmallLogoDev.png.DATA d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ar-ae\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ul-phn.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer_eula.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fi-fi\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\List.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ko-kr\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessRuntime2019R_PrepidBypass-ul-oob.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_KMS_Client-ppd.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MLModels\autofill_labeling_features.txt.DATA d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\s_filter_18.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\sunec.jar d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_ja_135x40.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_100_percent.pak d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\icons.png d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\zh-tw\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest2-ppd.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ul-phn.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-ae\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTest-ul-oob.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\notice.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\ui-strings.js d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-pl.xrm-ms d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_shared_multi_filetype.svg d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\readme.txt d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exed4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Modifies data under HKEY_USERS 47 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00440075006d00700053007400610063006b002e006c006f0067002e0074006d00700000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00350033006200330039006500380038002d0031003800630034002d0031003100650061002d0061003800310031002d003000300030006400330061006100340036003900320062007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300031002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 56794adc8978dc36e18c1ffc1b4e8860f5cf0190805021cf838cb7e17f8a85ae d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "1" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = cd90cf9e2e99623e60402271d04c161ece5f1ebde56344b113c3113027bed913 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = bc2b44330d2db16ddc5396649588a221b516e6066146e5a00eb9ac015faa5734 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 8ffec0e44d726aaf66cf845b0081cdffb9ffbb2602eaac2b0d2071fd75266994 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = f19e147601381c78a50f2ea87fa6a7832cbd30ada1457a1f08f7fc6938849821 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 8dda6bf2f842fa58b8480c9df0742f6cc0635d6f54e84bba5e142f83981d59a6 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 74cb1443699d9b87de9a72ff0ecd17f0f2379952bba38bb652d165154684bd59 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 7d83d1570b25c7b0179754309f6e13881e8e74e615d78ef3fb734846c0fe4032 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004d006900630072006f0073006f00660074005c00470061006d0065004400560052005c004b006e006f0077006e00470061006d0065004c006900730074002e00620069006e0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = e14b57db32f62f2573baa993b9e641b40f0a5a8139c0085004c2e582c9f63efb d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f005300680061007200650064005c004c006f00670073005c00530079007300740065006d005c00550070006400610074006500530065007300730069006f006e004f0072006300680065007300740072006100740069006f006e002e00620037003100370036003500300064002d0062003500340065002d0034006500390036002d0039003800340036002d006300620061003800380033006500660039006600650034002e0031002e00650074006c0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f005300680061007200650064005c004c006f00670073005c00530079007300740065006d005c0057007500500072006f00760069006400650072002e00360030003200330038003500650031002d0061003400650030002d0034003300340036002d0038003000380030002d003900380064003700300064003700380033006100360065002e0031002e00650074006c0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = c3a8ec252d8de38b0dcc5a98f44fdd436dede7017000997554820c51ca5a4b81 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e0044004100540000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = fcbc0b0dc9f50ecf329efdb9c8b4b30ac1931410f713bb8a02a9b5680f17684f d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = c56a3a3c544224117fe8bf4acfe593e2bff56bc782d7ae020be1d7faf5c48532 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Sequence = "2" d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = aa410bb87d1791fa92832b9a122500ec61ccac7a46deef713b2ff36b18ecd2de d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = bcd16b08011911b363e8f145f1e73cdc874e81731ce5a6d34f4c50e989182ddf d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\Owner = cc0f0000e0ef872bfd3adb01 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = bd35a47e4034a1af61a8b10a813a91303ddc4d7657939be34fa9bdef429bccba d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = adcbc20616780c7d08940fd777ed8703445ed43e776805cf13e7844bc51c593b d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = c8fc60ee0d49be3412ccfab438975dcd701916cf27252b962e8d37c0efeecd39 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = e9671437e3e1198bbfae24f5f9f88c88461d99478108230ee92c201913cb19c2 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 8663ad050415f8f1ae6f2efbb22a4cff05d1ccf2dbc0ae99636b376324acadd8 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c0043006f006e006e0065006300740065006400440065007600690063006500730050006c006100740066006f0072006d005c004c002e00410064006d0069006e005c004100630074006900760069007400690065007300430061006300680065002e006400620000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 02ac95f4fea6be1227d4cbb5ae5549f63bf746092bc87e2eaeb0992261d5456c d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 58cbbbb9b793339a869992952c261bbf60e6c0e6022800613ec03ba655bd1cdc d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700320000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00350033006200330039006500380038002d0031003800630034002d0031003100650061002d0061003800310031002d003000300030006400330061006100340036003900320062007d002e0054004d002e0062006c00660000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = 3789ae06d6d839079b61feefe4a70fd88217742ac3991f301bb916b244644187 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = c53d9aafd3eb4d5e781bddd9c7899455c0c435565aaf783922ee9f2c5b376f5c d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c004e00540055005300450052002e004400410054007b00350033006200330039006500380038002d0031003800630034002d0031003100650061002d0061003800310031002d003000300030006400330061006100340036003900320062007d002e0054004d0043006f006e007400610069006e0065007200300030003000300030003000300030003000300030003000300030003000300030003000300032002e007200650067007400720061006e0073002d006d00730000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f0050007200690076006100740065005c00550070006400610074006500530074006f00720065005c00730074006f00720065002e006400620000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\SessionHash = c03b095fed59413b6b3d1d219a510abb0b399b2063aca285c7cbae7f2b51b6a5 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = f4b808389cc0458917b983cccc6db1b211ca20de601a80b118f716087af0f167 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00550073006500720073005c00410064006d0069006e005c006e00740075007300650072002e006400610074002e004c004f004700310000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFilesHash = 516f60064c6b3dca79b578b650072dc368dadc43f2a06c76d76b287c02755a48 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 43003a005c00500072006f006700720061006d0044006100740061005c00550053004f005300680061007200650064005c004c006f00670073005c00530079007300740065006d005c004d006f00550073006f0043006f007200650057006f0072006b00650072002e00300064003400640031006400660066002d0037003500320036002d0034003300650066002d0062003900340063002d006500630035006200620037006400350030006100360061002e0031002e00650074006c0000000000 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exed4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exepid process 1968 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 1968 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
vssvc.exeWMIC.exedescription pid process Token: SeBackupPrivilege 4652 vssvc.exe Token: SeRestorePrivilege 4652 vssvc.exe Token: SeAuditPrivilege 4652 vssvc.exe Token: SeCreateTokenPrivilege 2008 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2008 WMIC.exe Token: SeIncreaseQuotaPrivilege 2008 WMIC.exe Token: SeSecurityPrivilege 2008 WMIC.exe Token: SeTakeOwnershipPrivilege 2008 WMIC.exe Token: SeLoadDriverPrivilege 2008 WMIC.exe Token: SeSystemtimePrivilege 2008 WMIC.exe Token: SeBackupPrivilege 2008 WMIC.exe Token: SeRestorePrivilege 2008 WMIC.exe Token: SeShutdownPrivilege 2008 WMIC.exe Token: SeSystemEnvironmentPrivilege 2008 WMIC.exe Token: SeUndockPrivilege 2008 WMIC.exe Token: SeManageVolumePrivilege 2008 WMIC.exe Token: 31 2008 WMIC.exe Token: 32 2008 WMIC.exe Token: SeCreateTokenPrivilege 2008 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2008 WMIC.exe Token: SeIncreaseQuotaPrivilege 2008 WMIC.exe Token: SeSecurityPrivilege 2008 WMIC.exe Token: SeTakeOwnershipPrivilege 2008 WMIC.exe Token: SeLoadDriverPrivilege 2008 WMIC.exe Token: SeSystemtimePrivilege 2008 WMIC.exe Token: SeBackupPrivilege 2008 WMIC.exe Token: SeRestorePrivilege 2008 WMIC.exe Token: SeShutdownPrivilege 2008 WMIC.exe Token: SeSystemEnvironmentPrivilege 2008 WMIC.exe Token: SeUndockPrivilege 2008 WMIC.exe Token: SeManageVolumePrivilege 2008 WMIC.exe Token: 31 2008 WMIC.exe Token: 32 2008 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.execmd.exedescription pid process target process PID 4044 wrote to memory of 3328 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 4044 wrote to memory of 3328 4044 d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe cmd.exe PID 3328 wrote to memory of 2008 3328 cmd.exe WMIC.exe PID 3328 wrote to memory of 2008 3328 cmd.exe WMIC.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"C:\Users\Admin\AppData\Local\Temp\d4de7d7990114c51056afeedb827d880549d5761aac6bdef0f14cb17c25103b3.exe"2⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{145B8E8C-89AF-4739-8955-B50BF2E20CA2}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{145B8E8C-89AF-4739-8955-B50BF2E20CA2}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4652
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e2eac7c74ec79698df9a4e152dd201b6
SHA1f2d411a6afc3cd82eeda192abe5d115c0a7676b8
SHA256e670bcbf0a5fb3cee6539efb35774067d4401a157f30bbec40bc05dc91b48162
SHA512ebece91a27fee5484614a49863be889b4a2b8ffe3a05ae3b2a3a458f49f76ee4e89aad28de43feb2f5cdc93c93cee8e9bf6907b3e83ad76c3d7440913e3eaa37
-
Filesize
3KB
MD5ba6ced7b94d17f40e7a7b318f56f8990
SHA1af2738dd775d8fa885878071bd6a0c8d656c3b84
SHA256a5daaae1c924afb20d8ea588bb9337b2a360383f11c051b9bf069f866dd8cc6f
SHA5125a5f3232a153a08891d448451573db146857b2b9869fe1e9de3aa29d3e96199e1e685e4b3e117973c25316adab4b8f6b9103316f9af811300ee337faf583105b