Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
04/03/2025, 15:32
250304-syy8estrw6 1031/01/2025, 12:59
250131-p8d4fswmbx 1027/01/2025, 15:12
250127-slapastrfy 1024/01/2025, 15:20
250124-sqxpmawncj 1022/01/2025, 17:56
250122-wjahasypaj 1021/01/2025, 17:40
250121-v8zcaawjcj 1021/01/2025, 15:38
250121-s26fxa1ndk 1021/01/2025, 14:09
250121-rglekaxlcw 10Analysis
-
max time kernel
279s -
max time network
281s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/03/2025, 15:32
Behavioral task
behavioral1
Sample
2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe
Resource
win11-20250218-en
General
-
Target
2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe
-
Size
352KB
-
MD5
07244d8bbd0721454ea97e696b6e85d3
-
SHA1
06bc9b13360ac74b019cab18c96cc888474afc52
-
SHA256
6d4fdb81ba3d3005f83e87f1b28fd48fbfe213a6dd164b95d939b9391faff82e
-
SHA512
73c5fa9ee0bf8f91daa41f15932b0138329990d192bda0b75b90bd2f70fc8aaab28f509c9562355942a0563c418c96f99c0322e149e8c9b6d8ff83f14e3a8061
-
SSDEEP
6144:gV3r9iXlkEt9RGv5IKp/ntL2FJGAJRaWJ1rQPNDEDKx22LV:gglkEHshIKpvtg4AJRaWkp
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral1/memory/2136-1-0x0000000000510000-0x000000000053C000-memory.dmp family_chaos behavioral1/files/0x001a00000002affe-6.dat family_chaos -
Chaos family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1496 bcdedit.exe 3352 bcdedit.exe -
pid Process 1868 wbadmin.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4384 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2287204051-441334380-1151193565-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mzpws62np.jpg" svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 720 vssadmin.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133855762131151996" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2287204051-441334380-1151193565-1000_Classes\Local Settings svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2092 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4384 svchost.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4384 svchost.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe Token: SeDebugPrivilege 4384 svchost.exe Token: SeBackupPrivilege 2112 vssvc.exe Token: SeRestorePrivilege 2112 vssvc.exe Token: SeAuditPrivilege 2112 vssvc.exe Token: SeIncreaseQuotaPrivilege 1256 WMIC.exe Token: SeSecurityPrivilege 1256 WMIC.exe Token: SeTakeOwnershipPrivilege 1256 WMIC.exe Token: SeLoadDriverPrivilege 1256 WMIC.exe Token: SeSystemProfilePrivilege 1256 WMIC.exe Token: SeSystemtimePrivilege 1256 WMIC.exe Token: SeProfSingleProcessPrivilege 1256 WMIC.exe Token: SeIncBasePriorityPrivilege 1256 WMIC.exe Token: SeCreatePagefilePrivilege 1256 WMIC.exe Token: SeBackupPrivilege 1256 WMIC.exe Token: SeRestorePrivilege 1256 WMIC.exe Token: SeShutdownPrivilege 1256 WMIC.exe Token: SeDebugPrivilege 1256 WMIC.exe Token: SeSystemEnvironmentPrivilege 1256 WMIC.exe Token: SeRemoteShutdownPrivilege 1256 WMIC.exe Token: SeUndockPrivilege 1256 WMIC.exe Token: SeManageVolumePrivilege 1256 WMIC.exe Token: 33 1256 WMIC.exe Token: 34 1256 WMIC.exe Token: 35 1256 WMIC.exe Token: 36 1256 WMIC.exe Token: SeIncreaseQuotaPrivilege 1256 WMIC.exe Token: SeSecurityPrivilege 1256 WMIC.exe Token: SeTakeOwnershipPrivilege 1256 WMIC.exe Token: SeLoadDriverPrivilege 1256 WMIC.exe Token: SeSystemProfilePrivilege 1256 WMIC.exe Token: SeSystemtimePrivilege 1256 WMIC.exe Token: SeProfSingleProcessPrivilege 1256 WMIC.exe Token: SeIncBasePriorityPrivilege 1256 WMIC.exe Token: SeCreatePagefilePrivilege 1256 WMIC.exe Token: SeBackupPrivilege 1256 WMIC.exe Token: SeRestorePrivilege 1256 WMIC.exe Token: SeShutdownPrivilege 1256 WMIC.exe Token: SeDebugPrivilege 1256 WMIC.exe Token: SeSystemEnvironmentPrivilege 1256 WMIC.exe Token: SeRemoteShutdownPrivilege 1256 WMIC.exe Token: SeUndockPrivilege 1256 WMIC.exe Token: SeManageVolumePrivilege 1256 WMIC.exe Token: 33 1256 WMIC.exe Token: 34 1256 WMIC.exe Token: 35 1256 WMIC.exe Token: 36 1256 WMIC.exe Token: SeBackupPrivilege 4532 wbengine.exe Token: SeRestorePrivilege 4532 wbengine.exe Token: SeSecurityPrivilege 4532 wbengine.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4384 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 85 PID 2136 wrote to memory of 4384 2136 2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe 85 PID 4384 wrote to memory of 2312 4384 svchost.exe 86 PID 4384 wrote to memory of 2312 4384 svchost.exe 86 PID 2312 wrote to memory of 720 2312 cmd.exe 88 PID 2312 wrote to memory of 720 2312 cmd.exe 88 PID 2312 wrote to memory of 1256 2312 cmd.exe 91 PID 2312 wrote to memory of 1256 2312 cmd.exe 91 PID 4384 wrote to memory of 5084 4384 svchost.exe 93 PID 4384 wrote to memory of 5084 4384 svchost.exe 93 PID 5084 wrote to memory of 1496 5084 cmd.exe 95 PID 5084 wrote to memory of 1496 5084 cmd.exe 95 PID 5084 wrote to memory of 3352 5084 cmd.exe 96 PID 5084 wrote to memory of 3352 5084 cmd.exe 96 PID 4384 wrote to memory of 560 4384 svchost.exe 97 PID 4384 wrote to memory of 560 4384 svchost.exe 97 PID 560 wrote to memory of 1868 560 cmd.exe 99 PID 560 wrote to memory of 1868 560 cmd.exe 99 PID 4384 wrote to memory of 2092 4384 svchost.exe 104 PID 4384 wrote to memory of 2092 4384 svchost.exe 104 PID 4968 wrote to memory of 4512 4968 chrome.exe 111 PID 4968 wrote to memory of 4512 4968 chrome.exe 111 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 2572 4968 chrome.exe 112 PID 4968 wrote to memory of 1088 4968 chrome.exe 113 PID 4968 wrote to memory of 1088 4968 chrome.exe 113 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 PID 4968 wrote to memory of 4960 4968 chrome.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:720
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1496
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:3352
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:1868
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2092
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4564,i,15195321112227810029,13870653243844057049,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:141⤵PID:1088
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2520
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=3800,i,15195321112227810029,13870653243844057049,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:141⤵PID:1956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff93457cc40,0x7ff93457cc4c,0x7ff93457cc582⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4460,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4472,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4592 /prefetch:82⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4724 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4612,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4336,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5040,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3684,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5080,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5088,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5464 /prefetch:22⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD584eb6217c4cc3bc8f04e7c4a8774fe14
SHA13e44964680921436338f08e8969da68e503c6276
SHA256d82274223200f877cd6d2e7a69d8689c7cfd0965008f840804eba08b79181ad8
SHA5120568d2b52624427a9b7f423b230ed075f594118bd0c0a5502c75ea18a361266ee6d26146c40bc044098ceedd3e205517ae8193d5197406f015299ffd41f7f081
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5da67be7a3c2e0e5b2a49eb8cd07e06a1
SHA16253ddecf7ef10d112006c0768b9dc971efbfaa4
SHA256c97975750ef434089e26e56d99a7b2cc4384b31adda94aed3d797d3ce320fb2a
SHA512fe0b8d92a70aeddc0c4277d25bf4682a96f932ce412c89315b119cffc600d53af8ac9733ab699e48c9eff9690c9f721b8c9d81d3efbfb769a0c452dc93abff98
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD509506ad10a2ad17ea63b9a7c01dcc2e9
SHA1275096a32349a4cf64f707420bf2f7d1b6f449b3
SHA256c87fa604fb67a1b4deeff334e4eed1aadaf4305e58bf88cb03c52615c25cf743
SHA512f26fdb1e11fc570dc02fd25bac391902a28a0ff5a7029be3c728736b873af886580989a0a52879a576e9e02bb33af82974a80111cab234fcc7e7f99f222d03b9
-
Filesize
8KB
MD58537f90e62e706b266f1195e90776869
SHA198965c7aba7b53198fa216970bef17cb810d652f
SHA256095ca2d8d26a83615c24a3a71fbdeb84865122ed5e50e189de1931f913179628
SHA5129f6026a09e00ffd61d4dc721d4d2166daee49ac47d2c3aeb593a55fbaa980ea2594f0c8d37cbfe83fe44d2bd2848a2db96b153c3c7000ebea9e16cf794974379
-
Filesize
15KB
MD51cf6a8970486e4c0664a8bb056f89d80
SHA1342ac8e7c29790397bb5e5d06c4168060f44fd48
SHA256204df95987d3aed3c4ec82e31cda471a8bd29370dd52d23fc8e90871c5d8dd2b
SHA5120fd208e1abfd5129827645ac11a6dde58ead2bc91a154d952eed05456d7f28a8f121980c99026bc16aadf54b169ea6c5674d6d7442046aa8005008f289610087
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f7a28d878d46e5171dc74ce597fee6e5
SHA1b6c6e44f928868feed2f05e9ac1edd48cd120b0b
SHA256e58a23a73ddb89fe2a7fc5e4daae905cb9c52815d4b1e10e1b199c72f4f75e4a
SHA512a2b15141204d3572190d83d7d2d4a12f3bf551f5fb0dbb66936645d3d6819a20fbae274b2ec88cba71d42f31e63e179ee3a4b3b3f79a1c0e78debea6b22b8958
-
Filesize
244KB
MD530dbe266b97991562df3d22de770eb07
SHA177d35418c9e6374d69db8dab2dcbd3e79a463c25
SHA256cf881bceb93f471898998df9f7339730c5c2933bdd7bee4cc1dbeaf0e1a4d1f0
SHA51262e404f2c1e756b22670f553aab057d269dfe351b9746da7dea5e266ac0559d4a520675e3c68d88106c859955fe16c36bc550676385470bb4c4bc0e59179806b
-
Filesize
244KB
MD541508cf1b432a44fdbfa63794b6fe505
SHA11de09711022c8dad5a11e0ea61be4c93b9e17205
SHA2562da2b0256fa04115e1eb0c4a5d1a5b5c8fc63604fc2c31b99626e416aad422f0
SHA512e1a250591d0fd490ea3fa35804611a331164c895352a56076916bc937280d7653bd9b1594f6e16d17ca18c43ed67b8b29b279f482336249f7c129f62c22bcfc4
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
352KB
MD507244d8bbd0721454ea97e696b6e85d3
SHA106bc9b13360ac74b019cab18c96cc888474afc52
SHA2566d4fdb81ba3d3005f83e87f1b28fd48fbfe213a6dd164b95d939b9391faff82e
SHA51273c5fa9ee0bf8f91daa41f15932b0138329990d192bda0b75b90bd2f70fc8aaab28f509c9562355942a0563c418c96f99c0322e149e8c9b6d8ff83f14e3a8061
-
Filesize
120B
MD58a4a98a8bfe11567dd16d06ddc364346
SHA1ed94fda66affe31abe3002f8e702c3ddd5e37ba8
SHA25648236cc3c7a1316f9f61201f2937c9653b9e6c8f6b038f9a94fbe7a3a3153cd3
SHA512662ae12eee1180e34a41a4e2b018cae970fabeb446a9d8e82c692ca32d52ebadccc8a465b7dce4988af9f37d42dcfaec7b028e6a3c107b9b6cdc81e345770141