Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe
Resource
win10v2004-20241007-en
General
-
Target
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe
-
Size
465KB
-
MD5
9a218d69ecafe65eae264d2fdb52f1aa
-
SHA1
196c08fbab4119d75afb209a05999ce269ffe3cf
-
SHA256
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9
-
SHA512
33d4cea92b6e4bd6bd96433e7f1d97f0e6461d6f468096d9591c2c78d088ab2de081a7ea4fdbff8fa2941a0a7e4f6e1e940ebcbb2a60309c9157e255699eab84
-
SSDEEP
12288:HZph8TCQS9dQ1GH4wKcmY8FYkEv+NT5XqU6KDBxE:HZpCTCQS9dQ104wdV8FImT5XqiS
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Signatures
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
description ioc Process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\YLJ4V77F\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Music\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\QJELLEL3\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RM4QEUM4\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Links\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\HE9LBEC2\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE_F_COL.HXK d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.UK.XML d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00476_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\THMBNAIL.PNG d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14539_.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECRECL.ICO d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341439.JPG d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152622.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-3 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105292.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02312_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.xml d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGMGPUOptIn.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\ACTIVITY.CFG d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunec.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Helsinki d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-io-ui_zh_CN.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR51F.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME36.CSS d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCDRESPS.ICO d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\preloaded_data.pb d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Sts.css d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Technic.thmx d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FEZIP.POC d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\NOTES.ICO d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Flow.eftx d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jetty.http_8.1.14.v20131031.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata_2.2.0.v20131211-1531.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0214934.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendtoOneNoteFilter.gpd d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\feature.properties d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_zh_CN.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02417_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02276_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBPQT.XML d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Distinctive.dotx d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Dili d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Couture.thmx d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\CalendarToolIconImagesMask.bmp d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\feature.properties d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143750.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14793_.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Whitehorse d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\PREVIEW.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana.css d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dushanbe d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Discussion\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293240.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm.html d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Mahe d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-queries_zh_CN.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\TAB_OFF.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Pushpin.xml d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (str) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (int) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (str) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (int) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted\DefaultIcon d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted\DefaultIcon\ = "C:\\Users\\Public\\icon.ico" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2712 vssvc.exe Token: SeRestorePrivilege 2712 vssvc.exe Token: SeAuditPrivilege 2712 vssvc.exe Token: SeCreateTokenPrivilege 2576 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2576 WMIC.exe Token: SeIncreaseQuotaPrivilege 2576 WMIC.exe Token: SeSecurityPrivilege 2576 WMIC.exe Token: SeTakeOwnershipPrivilege 2576 WMIC.exe Token: SeLoadDriverPrivilege 2576 WMIC.exe Token: SeSystemtimePrivilege 2576 WMIC.exe Token: SeBackupPrivilege 2576 WMIC.exe Token: SeRestorePrivilege 2576 WMIC.exe Token: SeShutdownPrivilege 2576 WMIC.exe Token: SeSystemEnvironmentPrivilege 2576 WMIC.exe Token: SeUndockPrivilege 2576 WMIC.exe Token: SeManageVolumePrivilege 2576 WMIC.exe Token: 31 2576 WMIC.exe Token: 32 2576 WMIC.exe Token: SeCreateTokenPrivilege 2576 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2576 WMIC.exe Token: SeIncreaseQuotaPrivilege 2576 WMIC.exe Token: SeSecurityPrivilege 2576 WMIC.exe Token: SeTakeOwnershipPrivilege 2576 WMIC.exe Token: SeLoadDriverPrivilege 2576 WMIC.exe Token: SeSystemtimePrivilege 2576 WMIC.exe Token: SeBackupPrivilege 2576 WMIC.exe Token: SeRestorePrivilege 2576 WMIC.exe Token: SeShutdownPrivilege 2576 WMIC.exe Token: SeSystemEnvironmentPrivilege 2576 WMIC.exe Token: SeUndockPrivilege 2576 WMIC.exe Token: SeManageVolumePrivilege 2576 WMIC.exe Token: 31 2576 WMIC.exe Token: 32 2576 WMIC.exe Token: SeCreateTokenPrivilege 2276 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2276 WMIC.exe Token: SeIncreaseQuotaPrivilege 2276 WMIC.exe Token: SeSecurityPrivilege 2276 WMIC.exe Token: SeTakeOwnershipPrivilege 2276 WMIC.exe Token: SeLoadDriverPrivilege 2276 WMIC.exe Token: SeSystemtimePrivilege 2276 WMIC.exe Token: SeBackupPrivilege 2276 WMIC.exe Token: SeRestorePrivilege 2276 WMIC.exe Token: SeShutdownPrivilege 2276 WMIC.exe Token: SeSystemEnvironmentPrivilege 2276 WMIC.exe Token: SeUndockPrivilege 2276 WMIC.exe Token: SeManageVolumePrivilege 2276 WMIC.exe Token: 31 2276 WMIC.exe Token: 32 2276 WMIC.exe Token: SeCreateTokenPrivilege 2276 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2276 WMIC.exe Token: SeIncreaseQuotaPrivilege 2276 WMIC.exe Token: SeSecurityPrivilege 2276 WMIC.exe Token: SeTakeOwnershipPrivilege 2276 WMIC.exe Token: SeLoadDriverPrivilege 2276 WMIC.exe Token: SeSystemtimePrivilege 2276 WMIC.exe Token: SeBackupPrivilege 2276 WMIC.exe Token: SeRestorePrivilege 2276 WMIC.exe Token: SeShutdownPrivilege 2276 WMIC.exe Token: SeSystemEnvironmentPrivilege 2276 WMIC.exe Token: SeUndockPrivilege 2276 WMIC.exe Token: SeManageVolumePrivilege 2276 WMIC.exe Token: 31 2276 WMIC.exe Token: 32 2276 WMIC.exe Token: SeCreateTokenPrivilege 296 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2548 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 1716 wrote to memory of 2548 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 1716 wrote to memory of 2548 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 1716 wrote to memory of 2548 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 2548 wrote to memory of 2576 2548 cmd.exe 37 PID 2548 wrote to memory of 2576 2548 cmd.exe 37 PID 2548 wrote to memory of 2576 2548 cmd.exe 37 PID 1716 wrote to memory of 1796 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 1716 wrote to memory of 1796 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 1716 wrote to memory of 1796 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 1716 wrote to memory of 1796 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 1796 wrote to memory of 2276 1796 cmd.exe 40 PID 1796 wrote to memory of 2276 1796 cmd.exe 40 PID 1796 wrote to memory of 2276 1796 cmd.exe 40 PID 1716 wrote to memory of 1876 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 1716 wrote to memory of 1876 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 1716 wrote to memory of 1876 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 1716 wrote to memory of 1876 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 1876 wrote to memory of 296 1876 cmd.exe 43 PID 1876 wrote to memory of 296 1876 cmd.exe 43 PID 1876 wrote to memory of 296 1876 cmd.exe 43 PID 1716 wrote to memory of 2176 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 1716 wrote to memory of 2176 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 1716 wrote to memory of 2176 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 1716 wrote to memory of 2176 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 2176 wrote to memory of 1460 2176 cmd.exe 46 PID 2176 wrote to memory of 1460 2176 cmd.exe 46 PID 2176 wrote to memory of 1460 2176 cmd.exe 46 PID 1716 wrote to memory of 2636 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 1716 wrote to memory of 2636 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 1716 wrote to memory of 2636 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 1716 wrote to memory of 2636 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 2636 wrote to memory of 2876 2636 cmd.exe 49 PID 2636 wrote to memory of 2876 2636 cmd.exe 49 PID 2636 wrote to memory of 2876 2636 cmd.exe 49 PID 1716 wrote to memory of 2776 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 1716 wrote to memory of 2776 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 1716 wrote to memory of 2776 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 1716 wrote to memory of 2776 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 2776 wrote to memory of 2892 2776 cmd.exe 52 PID 2776 wrote to memory of 2892 2776 cmd.exe 52 PID 2776 wrote to memory of 2892 2776 cmd.exe 52 PID 1716 wrote to memory of 664 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 1716 wrote to memory of 664 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 1716 wrote to memory of 664 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 1716 wrote to memory of 664 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 664 wrote to memory of 2944 664 cmd.exe 55 PID 664 wrote to memory of 2944 664 cmd.exe 55 PID 664 wrote to memory of 2944 664 cmd.exe 55 PID 1716 wrote to memory of 3068 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 1716 wrote to memory of 3068 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 1716 wrote to memory of 3068 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 1716 wrote to memory of 3068 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 3068 wrote to memory of 2972 3068 cmd.exe 58 PID 3068 wrote to memory of 2972 3068 cmd.exe 58 PID 3068 wrote to memory of 2972 3068 cmd.exe 58 PID 1716 wrote to memory of 916 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 1716 wrote to memory of 916 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 1716 wrote to memory of 916 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 1716 wrote to memory of 916 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 916 wrote to memory of 380 916 cmd.exe 61 PID 916 wrote to memory of 380 916 cmd.exe 61 PID 916 wrote to memory of 380 916 cmd.exe 61 PID 1716 wrote to memory of 1480 1716 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 62 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"2⤵
- Drops startup file
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{70867F06-7CE1-4635-B3B9-B5A80520A0FD}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{70867F06-7CE1-4635-B3B9-B5A80520A0FD}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D11604F1-7F18-47A6-A744-AAD058AB754A}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D11604F1-7F18-47A6-A744-AAD058AB754A}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D0529A45-DBF9-4DB3-ACB1-3619AD81B6AC}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{D0529A45-DBF9-4DB3-ACB1-3619AD81B6AC}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:296
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{062248DE-39B6-423C-A67E-69CAD416E064}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{062248DE-39B6-423C-A67E-69CAD416E064}'" delete4⤵PID:1460
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CF77FEF8-EF61-428A-9041-8F75AEE58A5A}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CF77FEF8-EF61-428A-9041-8F75AEE58A5A}'" delete4⤵PID:2876
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{46E9FFC8-3268-4C46-AEFC-42F29D38E242}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{46E9FFC8-3268-4C46-AEFC-42F29D38E242}'" delete4⤵PID:2892
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{865DC7F6-3205-48B5-A10B-026BE0E5CCC3}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{865DC7F6-3205-48B5-A10B-026BE0E5CCC3}'" delete4⤵PID:2944
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{031360AE-AE90-4D09-A5DD-18BD27B4DA8B}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{031360AE-AE90-4D09-A5DD-18BD27B4DA8B}'" delete4⤵PID:2972
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{34AFA9F9-D8FE-4285-8FEE-F6108327FB60}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{34AFA9F9-D8FE-4285-8FEE-F6108327FB60}'" delete4⤵PID:380
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9B26E81A-246E-4812-AB1B-E09311497E4F}'" delete3⤵PID:1480
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9B26E81A-246E-4812-AB1B-E09311497E4F}'" delete4⤵PID:1524
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8A5EE2C2-74F2-4F85-B085-352DD22F3F19}'" delete3⤵PID:1100
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8A5EE2C2-74F2-4F85-B085-352DD22F3F19}'" delete4⤵PID:2352
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1E004930-4D06-41D2-8DA7-60B418047C45}'" delete3⤵PID:2200
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1E004930-4D06-41D2-8DA7-60B418047C45}'" delete4⤵PID:2524
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B1E0F523-CDCE-47AA-8040-220077B8638D}'" delete3⤵PID:1708
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{B1E0F523-CDCE-47AA-8040-220077B8638D}'" delete4⤵PID:1880
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{ACCD57AE-C108-4B25-9C35-465EA0B0C589}'" delete3⤵PID:2240
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{ACCD57AE-C108-4B25-9C35-465EA0B0C589}'" delete4⤵PID:324
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E8689E06-A6C3-4B92-8ABD-7D142E9F6E63}'" delete3⤵PID:352
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E8689E06-A6C3-4B92-8ABD-7D142E9F6E63}'" delete4⤵PID:2304
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{691C44D9-4EB9-405D-88BA-127C26A77CF8}'" delete3⤵PID:848
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{691C44D9-4EB9-405D-88BA-127C26A77CF8}'" delete4⤵PID:2948
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0900A2AB-8F8F-4CFD-9EE8-2BED2485D25E}'" delete3⤵PID:1912
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0900A2AB-8F8F-4CFD-9EE8-2BED2485D25E}'" delete4⤵PID:1376
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{640F5951-2CA4-4B4A-8286-8786980B46DE}'" delete3⤵PID:992
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{640F5951-2CA4-4B4A-8286-8786980B46DE}'" delete4⤵PID:2032
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c11bdf85b4d47b6e4a29fa361370abc0
SHA10fde2bf1bf5e4758617dfd7401df472e726ef4ab
SHA2564172f0542765e35855cb2bb66565bae675f7a76ba97bd9dd66966727ad260eba
SHA512cd19e6b9456e29f8c01f45f5da293b3c1f87527895b0eb360a0d3648fffd3be6a5224b2982666f299b914eef03c6714b9444708e4ac0db9053ead161d81ca66c
-
Filesize
4KB
MD55c6f7f88b2eed2a75c4a6ff035bea1b7
SHA190c0cdd978c27508562088299d4e280cd1114a9a
SHA25632dd27cc5c0e1efb9c654bcd351ad1a5e221a0772a536b511e446afdaeee4b11
SHA51258dddc90578a05acdce163eb3a03030e316a5243a61cee40836c906b89ed6f0f3c19ff11b51409e2fa3cb17075a9790205cfdc70fc0bb7dd84e078fae25d90c9