Overview
overview
10Static
static
3lockbit (1).7z
windows7-x64
3lockbit (1).7z
windows10-2004-x64
129.04.exe
windows7-x64
1029.04.exe
windows10-2004-x64
10System Vol...meGuid
windows7-x64
1System Vol...meGuid
windows10-2004-x64
1System Vol...gs.dat
windows7-x64
3System Vol...gs.dat
windows10-2004-x64
3Vacuum_Nan...ockbit
windows7-x64
3Vacuum_Nan...ockbit
windows10-2004-x64
3snap.78N1B...153.gz
windows7-x64
1snap.78N1B...153.gz
windows10-2004-x64
1snap.78N1B...53.tar
windows7-x64
1snap.78N1B...53.tar
windows10-2004-x64
1compass/version
windows7-x64
1compass/version
windows10-2004-x64
1compass/vrmf
windows7-x64
1compass/vrmf
windows10-2004-x64
1data/vpd_cluster
windows7-x64
1data/vpd_cluster
windows10-2004-x64
1dumps/78N1BA9-1.trc
windows7-x64
3dumps/78N1BA9-1.trc
windows10-2004-x64
3dumps/78N1...rc.old
windows7-x64
3dumps/78N1...rc.old
windows10-2004-x64
3dumps/78N1BA9-2.trc
windows7-x64
3dumps/78N1BA9-2.trc
windows10-2004-x64
3dumps/78N1...rc.old
windows7-x64
3dumps/78N1...rc.old
windows10-2004-x64
3dumps/acpo...-1.trc
windows7-x64
3dumps/acpo...-1.trc
windows10-2004-x64
3dumps/acpo...rc.old
windows7-x64
3dumps/acpo...rc.old
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
lockbit (1).7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lockbit (1).7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
29.04.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
29.04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
System Volume Information/IndexerVolumeGuid
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
System Volume Information/IndexerVolumeGuid
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
System Volume Information/WPSettings.dat
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
System Volume Information/WPSettings.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Vacuum_Nanostructuring_Marton.doc.lockbit
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Vacuum_Nanostructuring_Marton.doc.lockbit
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
snap.78N1BA9-1.200421.144153.gz
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
snap.78N1BA9-1.200421.144153.gz
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
snap.78N1BA9-1.200421.144153.tar
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
snap.78N1BA9-1.200421.144153.tar
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
compass/version
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
compass/version
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
compass/vrmf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
compass/vrmf
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
data/vpd_cluster
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
data/vpd_cluster
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
dumps/78N1BA9-1.trc
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
dumps/78N1BA9-1.trc
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
dumps/78N1BA9-1.trc.old
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
dumps/78N1BA9-1.trc.old
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
dumps/78N1BA9-2.trc
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
dumps/78N1BA9-2.trc
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
dumps/78N1BA9-2.trc.old
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
dumps/78N1BA9-2.trc.old
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
dumps/acpower.78N1BA9-1.trc
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
dumps/acpower.78N1BA9-1.trc
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
dumps/acpower.78N1BA9-1.trc.old
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
dumps/acpower.78N1BA9-1.trc.old
Resource
win10v2004-20241007-en
General
-
Target
29.04.exe
-
Size
148KB
-
MD5
a7637dfb6b9408fe020d9333d0ade6dc
-
SHA1
930c34743ab12c80512723db0aa7b8b4762fcc84
-
SHA256
cea3e8a3e541ae4c928c3cd33f6772f1a69746393ac1a5c4575379a09a92d1e1
-
SHA512
a522e3be00f3c32cd318cca7995e0f6f604a0590de3f4c2830920347328d405d178bdd2c2406e3b835cc5e5037e2d2348456b138878644231af94e51fc4b4e94
-
SSDEEP
3072:ym0ROZIL87L1yoklfzGp3XjRaDyZYMqqD/A+lHlC:ypMCL8rpHjRa0qqD/NjC
Malware Config
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbit-decryptor.com/?BD61F8CA9173670AB7ED88EACE22F4EF
http://lockbitks2tvnmwk.onion/?BD61F8CA9173670AB7ED88EACE22F4EF
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 4084 bcdedit.exe 4616 bcdedit.exe -
Renames multiple (14204) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exepid Process 1760 wbadmin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
29.04.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 29.04.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
29.04.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\29.04.exe\"" 29.04.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
29.04.exedescription ioc Process File opened (read-only) \??\F: 29.04.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
29.04.exepid Process 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe -
Drops file in Program Files directory 64 IoCs
Processes:
29.04.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\lib\dt.jar.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\+NewSQLServerConnection.odc.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ms\msipc.dll.mui.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\icons.png.lockbit 29.04.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_ok.gif.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\zh-cn\ui-strings.js.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTrial-ppd.xrm-ms.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WORD_WHATSNEW.XML.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\selector.js.lockbit 29.04.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\jcup.md.lockbit 29.04.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\unlimited\US_export_policy.jar.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-oob.xrm-ms.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ul-oob.xrm-ms.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sqlpdw.xsl.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-ae\ui-strings.js.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\db2v0801.xsl.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-hover_32.svg.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\tr-tr\Restore-My-Files.txt 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\root\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_sv_135x40.svg.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Retail-ppd.xrm-ms.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fr-ma\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\AppStore_icon.svg.lockbit 29.04.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\giflib.md.lockbit 29.04.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\vlc.mo.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\ui-strings.js.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7wre_fr.dub.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-ae\ui-strings.js.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\ui-strings.js.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\circle.cur.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\ui-strings.js.lockbit 29.04.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\vlc.mo.lockbit 29.04.exe File created C:\Program Files\Windows Media Player\it-IT\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\distribute_form.gif.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifestLoc.16.en-us.xml.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Retail-ul-phn.xrm-ms.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\tr-tr\ui-strings.js.lockbit 29.04.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr\default.jfc.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\uk-ua\ui-strings.js.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libffi.md.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL102.XML.lockbit 29.04.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\large_trefoil.png.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\PlayStore_icon.svg.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\es-419_get.svg.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Grace-ppd.xrm-ms.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons_highcontrast.png.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\arrow-right.png.lockbit 29.04.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\Restore-My-Files.txt 29.04.exe File created C:\Program Files\Windows Media Player\Network Sharing\Restore-My-Files.txt 29.04.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\Restore-My-Files.txt 29.04.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui.lockbit 29.04.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\PhotoAcq.dll.mui.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected] 29.04.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\Info2x.png.lockbit 29.04.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\MSFT_PackageManagementSource.schema.mfl.lockbit 29.04.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\word2013.dotx.lockbit 29.04.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
29.04.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29.04.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vds.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 2596 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
29.04.exepid Process 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe 1404 29.04.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
29.04.exevssvc.exeWMIC.exewbengine.exedescription pid Process Token: SeTakeOwnershipPrivilege 1404 29.04.exe Token: SeDebugPrivilege 1404 29.04.exe Token: SeBackupPrivilege 4576 vssvc.exe Token: SeRestorePrivilege 4576 vssvc.exe Token: SeAuditPrivilege 4576 vssvc.exe Token: SeIncreaseQuotaPrivilege 3824 WMIC.exe Token: SeSecurityPrivilege 3824 WMIC.exe Token: SeTakeOwnershipPrivilege 3824 WMIC.exe Token: SeLoadDriverPrivilege 3824 WMIC.exe Token: SeSystemProfilePrivilege 3824 WMIC.exe Token: SeSystemtimePrivilege 3824 WMIC.exe Token: SeProfSingleProcessPrivilege 3824 WMIC.exe Token: SeIncBasePriorityPrivilege 3824 WMIC.exe Token: SeCreatePagefilePrivilege 3824 WMIC.exe Token: SeBackupPrivilege 3824 WMIC.exe Token: SeRestorePrivilege 3824 WMIC.exe Token: SeShutdownPrivilege 3824 WMIC.exe Token: SeDebugPrivilege 3824 WMIC.exe Token: SeSystemEnvironmentPrivilege 3824 WMIC.exe Token: SeRemoteShutdownPrivilege 3824 WMIC.exe Token: SeUndockPrivilege 3824 WMIC.exe Token: SeManageVolumePrivilege 3824 WMIC.exe Token: 33 3824 WMIC.exe Token: 34 3824 WMIC.exe Token: 35 3824 WMIC.exe Token: 36 3824 WMIC.exe Token: SeIncreaseQuotaPrivilege 3824 WMIC.exe Token: SeSecurityPrivilege 3824 WMIC.exe Token: SeTakeOwnershipPrivilege 3824 WMIC.exe Token: SeLoadDriverPrivilege 3824 WMIC.exe Token: SeSystemProfilePrivilege 3824 WMIC.exe Token: SeSystemtimePrivilege 3824 WMIC.exe Token: SeProfSingleProcessPrivilege 3824 WMIC.exe Token: SeIncBasePriorityPrivilege 3824 WMIC.exe Token: SeCreatePagefilePrivilege 3824 WMIC.exe Token: SeBackupPrivilege 3824 WMIC.exe Token: SeRestorePrivilege 3824 WMIC.exe Token: SeShutdownPrivilege 3824 WMIC.exe Token: SeDebugPrivilege 3824 WMIC.exe Token: SeSystemEnvironmentPrivilege 3824 WMIC.exe Token: SeRemoteShutdownPrivilege 3824 WMIC.exe Token: SeUndockPrivilege 3824 WMIC.exe Token: SeManageVolumePrivilege 3824 WMIC.exe Token: 33 3824 WMIC.exe Token: 34 3824 WMIC.exe Token: 35 3824 WMIC.exe Token: 36 3824 WMIC.exe Token: SeBackupPrivilege 1996 wbengine.exe Token: SeRestorePrivilege 1996 wbengine.exe Token: SeSecurityPrivilege 1996 wbengine.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
29.04.execmd.exedescription pid Process procid_target PID 1404 wrote to memory of 2240 1404 29.04.exe 84 PID 1404 wrote to memory of 2240 1404 29.04.exe 84 PID 2240 wrote to memory of 2596 2240 cmd.exe 86 PID 2240 wrote to memory of 2596 2240 cmd.exe 86 PID 2240 wrote to memory of 3824 2240 cmd.exe 89 PID 2240 wrote to memory of 3824 2240 cmd.exe 89 PID 2240 wrote to memory of 4084 2240 cmd.exe 91 PID 2240 wrote to memory of 4084 2240 cmd.exe 91 PID 2240 wrote to memory of 4616 2240 cmd.exe 92 PID 2240 wrote to memory of 4616 2240 cmd.exe 92 PID 2240 wrote to memory of 1760 2240 cmd.exe 93 PID 2240 wrote to memory of 1760 2240 cmd.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\29.04.exe"C:\Users\Admin\AppData\Local\Temp\29.04.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2596
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:4084
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:4616
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:1760
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:912
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:4636
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fab179637ac3e89c770fdd23eedd661c
SHA1a0bf4adb3758fd2db390b923620fd547cc64ee10
SHA256d186d264f4a3b08a73ca4b3d194d37054a7e440750b864c71909f5975b790f19
SHA512505ee86bf0cc928d4ac598edd4b4dd010c86ba9439d4d718688b32fad9ac46f04d35e688e752adcf1758aa8448e0898ea100c86a17833ac45a25c1b6030bdac7