Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
04/03/2025, 15:32
250304-syy8estrw6 1031/01/2025, 12:59
250131-p8d4fswmbx 1027/01/2025, 15:12
250127-slapastrfy 1024/01/2025, 15:20
250124-sqxpmawncj 1022/01/2025, 17:56
250122-wjahasypaj 1021/01/2025, 17:40
250121-v8zcaawjcj 1021/01/2025, 15:38
250121-s26fxa1ndk 1021/01/2025, 14:09
250121-rglekaxlcw 10Analysis
-
max time kernel
59s -
max time network
52s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/01/2025, 15:12
Behavioral task
behavioral1
Sample
2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe
Resource
win11-20241007-en
General
-
Target
2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe
-
Size
352KB
-
MD5
07244d8bbd0721454ea97e696b6e85d3
-
SHA1
06bc9b13360ac74b019cab18c96cc888474afc52
-
SHA256
6d4fdb81ba3d3005f83e87f1b28fd48fbfe213a6dd164b95d939b9391faff82e
-
SHA512
73c5fa9ee0bf8f91daa41f15932b0138329990d192bda0b75b90bd2f70fc8aaab28f509c9562355942a0563c418c96f99c0322e149e8c9b6d8ff83f14e3a8061
-
SSDEEP
6144:gV3r9iXlkEt9RGv5IKp/ntL2FJGAJRaWJ1rQPNDEDKx22LV:gglkEHshIKpvtg4AJRaWkp
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral1/memory/4328-1-0x0000000000C90000-0x0000000000CBC000-memory.dmp family_chaos behavioral1/files/0x001c00000002aa8b-6.dat family_chaos -
Chaos family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 5100 bcdedit.exe 2192 bcdedit.exe -
pid Process 1852 wbadmin.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2253712635-4068079004-3870069674-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\m46io30m5.jpg" svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 412 vssadmin.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133824643913093784" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3536 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2980 svchost.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 2980 svchost.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe Token: SeDebugPrivilege 2980 svchost.exe Token: SeBackupPrivilege 4940 vssvc.exe Token: SeRestorePrivilege 4940 vssvc.exe Token: SeAuditPrivilege 4940 vssvc.exe Token: SeIncreaseQuotaPrivilege 4564 WMIC.exe Token: SeSecurityPrivilege 4564 WMIC.exe Token: SeTakeOwnershipPrivilege 4564 WMIC.exe Token: SeLoadDriverPrivilege 4564 WMIC.exe Token: SeSystemProfilePrivilege 4564 WMIC.exe Token: SeSystemtimePrivilege 4564 WMIC.exe Token: SeProfSingleProcessPrivilege 4564 WMIC.exe Token: SeIncBasePriorityPrivilege 4564 WMIC.exe Token: SeCreatePagefilePrivilege 4564 WMIC.exe Token: SeBackupPrivilege 4564 WMIC.exe Token: SeRestorePrivilege 4564 WMIC.exe Token: SeShutdownPrivilege 4564 WMIC.exe Token: SeDebugPrivilege 4564 WMIC.exe Token: SeSystemEnvironmentPrivilege 4564 WMIC.exe Token: SeRemoteShutdownPrivilege 4564 WMIC.exe Token: SeUndockPrivilege 4564 WMIC.exe Token: SeManageVolumePrivilege 4564 WMIC.exe Token: 33 4564 WMIC.exe Token: 34 4564 WMIC.exe Token: 35 4564 WMIC.exe Token: 36 4564 WMIC.exe Token: SeIncreaseQuotaPrivilege 4564 WMIC.exe Token: SeSecurityPrivilege 4564 WMIC.exe Token: SeTakeOwnershipPrivilege 4564 WMIC.exe Token: SeLoadDriverPrivilege 4564 WMIC.exe Token: SeSystemProfilePrivilege 4564 WMIC.exe Token: SeSystemtimePrivilege 4564 WMIC.exe Token: SeProfSingleProcessPrivilege 4564 WMIC.exe Token: SeIncBasePriorityPrivilege 4564 WMIC.exe Token: SeCreatePagefilePrivilege 4564 WMIC.exe Token: SeBackupPrivilege 4564 WMIC.exe Token: SeRestorePrivilege 4564 WMIC.exe Token: SeShutdownPrivilege 4564 WMIC.exe Token: SeDebugPrivilege 4564 WMIC.exe Token: SeSystemEnvironmentPrivilege 4564 WMIC.exe Token: SeRemoteShutdownPrivilege 4564 WMIC.exe Token: SeUndockPrivilege 4564 WMIC.exe Token: SeManageVolumePrivilege 4564 WMIC.exe Token: 33 4564 WMIC.exe Token: 34 4564 WMIC.exe Token: 35 4564 WMIC.exe Token: 36 4564 WMIC.exe Token: SeBackupPrivilege 3740 wbengine.exe Token: SeRestorePrivilege 3740 wbengine.exe Token: SeSecurityPrivilege 3740 wbengine.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeCreatePagefilePrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeCreatePagefilePrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeCreatePagefilePrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeCreatePagefilePrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeCreatePagefilePrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeCreatePagefilePrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeCreatePagefilePrivilege 1764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2980 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 78 PID 4328 wrote to memory of 2980 4328 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 78 PID 2980 wrote to memory of 2620 2980 svchost.exe 79 PID 2980 wrote to memory of 2620 2980 svchost.exe 79 PID 2620 wrote to memory of 412 2620 cmd.exe 81 PID 2620 wrote to memory of 412 2620 cmd.exe 81 PID 2620 wrote to memory of 4564 2620 cmd.exe 84 PID 2620 wrote to memory of 4564 2620 cmd.exe 84 PID 2980 wrote to memory of 980 2980 svchost.exe 86 PID 2980 wrote to memory of 980 2980 svchost.exe 86 PID 980 wrote to memory of 5100 980 cmd.exe 88 PID 980 wrote to memory of 5100 980 cmd.exe 88 PID 980 wrote to memory of 2192 980 cmd.exe 89 PID 980 wrote to memory of 2192 980 cmd.exe 89 PID 2980 wrote to memory of 4956 2980 svchost.exe 90 PID 2980 wrote to memory of 4956 2980 svchost.exe 90 PID 4956 wrote to memory of 1852 4956 cmd.exe 92 PID 4956 wrote to memory of 1852 4956 cmd.exe 92 PID 2980 wrote to memory of 3536 2980 svchost.exe 97 PID 2980 wrote to memory of 3536 2980 svchost.exe 97 PID 1764 wrote to memory of 3568 1764 chrome.exe 102 PID 1764 wrote to memory of 3568 1764 chrome.exe 102 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 1400 1764 chrome.exe 103 PID 1764 wrote to memory of 3164 1764 chrome.exe 104 PID 1764 wrote to memory of 3164 1764 chrome.exe 104 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 PID 1764 wrote to memory of 3892 1764 chrome.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:412
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:5100
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2192
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1852
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:3536
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1436
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:2060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd88cfcc40,0x7ffd88cfcc4c,0x7ffd88cfcc582⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:32⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4436,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4892,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5004,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4308,i,14855156258431992844,13043515091275959107,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5feffd5a8df88171abe4549c6b50c589a
SHA17ee716032c97d6844b5fd91cbbbf635798d0eb34
SHA256a5b6478f600d66cbce80da6cd050d9493e7c98eba0cae926876760021283bc98
SHA5129ce8c388997823ba7b388e20ca596a721476c7c4f6acc1dc2aa542d05764fde3868b3ba1701187b8d054cee2e34dc978496c1b2f92d5275eadd2de285836f7f0
-
Filesize
215KB
MD53589d6be186a459827a850486cad3846
SHA1c9f9d8bce4f666db9be63cba12a5f286a0fb41d9
SHA25689f7aa5b3e458b35d74487fcb84a904187d332cca2f2aa574cdec77370fe487c
SHA5128da2d5d3e569f89db770f151e656b471664577bf36cffff8b6830e9f39cc1b657e02b02307d10a86ea4553ac326eb01585dc5f0021863899f987bc03af906dc4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD567147e4d09503caae1a3c92c32ef5b09
SHA15e945c8f99139abacc02ff8e0817dba7b96cb6a5
SHA2568280746160341587924434a5eb65cbc19055cf249f84a7bb16ff9748829fea0e
SHA5124900cbcf8708f6f607b7f07dee6004a55176a6e0c057a56779ecbd5da84da314bf908bd93787c0afb3a47f47afd24ac623522017109e5fbdaba598254dc821d3
-
Filesize
9KB
MD517e071695989aac996cec8cf6440675a
SHA1a55b8f250bf68e188fb4593c026b32dd0ed1e279
SHA256e1808ec6c4f31aeb28a2f579d35715a9b8069916fd51d0581f64258160e6c688
SHA512c20271cdee773e60eeebcd1ea553a791bb86966cc19f520dc97502fe45f20cf8f1b5b3ef7545d3636f89e50fc1b788268355fb1fb8e66ec3f0fc4a0f1b947d94
-
Filesize
15KB
MD5e71a39a106ddb46dfc593258b677438e
SHA104e4a17a411305696cc802e7dabb3ec1bddf153d
SHA256d81ba2502440cf32c0cc8e51e1dd7e2b93bf07216de3b8cb7d38ab39ff6e31be
SHA5127262ec2806bc5407ac1e0cc8df98c8738e32306eccdfd68d41dcfba464f69762d64c085a40ebdc368602cbec63ddfaf7926cfac1735e53cf1dc16bf04df5e0fd
-
Filesize
233KB
MD5bc9cecd0c1397dc7950d71b3b1efe820
SHA1e7001cfcc1a5a93a24d7304f9b740d2cd94f5089
SHA2563fd122ca6d2eb6226cfefb8adcd5d83438f130499dadb2d1b405c4743aefb0f4
SHA5122e7f25f436a4af0d1beb079a970196fe23b9a787d2dbee18a4e791955154ff3c275698ef76d2029f35b3d3eb65c770ec760a59d2356a25445f0d817c7e49db33
-
Filesize
352KB
MD507244d8bbd0721454ea97e696b6e85d3
SHA106bc9b13360ac74b019cab18c96cc888474afc52
SHA2566d4fdb81ba3d3005f83e87f1b28fd48fbfe213a6dd164b95d939b9391faff82e
SHA51273c5fa9ee0bf8f91daa41f15932b0138329990d192bda0b75b90bd2f70fc8aaab28f509c9562355942a0563c418c96f99c0322e149e8c9b6d8ff83f14e3a8061
-
Filesize
120B
MD58a4a98a8bfe11567dd16d06ddc364346
SHA1ed94fda66affe31abe3002f8e702c3ddd5e37ba8
SHA25648236cc3c7a1316f9f61201f2937c9653b9e6c8f6b038f9a94fbe7a3a3153cd3
SHA512662ae12eee1180e34a41a4e2b018cae970fabeb446a9d8e82c692ca32d52ebadccc8a465b7dce4988af9f37d42dcfaec7b028e6a3c107b9b6cdc81e345770141