Overview
overview
10Static
static
10Videos/64/64.exe
windows7-x64
1Videos/64/64.exe
windows10-2004-x64
8Videos/64/86.exe
windows7-x64
3Videos/64/86.exe
windows10-2004-x64
6Videos/64/...E.html
windows7-x64
3Videos/64/...E.html
windows10-2004-x64
8Videos/64/dump.bat
windows7-x64
9Videos/64/dump.bat
windows10-2004-x64
9Videos/64/mimidrv.sys
windows7-x64
10Videos/64/mimidrv.sys
windows10-2004-x64
10Videos/64/...tz.dll
windows7-x64
1Videos/64/...tz.dll
windows10-2004-x64
6Videos/64/mimilib.dll
windows7-x64
1Videos/64/mimilib.dll
windows10-2004-x64
8Videos/64/...ol.dll
windows7-x64
1Videos/64/...ol.dll
windows10-2004-x64
8Videos/Adv...69.exe
windows7-x64
4Videos/Adv...69.exe
windows10-2004-x64
6Videos/Cap...E.html
windows7-x64
3Videos/Cap...E.html
windows10-2004-x64
8Videos/PsExec.exe
windows7-x64
3Videos/PsExec.exe
windows10-2004-x64
8Videos/PsExec64.exe
windows7-x64
1Videos/PsExec64.exe
windows10-2004-x64
8Videos/READ_NOTE.html
windows7-x64
3Videos/READ_NOTE.html
windows10-2004-x64
8Videos/crypt154.exe
windows7-x64
10Videos/crypt154.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 11:29
Behavioral task
behavioral1
Sample
Videos/64/64.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Videos/64/64.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
Videos/64/86.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Videos/64/86.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
Videos/64/READ_NOTE.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Videos/64/READ_NOTE.html
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
Videos/64/dump.bat
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Videos/64/dump.bat
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
Videos/64/mimidrv.sys
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Videos/64/mimidrv.sys
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
Videos/64/mimikatz.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Videos/64/mimikatz.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral13
Sample
Videos/64/mimilib.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Videos/64/mimilib.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
Videos/64/mimispool.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Videos/64/mimispool.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
Videos/Advanced_Port_Scanner_2.5.3869.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
Videos/Advanced_Port_Scanner_2.5.3869.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
Videos/Captures/READ_NOTE.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Videos/Captures/READ_NOTE.html
Resource
win10v2004-20250207-en
Behavioral task
behavioral21
Sample
Videos/PsExec.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Videos/PsExec.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral23
Sample
Videos/PsExec64.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
Videos/PsExec64.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral25
Sample
Videos/READ_NOTE.html
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Videos/READ_NOTE.html
Resource
win10v2004-20250211-en
Behavioral task
behavioral27
Sample
Videos/crypt154.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
Videos/crypt154.exe
Resource
win10v2004-20250211-en
General
-
Target
Videos/crypt154.exe
-
Size
728KB
-
MD5
ee91aeacff16d4ef5fe74b7252291665
-
SHA1
88adb2573e183e44babf88005298cab9a9901d2d
-
SHA256
ea585b7e84b67e8170b76f87115c0fc8423fe6d7184db32ba32b5bfc155e2b34
-
SHA512
d12cf47211a38fe595d855fe336f30946a0a76a4a559e0430e212f68601cd28cab63ffd4acd04c76f4f83950ad2261efb49dff6a2b03fd2aaa4617bc49b1b8a4
-
SSDEEP
12288:R/7tmBxTq87Rro7jx0/O2EbiJtzhCg3sph0lhSMXliuqJTJRg9J:RztmTqwRrSjx0/OpiDhdSh0lhSMXltqe
Malware Config
Extracted
F:\$RECYCLE.BIN\READ_NOTE.html
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2476 created 1188 2476 crypt154.exe 21 -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 2752 bcdedit.exe -
Renames multiple (5688) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2988 wbadmin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\BabyLockerKZ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Videos\\crypt154.exe\"" crypt154.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: crypt154.exe File opened (read-only) \??\U: crypt154.exe File opened (read-only) \??\R: crypt154.exe File opened (read-only) \??\X: crypt154.exe File opened (read-only) \??\Z: crypt154.exe File opened (read-only) \??\F: crypt154.exe File opened (read-only) \??\A: crypt154.exe File opened (read-only) \??\R: crypt154.exe File opened (read-only) \??\J: crypt154.exe File opened (read-only) \??\N: crypt154.exe File opened (read-only) \??\O: crypt154.exe File opened (read-only) \??\S: crypt154.exe File opened (read-only) \??\K: crypt154.exe File opened (read-only) \??\L: crypt154.exe File opened (read-only) \??\L: crypt154.exe File opened (read-only) \??\E: crypt154.exe File opened (read-only) \??\G: crypt154.exe File opened (read-only) \??\J: crypt154.exe File opened (read-only) \??\O: crypt154.exe File opened (read-only) \??\T: crypt154.exe File opened (read-only) \??\Z: crypt154.exe File opened (read-only) \??\B: crypt154.exe File opened (read-only) \??\Y: crypt154.exe File opened (read-only) \??\I: crypt154.exe File opened (read-only) \??\M: crypt154.exe File opened (read-only) \??\V: crypt154.exe File opened (read-only) \??\W: crypt154.exe File opened (read-only) \??\E: crypt154.exe File opened (read-only) \??\P: crypt154.exe File opened (read-only) \??\T: crypt154.exe File opened (read-only) \??\P: crypt154.exe File opened (read-only) \??\S: crypt154.exe File opened (read-only) \??\H: crypt154.exe File opened (read-only) \??\M: crypt154.exe File opened (read-only) \??\W: crypt154.exe File opened (read-only) \??\X: crypt154.exe File opened (read-only) \??\G: crypt154.exe File opened (read-only) \??\I: crypt154.exe File opened (read-only) \??\K: crypt154.exe File opened (read-only) \??\Q: crypt154.exe File opened (read-only) \??\V: crypt154.exe File opened (read-only) \??\B: crypt154.exe File opened (read-only) \??\H: crypt154.exe File opened (read-only) \??\N: crypt154.exe File opened (read-only) \??\Y: crypt154.exe File opened (read-only) \??\U: crypt154.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 9 api.ipify.org -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Control Panel\Desktop\Wallpaper = "\\\\?\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Videos\\output.bmp" crypt154.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" crypt154.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.ths crypt154.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\InkObj.dll.mui crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00478_.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0297185.WMF crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861261279.profile.gz crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application_zh_CN.jar crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297727.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01470_.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\CT_ROOTS.XML crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactLow.jpg crypt154.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\currency.css crypt154.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-options-keymap.jar crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00145_.WMF crypt154.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html crypt154.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\diner.png crypt154.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\DiagnosticsTap.dll.mui crypt154.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePageBlank.gif crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\messageboxinfo.ico crypt154.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\READ_NOTE.html crypt154.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01145_.WMF crypt154.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ja_JP.jar crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\org-openide-filesystems_ja.jar crypt154.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\ShvlRes.dll.mui crypt154.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\WMPDMCCore.dll.mui crypt154.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\picturePuzzle.js crypt154.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\settings.js crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00006_.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PRRT.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_fr.dub crypt154.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\PhotoAcq.dll.mui crypt154.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\highDpiImageSwap.js crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XOCR3.PSP crypt154.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\RSSFeeds.js crypt154.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\Mahjong.exe.mui crypt154.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\PurblePlace.exe.mui crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\msaccess.exe.manifest crypt154.exe File created C:\Program Files\Uninstall Information\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_zh_4.4.0.v20140623020002.jar crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01044_.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18201_.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_down.png crypt154.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\READ_NOTE.html crypt154.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME18.CSS crypt154.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\settings.js crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01545_.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\attention.gif crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\SUBMIT.JS crypt154.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\31.png crypt154.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\jhall-2.0_05.jar crypt154.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\READ_NOTE.html crypt154.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\vlc.mo crypt154.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-It.otf crypt154.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng.hyp crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00414_.WMF crypt154.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10298_.GIF crypt154.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\WMSysPr9.prx crypt154.exe File created C:\Windows\READ_NOTE.html crypt154.exe File opened for modification C:\Windows\bootstat.dat crypt154.exe File opened for modification C:\Windows\Starter.xml crypt154.exe File opened for modification C:\Windows\mib.bin crypt154.exe File opened for modification C:\Windows\Ultimate.xml crypt154.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 crypt154.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString crypt154.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 crypt154.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString crypt154.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2876 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe 2476 crypt154.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2888 WMIC.exe Token: SeSecurityPrivilege 2888 WMIC.exe Token: SeTakeOwnershipPrivilege 2888 WMIC.exe Token: SeLoadDriverPrivilege 2888 WMIC.exe Token: SeSystemProfilePrivilege 2888 WMIC.exe Token: SeSystemtimePrivilege 2888 WMIC.exe Token: SeProfSingleProcessPrivilege 2888 WMIC.exe Token: SeIncBasePriorityPrivilege 2888 WMIC.exe Token: SeCreatePagefilePrivilege 2888 WMIC.exe Token: SeBackupPrivilege 2888 WMIC.exe Token: SeRestorePrivilege 2888 WMIC.exe Token: SeShutdownPrivilege 2888 WMIC.exe Token: SeDebugPrivilege 2888 WMIC.exe Token: SeSystemEnvironmentPrivilege 2888 WMIC.exe Token: SeRemoteShutdownPrivilege 2888 WMIC.exe Token: SeUndockPrivilege 2888 WMIC.exe Token: SeManageVolumePrivilege 2888 WMIC.exe Token: 33 2888 WMIC.exe Token: 34 2888 WMIC.exe Token: 35 2888 WMIC.exe Token: SeBackupPrivilege 2612 vssvc.exe Token: SeRestorePrivilege 2612 vssvc.exe Token: SeAuditPrivilege 2612 vssvc.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2764 2476 crypt154.exe 33 PID 2476 wrote to memory of 2764 2476 crypt154.exe 33 PID 2476 wrote to memory of 2764 2476 crypt154.exe 33 PID 2476 wrote to memory of 2764 2476 crypt154.exe 33 PID 2476 wrote to memory of 3060 2476 crypt154.exe 34 PID 2476 wrote to memory of 3060 2476 crypt154.exe 34 PID 2476 wrote to memory of 3060 2476 crypt154.exe 34 PID 2476 wrote to memory of 3060 2476 crypt154.exe 34 PID 2476 wrote to memory of 2624 2476 crypt154.exe 35 PID 2476 wrote to memory of 2624 2476 crypt154.exe 35 PID 2476 wrote to memory of 2624 2476 crypt154.exe 35 PID 2476 wrote to memory of 2624 2476 crypt154.exe 35 PID 2476 wrote to memory of 1964 2476 crypt154.exe 36 PID 2476 wrote to memory of 1964 2476 crypt154.exe 36 PID 2476 wrote to memory of 1964 2476 crypt154.exe 36 PID 2476 wrote to memory of 1964 2476 crypt154.exe 36 PID 2764 wrote to memory of 2732 2764 cmd.exe 37 PID 2764 wrote to memory of 2732 2764 cmd.exe 37 PID 2764 wrote to memory of 2732 2764 cmd.exe 37 PID 2764 wrote to memory of 2732 2764 cmd.exe 37 PID 2624 wrote to memory of 2652 2624 cmd.exe 39 PID 2624 wrote to memory of 2652 2624 cmd.exe 39 PID 2624 wrote to memory of 2652 2624 cmd.exe 39 PID 2624 wrote to memory of 2652 2624 cmd.exe 39 PID 3060 wrote to memory of 1892 3060 cmd.exe 38 PID 3060 wrote to memory of 1892 3060 cmd.exe 38 PID 3060 wrote to memory of 1892 3060 cmd.exe 38 PID 3060 wrote to memory of 1892 3060 cmd.exe 38 PID 2732 wrote to memory of 2876 2732 cmd.exe 40 PID 2732 wrote to memory of 2876 2732 cmd.exe 40 PID 2732 wrote to memory of 2876 2732 cmd.exe 40 PID 2652 wrote to memory of 2888 2652 cmd.exe 41 PID 2652 wrote to memory of 2888 2652 cmd.exe 41 PID 2652 wrote to memory of 2888 2652 cmd.exe 41 PID 1964 wrote to memory of 2644 1964 cmd.exe 42 PID 1964 wrote to memory of 2644 1964 cmd.exe 42 PID 1964 wrote to memory of 2644 1964 cmd.exe 42 PID 1964 wrote to memory of 2644 1964 cmd.exe 42 PID 1892 wrote to memory of 2988 1892 cmd.exe 43 PID 1892 wrote to memory of 2988 1892 cmd.exe 43 PID 1892 wrote to memory of 2988 1892 cmd.exe 43 PID 2644 wrote to memory of 2752 2644 cmd.exe 44 PID 2644 wrote to memory of 2752 2644 cmd.exe 44 PID 2644 wrote to memory of 2752 2644 cmd.exe 44 PID 2476 wrote to memory of 1060 2476 crypt154.exe 47 PID 2476 wrote to memory of 1060 2476 crypt154.exe 47 PID 2476 wrote to memory of 1060 2476 crypt154.exe 47 PID 1060 wrote to memory of 832 1060 crypt154.exe 50 PID 1060 wrote to memory of 832 1060 crypt154.exe 50 PID 1060 wrote to memory of 832 1060 crypt154.exe 50 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\Videos\crypt154.exe"C:\Users\Admin\AppData\Local\Temp\Videos\crypt154.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exe\\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
PID:2876
-
-
-
-
C:\Windows\SysWOW64\cmd.exe\\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wbadmin delete backup -keepVersion:0 -quiet3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c wbadmin delete backup -keepVersion:0 -quiet4⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\wbadmin.exewbadmin delete backup -keepVersion:0 -quiet5⤵
- Deletes system backups
- Drops file in Windows directory
PID:2988
-
-
-
-
C:\Windows\SysWOW64\cmd.exe\\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wmic.exe SHADOWCOPY /nointeractive"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c wmic.exe SHADOWCOPY /nointeractive"4⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\System32\Wbem\WMIC.exewmic.exe SHADOWCOPY /nointeractive"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
-
C:\Windows\SysWOW64\cmd.exe\\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c bcdedit.exe /set {default} recoverynabled No3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c bcdedit.exe /set {default} recoverynabled No4⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoverynabled No5⤵
- Modifies boot configuration data using bcdedit
PID:2752
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Videos\crypt154.exe\\?\C:\Users\Admin\AppData\Local\Temp\Videos\crypt154.exe -network -skip_misc2⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:832
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c9be626e9715952e9b70f92f912b9787
SHA1aa2e946d9ad9027172d0d321917942b7562d6abe
SHA256c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4
SHA5127581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD55b30872a74f4c114bc48e6de0526887b
SHA13673cf3142795c497a6273ecdbdd378cb664bb89
SHA256a0fa3f9f7764472b3108bd27fc809156d741b9a6fa9662d3d6ac49bddd5a5ecb
SHA512b6a0d1f40df8099608d204dc0eef7ae37770bc9a03a8156f060366ea1fb3ce75b75796131593551335189ea7564aef5a171e814a1ad502087bc420ee1dfba826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5eb908c3ece364e53b3681360de893c72
SHA1bdb7578da312737ddf81f911f9f6e9c358e4783a
SHA256b293d0fc7d29f4d7d08cc515f0b6ecb41707ef176a0bdbbf66c259c2d4cb7d81
SHA512501caeae0dd66923fe6d0ad93aef84ce1e0c9fbcdf3d981bc84ae636a32a6ae2b78c0949aaa0d6d6c646417229ab100135e41cefcc1ba42e94e81f77fb37f389
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
14B
MD5e3eb2b4cff0d56624daa49116976aeb4
SHA1234db53081db6fc733d22a896f6dac5068eb066a
SHA2563b9efd080931e6b2d3b89e8dcd2655792329a41c4699ffade4b48288bfdb0ffd
SHA512ab0ce3a7301fe64594408380f5d55c8ebf24b0c94527fd2b29ff83bb2a10ab57be5a9de4ef56f532b0002e921c74cae14db0cc0f86d79e49d9d14f073d65d12d
-
Filesize
3KB
MD5920a62e9adb67ce67ec7d36c0431e885
SHA18fbc246b07824ef5a4266f3bd1a14846f203573d
SHA256bf7fe67bc837f33e8cab429a370f293d73cc44925d7717370808d3ed9ee30eba
SHA512b33b2f7b042cc8a46a217ca03193f772d19308d5706401e7f45d87aec7c91c20bf34a999f1de8b37b545757c3a185088f94fb79d5e4fa9640d69e391063f19f3