Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win10v2004-20241007-en
General
-
Target
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
-
Size
80KB
-
MD5
8152a3d0d76f7e968597f4f834fdfa9d
-
SHA1
c3cf05f3f79851d3c0d4266ab77c8e3e3f88c73e
-
SHA256
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b
-
SHA512
eb1a18cb03131466a4152fa2f6874b70c760317148684ca9b95044e50dc9cd19316d6e68e680ce18599114ba73e75264de5dab5afe611165b9c6c0b5f01002b4
-
SSDEEP
1536:SHbigeMiIeMfZ7tOBbFv0CIG0dDh/suIicRtpNf8SgRXt+AacRDVX8C4OntD4acN:SHbigeMiIeMfZ7tOBbFv0CIG0dDh/su0
Malware Config
Extracted
C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.txt
hakbit
Signatures
-
Disables service(s) 3 TTPs
-
Hakbit
Ransomware which encrypts files using AES, first seen in November 2019.
-
Hakbit family
-
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 2960 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1236 sc.exe 2364 sc.exe 796 sc.exe 2560 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 844 cmd.exe 2248 PING.EXE -
Kills process with taskkill 47 IoCs
pid Process 1284 taskkill.exe 2900 taskkill.exe 2784 taskkill.exe 2944 taskkill.exe 1984 taskkill.exe 1660 taskkill.exe 2664 taskkill.exe 2860 taskkill.exe 2888 taskkill.exe 1560 taskkill.exe 2416 taskkill.exe 764 taskkill.exe 2808 taskkill.exe 2260 taskkill.exe 2464 taskkill.exe 2572 taskkill.exe 2568 taskkill.exe 840 taskkill.exe 1464 taskkill.exe 1840 taskkill.exe 2828 taskkill.exe 2480 taskkill.exe 2672 taskkill.exe 2772 taskkill.exe 2832 taskkill.exe 2824 taskkill.exe 908 taskkill.exe 1188 taskkill.exe 1172 taskkill.exe 1436 taskkill.exe 1212 taskkill.exe 1732 taskkill.exe 2880 taskkill.exe 1752 taskkill.exe 2352 taskkill.exe 2152 taskkill.exe 2688 taskkill.exe 2668 taskkill.exe 2800 taskkill.exe 2300 taskkill.exe 1512 taskkill.exe 536 taskkill.exe 1960 taskkill.exe 1656 taskkill.exe 2736 taskkill.exe 2284 taskkill.exe 2864 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2664 notepad.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2248 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe Token: SeDebugPrivilege 1172 taskkill.exe Token: SeDebugPrivilege 2880 taskkill.exe Token: SeDebugPrivilege 2860 taskkill.exe Token: SeDebugPrivilege 2672 taskkill.exe Token: SeDebugPrivilege 2568 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 2784 taskkill.exe Token: SeDebugPrivilege 1072 powershell.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 2480 taskkill.exe Token: SeDebugPrivilege 840 taskkill.exe Token: SeDebugPrivilege 1512 taskkill.exe Token: SeDebugPrivilege 1284 taskkill.exe Token: SeDebugPrivilege 1732 taskkill.exe Token: SeDebugPrivilege 2736 taskkill.exe Token: SeDebugPrivilege 2800 taskkill.exe Token: SeDebugPrivilege 1660 taskkill.exe Token: SeDebugPrivilege 2464 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 536 taskkill.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 2416 taskkill.exe Token: SeDebugPrivilege 2152 taskkill.exe Token: SeDebugPrivilege 1984 taskkill.exe Token: SeDebugPrivilege 764 taskkill.exe Token: SeDebugPrivilege 2284 taskkill.exe Token: SeDebugPrivilege 1188 taskkill.exe Token: SeDebugPrivilege 2824 taskkill.exe Token: SeDebugPrivilege 908 taskkill.exe Token: SeDebugPrivilege 2664 taskkill.exe Token: SeDebugPrivilege 2832 taskkill.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 2260 taskkill.exe Token: SeDebugPrivilege 2300 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 1436 taskkill.exe Token: SeDebugPrivilege 1212 taskkill.exe Token: SeDebugPrivilege 2772 taskkill.exe Token: SeDebugPrivilege 1840 taskkill.exe Token: SeDebugPrivilege 1464 taskkill.exe Token: SeDebugPrivilege 2888 taskkill.exe Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 2944 taskkill.exe Token: SeDebugPrivilege 2668 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2592 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 30 PID 2124 wrote to memory of 2592 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 30 PID 2124 wrote to memory of 2592 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 30 PID 2124 wrote to memory of 1236 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 31 PID 2124 wrote to memory of 1236 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 31 PID 2124 wrote to memory of 1236 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 31 PID 2124 wrote to memory of 2560 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 32 PID 2124 wrote to memory of 2560 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 32 PID 2124 wrote to memory of 2560 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 32 PID 2124 wrote to memory of 796 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 34 PID 2124 wrote to memory of 796 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 34 PID 2124 wrote to memory of 796 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 34 PID 2124 wrote to memory of 2364 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 36 PID 2124 wrote to memory of 2364 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 36 PID 2124 wrote to memory of 2364 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 36 PID 2124 wrote to memory of 2568 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 37 PID 2124 wrote to memory of 2568 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 37 PID 2124 wrote to memory of 2568 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 37 PID 2124 wrote to memory of 1188 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 38 PID 2124 wrote to memory of 1188 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 38 PID 2124 wrote to memory of 1188 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 38 PID 2124 wrote to memory of 2572 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 39 PID 2124 wrote to memory of 2572 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 39 PID 2124 wrote to memory of 2572 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 39 PID 2124 wrote to memory of 2352 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 40 PID 2124 wrote to memory of 2352 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 40 PID 2124 wrote to memory of 2352 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 40 PID 2124 wrote to memory of 908 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 42 PID 2124 wrote to memory of 908 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 42 PID 2124 wrote to memory of 908 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 42 PID 2124 wrote to memory of 2300 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 44 PID 2124 wrote to memory of 2300 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 44 PID 2124 wrote to memory of 2300 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 44 PID 2124 wrote to memory of 2464 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 45 PID 2124 wrote to memory of 2464 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 45 PID 2124 wrote to memory of 2464 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 45 PID 2124 wrote to memory of 2260 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 46 PID 2124 wrote to memory of 2260 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 46 PID 2124 wrote to memory of 2260 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 46 PID 2124 wrote to memory of 2800 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 47 PID 2124 wrote to memory of 2800 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 47 PID 2124 wrote to memory of 2800 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 47 PID 2124 wrote to memory of 2808 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 48 PID 2124 wrote to memory of 2808 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 48 PID 2124 wrote to memory of 2808 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 48 PID 2124 wrote to memory of 2864 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 49 PID 2124 wrote to memory of 2864 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 49 PID 2124 wrote to memory of 2864 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 49 PID 2124 wrote to memory of 2888 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 51 PID 2124 wrote to memory of 2888 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 51 PID 2124 wrote to memory of 2888 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 51 PID 2124 wrote to memory of 2860 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 53 PID 2124 wrote to memory of 2860 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 53 PID 2124 wrote to memory of 2860 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 53 PID 2124 wrote to memory of 2784 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 55 PID 2124 wrote to memory of 2784 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 55 PID 2124 wrote to memory of 2784 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 55 PID 2124 wrote to memory of 2668 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 56 PID 2124 wrote to memory of 2668 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 56 PID 2124 wrote to memory of 2668 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 56 PID 2124 wrote to memory of 2480 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 57 PID 2124 wrote to memory of 2480 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 57 PID 2124 wrote to memory of 2480 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 57 PID 2124 wrote to memory of 1752 2124 69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe"C:\Users\Admin\AppData\Local\Temp\69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\$Recycle.bin2⤵PID:2592
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵
- Launches sc.exe
PID:1236
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵
- Launches sc.exe
PID:2560
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵
- Launches sc.exe
PID:796
-
-
C:\Windows\system32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵
- Launches sc.exe
PID:2364
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM thebat.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM steam.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM encsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM excel.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM thebat64.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocomm.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM infopath.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM zoolz.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" IM thunderbird.exe /F2⤵
- Kills process with taskkill
PID:2688
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM onenote.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM msaccess.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM outlook.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM msftesql.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM visio.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM winword.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM wordpad.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocssd.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM oracle.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM synctime.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2664
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:844 -
C:\Windows\system32\PING.EXEping 127.0.0.7 -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2248
-
-
C:\Windows\system32\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”3⤵PID:3216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe2⤵
- Deletes itself
PID:2960 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:1636
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Assistance\Client\1.0\es-ES\Help_MValidator.Lck.energy[[email protected]]
Filesize4KB
MD5389e4c07e4fe5e3b9cff23f1c40d79e8
SHA1ab0e7cf9f799f7cbf6986aa7d8520d7ea95c68e8
SHA256a1e8d5c078cd08305e140d78b6b9f0868fa9b1ff219ffd914f8ef680963bf8f6
SHA512fa8eca41c70679814c1b6fa9501f53863b1d8b3f7a3b8c647a90406a87a52a42f925ffe68e8bd455e70bc52a7fe1f0640467c562a3a0913a39fa0df7c835aff5
-
C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi.energy[[email protected]]
Filesize180KB
MD5effa57af7b66fa8ad077ece4924244e1
SHA16cd9dd92eb0249d18d11c64bf216c2c3edf7b542
SHA2564327d8bf4d96705c57582eda5a50657a6627b53718e586c7764d3409bb1975f0
SHA5128a60d55c5b29cd22c57db539be4b4a981c6d6b56aa1412f88113c42118223a9d730acdcfadcab529d3fb2213ff0c40ada6e3fc676b934f86fc42ab17717315b7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD567ff76385e2e15edbe06b2dc421b391a
SHA1de1dd541e77a58df23603412681eda05e5cec9f3
SHA256f225cab4cfc06724a3cbe9761c85ebce12659b92af8dd0b53c6494ef87ae6b05
SHA512576271f8e901ae3ffe819d7bfc10522f195df8e14a9edc7c68293fd8282c446839405a33a371f00ad3c8cb27f8fb515a4cef41f4b03c1dd8aaa080829a5e2a6c
-
Filesize
828B
MD5084d35f9c4e972ede81a28c700f13112
SHA1dccdc35479ad6c2fc96ee184866e6088d57915c5
SHA256230699358af8fa506abd672d55f9c89de27bfab0adb371738fb345a24b336a6b
SHA512bae536710ff25391715ad4ecb660f999bab3f4d9adb5d44548908d918394b60cf352891e68b2f7c029771c7690bcd418d72b4e47bbea94336c7c0ec68640325f
-
C:\Users\Admin\Desktop\OpenBackup.xlsx.energy[[email protected]]
Filesize16KB
MD59da97f78624798f4fa31f2909daf4d93
SHA1889a0e0f1252a86e689d21590dcfc5f4bce65c13
SHA256a59e417ddea17a506a6499ab5c83da97c7056e9b5aeb5f709e51c915b71106d2
SHA51274db5a5b4cdb8fe92970c71f2dd1a11524241883ece126e5d63a05b5c88c055b03920b0b5e1ab4a9e69a0fe0951c3a5cea0b8b641a9915ba1c6b17bcb90b6f8c