Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17/02/2025, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe
Resource
win10v2004-20250211-en
General
-
Target
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe
-
Size
465KB
-
MD5
9a218d69ecafe65eae264d2fdb52f1aa
-
SHA1
196c08fbab4119d75afb209a05999ce269ffe3cf
-
SHA256
d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9
-
SHA512
33d4cea92b6e4bd6bd96433e7f1d97f0e6461d6f468096d9591c2c78d088ab2de081a7ea4fdbff8fa2941a0a7e4f6e1e940ebcbb2a60309c9157e255699eab84
-
SSDEEP
12288:HZph8TCQS9dQ1GH4wKcmY8FYkEv+NT5XqU6KDBxE:HZpCTCQS9dQ104wdV8FImT5XqiS
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Signatures
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\DQFI3FMT\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Music\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4FXYHFK9\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JEDNWX6E\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\SMFN3Z3Q\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\Links\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00808_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALNDR98.POC d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Helsinki d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-lib-uihandler.xml_hidden d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02124_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115834.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\3082\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CHECKER.POC d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\MAIL.ICO d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyDrop32x32.gif d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kolkata d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0150150.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.DEV_F_COL.HXK d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages.properties d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Merida d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl.css d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285444.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Tegucigalpa d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\PST8PDT d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado26.tlb d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0251007.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01563_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files (x86)\Common Files\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_videoinset.png d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR48B.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guayaquil d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00623_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0160590.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00998_.WMF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01478U.BMP d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZFORM.XML d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationLeft_SelectionSubpicture.png d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\MSB1FREN.ITS d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\jawt_md.h d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.INF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.xml d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\TAB_ON.GIF d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387337.JPG d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\SONORA.ELM d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fi.pak d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_zh_CN.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsink.ax d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_ButtonGraphic.png d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7MDT d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewAttachmentIconsMask.bmp d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\readme.txt d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\grvschema.xsd d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\LICENSE d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PS9CRNRH.POC d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Hermosillo d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sa.jar d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (int) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (str) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (int) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallPaper = "C:\\Users\\Public\\wallpaper_white.png" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "10" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted\DefaultIcon d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dragonforce_encrypted\DefaultIcon\ = "C:\\Users\\Public\\icon.ico" d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1268 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2440 vssvc.exe Token: SeRestorePrivilege 2440 vssvc.exe Token: SeAuditPrivilege 2440 vssvc.exe Token: SeCreateTokenPrivilege 332 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 332 WMIC.exe Token: SeIncreaseQuotaPrivilege 332 WMIC.exe Token: SeSecurityPrivilege 332 WMIC.exe Token: SeTakeOwnershipPrivilege 332 WMIC.exe Token: SeLoadDriverPrivilege 332 WMIC.exe Token: SeSystemtimePrivilege 332 WMIC.exe Token: SeBackupPrivilege 332 WMIC.exe Token: SeRestorePrivilege 332 WMIC.exe Token: SeShutdownPrivilege 332 WMIC.exe Token: SeSystemEnvironmentPrivilege 332 WMIC.exe Token: SeUndockPrivilege 332 WMIC.exe Token: SeManageVolumePrivilege 332 WMIC.exe Token: 31 332 WMIC.exe Token: 32 332 WMIC.exe Token: SeCreateTokenPrivilege 332 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 332 WMIC.exe Token: SeIncreaseQuotaPrivilege 332 WMIC.exe Token: SeSecurityPrivilege 332 WMIC.exe Token: SeTakeOwnershipPrivilege 332 WMIC.exe Token: SeLoadDriverPrivilege 332 WMIC.exe Token: SeSystemtimePrivilege 332 WMIC.exe Token: SeBackupPrivilege 332 WMIC.exe Token: SeRestorePrivilege 332 WMIC.exe Token: SeShutdownPrivilege 332 WMIC.exe Token: SeSystemEnvironmentPrivilege 332 WMIC.exe Token: SeUndockPrivilege 332 WMIC.exe Token: SeManageVolumePrivilege 332 WMIC.exe Token: 31 332 WMIC.exe Token: 32 332 WMIC.exe Token: SeCreateTokenPrivilege 2948 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2948 WMIC.exe Token: SeIncreaseQuotaPrivilege 2948 WMIC.exe Token: SeSecurityPrivilege 2948 WMIC.exe Token: SeTakeOwnershipPrivilege 2948 WMIC.exe Token: SeLoadDriverPrivilege 2948 WMIC.exe Token: SeSystemtimePrivilege 2948 WMIC.exe Token: SeBackupPrivilege 2948 WMIC.exe Token: SeRestorePrivilege 2948 WMIC.exe Token: SeShutdownPrivilege 2948 WMIC.exe Token: SeSystemEnvironmentPrivilege 2948 WMIC.exe Token: SeUndockPrivilege 2948 WMIC.exe Token: SeManageVolumePrivilege 2948 WMIC.exe Token: 31 2948 WMIC.exe Token: 32 2948 WMIC.exe Token: SeCreateTokenPrivilege 2948 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 2948 WMIC.exe Token: SeIncreaseQuotaPrivilege 2948 WMIC.exe Token: SeSecurityPrivilege 2948 WMIC.exe Token: SeTakeOwnershipPrivilege 2948 WMIC.exe Token: SeLoadDriverPrivilege 2948 WMIC.exe Token: SeSystemtimePrivilege 2948 WMIC.exe Token: SeBackupPrivilege 2948 WMIC.exe Token: SeRestorePrivilege 2948 WMIC.exe Token: SeShutdownPrivilege 2948 WMIC.exe Token: SeSystemEnvironmentPrivilege 2948 WMIC.exe Token: SeUndockPrivilege 2948 WMIC.exe Token: SeManageVolumePrivilege 2948 WMIC.exe Token: 31 2948 WMIC.exe Token: 32 2948 WMIC.exe Token: SeCreateTokenPrivilege 2696 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2820 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 1512 wrote to memory of 2820 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 1512 wrote to memory of 2820 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 1512 wrote to memory of 2820 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 35 PID 2820 wrote to memory of 332 2820 cmd.exe 37 PID 2820 wrote to memory of 332 2820 cmd.exe 37 PID 2820 wrote to memory of 332 2820 cmd.exe 37 PID 1512 wrote to memory of 2940 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 1512 wrote to memory of 2940 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 1512 wrote to memory of 2940 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 1512 wrote to memory of 2940 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 38 PID 2940 wrote to memory of 2948 2940 cmd.exe 40 PID 2940 wrote to memory of 2948 2940 cmd.exe 40 PID 2940 wrote to memory of 2948 2940 cmd.exe 40 PID 1512 wrote to memory of 2748 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 1512 wrote to memory of 2748 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 1512 wrote to memory of 2748 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 1512 wrote to memory of 2748 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 41 PID 2748 wrote to memory of 2696 2748 cmd.exe 43 PID 2748 wrote to memory of 2696 2748 cmd.exe 43 PID 2748 wrote to memory of 2696 2748 cmd.exe 43 PID 1512 wrote to memory of 2092 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 1512 wrote to memory of 2092 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 1512 wrote to memory of 2092 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 1512 wrote to memory of 2092 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 44 PID 2092 wrote to memory of 2352 2092 cmd.exe 46 PID 2092 wrote to memory of 2352 2092 cmd.exe 46 PID 2092 wrote to memory of 2352 2092 cmd.exe 46 PID 1512 wrote to memory of 1804 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 1512 wrote to memory of 1804 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 1512 wrote to memory of 1804 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 1512 wrote to memory of 1804 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 47 PID 1804 wrote to memory of 2764 1804 cmd.exe 49 PID 1804 wrote to memory of 2764 1804 cmd.exe 49 PID 1804 wrote to memory of 2764 1804 cmd.exe 49 PID 1512 wrote to memory of 3052 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 1512 wrote to memory of 3052 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 1512 wrote to memory of 3052 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 1512 wrote to memory of 3052 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 50 PID 3052 wrote to memory of 3056 3052 cmd.exe 52 PID 3052 wrote to memory of 3056 3052 cmd.exe 52 PID 3052 wrote to memory of 3056 3052 cmd.exe 52 PID 1512 wrote to memory of 1992 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 1512 wrote to memory of 1992 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 1512 wrote to memory of 1992 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 1512 wrote to memory of 1992 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 53 PID 1992 wrote to memory of 2992 1992 cmd.exe 55 PID 1992 wrote to memory of 2992 1992 cmd.exe 55 PID 1992 wrote to memory of 2992 1992 cmd.exe 55 PID 1512 wrote to memory of 3020 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 1512 wrote to memory of 3020 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 1512 wrote to memory of 3020 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 1512 wrote to memory of 3020 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 56 PID 3020 wrote to memory of 3060 3020 cmd.exe 58 PID 3020 wrote to memory of 3060 3020 cmd.exe 58 PID 3020 wrote to memory of 3060 3020 cmd.exe 58 PID 1512 wrote to memory of 2428 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 1512 wrote to memory of 2428 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 1512 wrote to memory of 2428 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 1512 wrote to memory of 2428 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 59 PID 2428 wrote to memory of 1448 2428 cmd.exe 61 PID 2428 wrote to memory of 1448 2428 cmd.exe 61 PID 2428 wrote to memory of 1448 2428 cmd.exe 61 PID 1512 wrote to memory of 1912 1512 d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe 62 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"C:\Users\Admin\AppData\Local\Temp\d626eb0565fac677fdc13fb0555967dc31e600c74fbbd110b744f8e3a59dd3f9.exe"2⤵
- Drops startup file
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5B5A656D-BA06-4513-8066-3AD760F9B88D}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5B5A656D-BA06-4513-8066-3AD760F9B88D}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3E91B04A-0BC4-4BAB-BF74-08777446362D}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3E91B04A-0BC4-4BAB-BF74-08777446362D}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{93AF445E-A32C-44C7-B6FB-6EB9D9A04561}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{93AF445E-A32C-44C7-B6FB-6EB9D9A04561}'" delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FB6B18B4-5504-413B-B044-3D25FDB26B92}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FB6B18B4-5504-413B-B044-3D25FDB26B92}'" delete4⤵PID:2352
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1B049153-6C3C-480B-985E-F0302FE119B1}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1B049153-6C3C-480B-985E-F0302FE119B1}'" delete4⤵PID:2764
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CCCF670A-4780-4309-9CB8-68E5925C94D8}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CCCF670A-4780-4309-9CB8-68E5925C94D8}'" delete4⤵PID:3056
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2859ADC8-8AD1-4A47-8A10-5C9DD9A7A71C}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2859ADC8-8AD1-4A47-8A10-5C9DD9A7A71C}'" delete4⤵PID:2992
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{54131EE6-EA75-497C-8A82-178E7D303DA2}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{54131EE6-EA75-497C-8A82-178E7D303DA2}'" delete4⤵PID:3060
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A27044CE-EB7C-454C-BD78-0DA46CB0BE29}'" delete3⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A27044CE-EB7C-454C-BD78-0DA46CB0BE29}'" delete4⤵PID:1448
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{685CB5DA-1E05-4616-B339-B19D16F949F2}'" delete3⤵PID:1912
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{685CB5DA-1E05-4616-B339-B19D16F949F2}'" delete4⤵PID:2228
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0769A821-A8B7-4FCB-ACEF-104F57C85804}'" delete3⤵PID:2484
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0769A821-A8B7-4FCB-ACEF-104F57C85804}'" delete4⤵PID:1700
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{88325A2F-6183-4F93-B855-70A68EF370AC}'" delete3⤵PID:2448
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{88325A2F-6183-4F93-B855-70A68EF370AC}'" delete4⤵PID:2200
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1D8E5239-7DE7-48DD-967B-A449B767B0DA}'" delete3⤵PID:1860
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1D8E5239-7DE7-48DD-967B-A449B767B0DA}'" delete4⤵PID:1636
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7ABC9F53-6682-4E8F-A665-9671155D0649}'" delete3⤵PID:1692
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7ABC9F53-6682-4E8F-A665-9671155D0649}'" delete4⤵PID:2580
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F70E118E-26D8-47DF-BF1F-6685C95E0B89}'" delete3⤵PID:1032
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F70E118E-26D8-47DF-BF1F-6685C95E0B89}'" delete4⤵PID:2476
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C8148903-0D44-4A5C-A9BD-07231CB6826D}'" delete3⤵PID:2792
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C8148903-0D44-4A5C-A9BD-07231CB6826D}'" delete4⤵PID:1924
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F7B1F25A-FA5B-4417-B916-1283F4EFACEB}'" delete3⤵PID:1556
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F7B1F25A-FA5B-4417-B916-1283F4EFACEB}'" delete4⤵PID:1772
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{60AA7F46-8021-4462-86AF-35F37EB41ECA}'" delete3⤵PID:836
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{60AA7F46-8021-4462-86AF-35F37EB41ECA}'" delete4⤵PID:2668
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2440
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f38a00e0bbd1ac56cfcf95c04f8d9dc
SHA145a9c65ed43fb40a6a2ca8d18a99e6d7631d8f96
SHA256a28b1c27eb219b732ad8ac0b79d0d750b1607f32b5f5e08757e922ec338fb39e
SHA5122fffd22f9cce917a0498b327b80226b1c96b9a0d1549c3c4eb5199b946fb33970a9e8753fc6e279ee00b43d91e00541ffe3a85ebdced8235bb90cae0a6b6b8c0
-
Filesize
7KB
MD5fa931798b5116944b2d51b58bfe92c2c
SHA15fe3343320066363f109b5c725956c5a46afc958
SHA25636a6fd35934cb640f9f5c354425cd37704d022ec42b3e9b543218198ce541dbc
SHA512500016209b4372077810d2223993a96e1e56caa99a185b5d8b44ab74d10c6403f2b3db2295f94098258362856e4477e87c7ea54a3de544840c845f770997a90f