Analysis
-
max time kernel
108s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
Resource
win10v2004-20250314-en
General
-
Target
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe
-
Size
31KB
-
MD5
dd7f88a68a76acc0be9eb0515d54a82a
-
SHA1
ca205a28b8dbd74c60fdeaf522804d5a2a45dd0b
-
SHA256
30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8
-
SHA512
8e99c1d3291dacaf13c7aff75549d50484b593022bdb82cb3ecffd58f0bbf1dd1ae4deeb09f072d4c3f1b8918a0bc785a397143863466975dad950e115db5af6
-
SSDEEP
768:73QN4DGrqBLP977YowZe478mR26fgjVyBm8Je7tFv/7iJFzMWe:7gdoT93DaRXf5B+tFcJe
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\bg-BG\How To Restore Your Files.txt
https://i.imgur.com/RzYzVnY.png
https://i.imgur.com/kJzIOqn.png
https://i.imgur.com/bFdNbyO.png
http://babukq4e2p4wu4iq.onion/login.php?id=0KflFXBAmSHtJrtKWtOPzxZmhJATon
Signatures
-
Babuk Locker
RaaS first seen in 2021 initially called Vasa Locker.
-
Babuk family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1955) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\How To Restore Your Files.txt 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\H: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\K: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\Z: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\B: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\N: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\A: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\S: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\J: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\L: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\Q: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\E: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\Y: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\U: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\P: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\G: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\M: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\W: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\R: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\T: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\X: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\V: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe File opened (read-only) \??\I: 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1720 vssadmin.exe 2252 vssadmin.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133870542185332451" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeBackupPrivilege 2964 vssvc.exe Token: SeRestorePrivilege 2964 vssvc.exe Token: SeAuditPrivilege 2964 vssvc.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe Token: SeShutdownPrivilege 3080 chrome.exe Token: SeCreatePagefilePrivilege 3080 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe 3080 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4448 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 4236 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 86 PID 2060 wrote to memory of 4236 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 86 PID 4236 wrote to memory of 2252 4236 cmd.exe 88 PID 4236 wrote to memory of 2252 4236 cmd.exe 88 PID 2060 wrote to memory of 3924 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 113 PID 2060 wrote to memory of 3924 2060 30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe 113 PID 3924 wrote to memory of 1720 3924 cmd.exe 115 PID 3924 wrote to memory of 1720 3924 cmd.exe 115 PID 3080 wrote to memory of 3940 3080 chrome.exe 126 PID 3080 wrote to memory of 3940 3080 chrome.exe 126 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 2324 3080 chrome.exe 127 PID 3080 wrote to memory of 4788 3080 chrome.exe 128 PID 3080 wrote to memory of 4788 3080 chrome.exe 128 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 4824 3080 chrome.exe 130 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 4824 3080 chrome.exe 130 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 PID 3080 wrote to memory of 1924 3080 chrome.exe 129 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe"C:\Users\Admin\AppData\Local\Temp\30fcff7add11ea6685a233c8ce1fc30abe67044630524a6eb363573a4a9f88b8.exe"1⤵
- Checks computer location settings
- Drops startup file
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1720
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:1984
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4448
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\How To Restore Your Files.txt1⤵PID:2944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd53dcdcf8,0x7ffd53dcdd04,0x7ffd53dcdd102⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1980,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1976 /prefetch:22⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2284 /prefetch:32⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3028,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2976,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2988 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2404,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4308 /prefetch:22⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4712,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5300,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5500,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5616,i,4436042611832833153,2677537345262850444,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5200
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\69c09967-fa2c-4ed2-ace7-76cda03e3cf0.tmp
Filesize11KB
MD5a89567d974f433a18a0739655129371f
SHA1cccb2c29ffa19a74e5a4d6901981bf28d7bd659c
SHA256aa1541bbb46dbc6ee941e14cb9ecd2c167d9c80f15e89244a11b57c4151e89c0
SHA512164a24404193f4e5f55d0d407f364c7547423f9c0504cfa5d5b7b8786f7bd0897b94aeb9a80537773dd7eef7e6295db3ebb6f051dde78507fc5b82f56ea268a7
-
Filesize
649B
MD5d93fc8b5fefb9f966f2eeb6c604d0ece
SHA135553d0f58e64791c10baf77ce61d60c6d8d3f00
SHA2567898e73ffc9300bbb88292e0b01e943c1dc0bdb708b2a986c5540b40221ecadf
SHA5121ca8191ad78bfbeb6623b124d57b772b76da2f4b97e0c58f6c3f4f87386260cd77c55952d5460dd0940530c96250ad1ebe7cfe90c3effd8123e0d24e895ec6d3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD54af315a28559a53ff8dc280d98063a5f
SHA1eb6b5482a0454ddc74e5d5a4e020496485c33ed9
SHA2568d9dd9faf684c416f1ff2f8d60c08b7bf1177c3cd66518e91b5d2f4076b4d99e
SHA512112a856195055372c1e8878e6a2cd2f7e72e5db0e97c7f2591cbe9418f13a5bf7ddcabfe469d7901397fb8bc6aa4c4d706c92580db70cfdd2d4eb1a6bcf277e9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD56a494b540c82231f367bd484b7d2023c
SHA1bbd6787dc04a1a484078907e54ab5d13d93cd207
SHA2569f468e6bab1fd210c6ab4f3dcd3f86067b34af1063ec58eea3ebbb9f7a238b7d
SHA51240e8d2f7acfb24f62e39109646c2e1b32c0d09a273874ce39c968edbdd6a965dbbf6477200314374aa37f9bcb9e7324b899b1e5fcf71ee3898eaae2cd6b5ea77
-
Filesize
10KB
MD5a70c785fe003d2cacedec7092ad34f9e
SHA1ac19f18920b9c3a7ed994d86f7a6362822f03982
SHA25621b2aba3b5ce9720e26d0471bba2528bdd54535ff2cce51794a925e4e57a44ed
SHA512ed0c35a273252f064c742045fa42ea18d3a2da422e3098797c42a2fd7861047624fba7a6ef604f68627996cdf8b5ab15b9f6a4a094d2f41cb8f324151d1f050f
-
Filesize
15KB
MD5509b2996ef35eb3956f7f5df363beb2d
SHA19435dde2ca5d0d3c75cf63113f4f3bad6c685e89
SHA256d062c6a79ca58db3a026cf42e1d2ff16951c54b659c77bd0032a75f948798090
SHA5120f310e26fedcc5eb4413fd8929fef33816cf669691dd6f45d054b244337c2095ddfb1412557034fdf00004cf8b6be5cce6b6b88a733e7efb8125b02857c83033
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57d68fde402c288d04646ed94e8bec3fa
SHA195bc09672f4c164cc10ebb3b7da4824cf092c237
SHA25652882897ea006c792caa5e1072916ad22a1799077669f1dde55f37cab8d7cd5e
SHA5124a8edc26df0f247a31c9c85e6da735b069c870d4dd374dcfb25538de03d8c87799310d0cd8e1556c7d0277a4eeb405d8928f454ee0b84ca6ff2c588cd4a8d74b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58f7b9.TMP
Filesize48B
MD5ff5334b7366de18c565e9be89eda6c9b
SHA16b2b517c6c638241c7c5ac10ff1d89687c3600a8
SHA25604ce5dcfbee085055184dab0d1493ff18c114304239707e12b163ef47e2a90fd
SHA512128dacd2f8fb29cb9e6289411b69e3426a16addad2925c057ffe1e6d340715325a00f59ac68e416dd31254df2c44dab3b537594bf9ba192c799de85920446526
-
Filesize
155KB
MD53e948ab1e6b41f5c48a117528c29ccea
SHA19e243ccf8c584713d515f479e6be404c66ba2cca
SHA2563ec369adbded0c3c2123e63901777d9349f654a7ef53f8c7ae084112364a3c37
SHA5125e4842b261b796a69f0774f2e4c39c3babc4bd6791ad4e33c8ea283619a62838c953d598fe05940e20ae37641c0fb14f1f0a1bf1ac83c742e078bc1cedc16686
-
Filesize
80KB
MD5ec1254b42baca7e0cfce669e554e32ba
SHA15880e95b246864d26afe34b4184d57e87d844c87
SHA256740a6379869f7886aabbd927e317c8f578ddc61a897be71a257af2390f245626
SHA51270e44ac65bd1944b946e6ced054c8cf389acaf7106f5c0df9e424c86399ae7186bccec31c46aa02ca16c0da47a83c3cdd56bf633bdc110180ad6d4c8f13262f8
-
Filesize
155KB
MD56e369531743ddf305caf3e337f48aca3
SHA1673ac537b41774b1a1e76f266375ab4d3ab16a26
SHA2561cfbce66dc984761878f10b0b5c87a4c8883833c5785256a4871dc64e0d0ffb6
SHA51249f2fe830afb1e77d072690bcc2f382155e4df826b66a0a52d2995ad7a4ab8f3b77aa3b79ad94c9f4de5d6764c952c1a3c5fc650741ba70fc57b47c19b9bf4fe
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize19KB
MD589aa298f72b0c0c0fb31c83619334546
SHA17194f13435a9f12059c66ac307616656ae6cf885
SHA256548f73e4c8bf08bbf69158d21c92e13e7fd0c4a717396cfbf6098ad12b603396
SHA512f6bd3287b68a92c60ff8cc529647fed9d55df48bf3273443ea332d68e0272b6639835cd189f2b6af0ca58caac437f968519b79cfca014d06cc010cbf757079c3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize21KB
MD538fbc9f33b19300015e6cd6a8d3ee49d
SHA176d00a655754ca457647f3fb3f0b820180d3621c
SHA256ac7b17cd71bbad500d16ee92fc5b8b51fb755201d3781b8bc01aea44662259d1
SHA51272490fa396cc699726b74fd0259da9a38b5aefd23047437cdd10406230b90789c71563b7154a20f30b22ac86b81f271f30902da9d52fc19f6da23b8d6682ffe8
-
Filesize
1KB
MD54696310ca321ce5a34e879b4e8b0611a
SHA189082071a1e6d3379a923ef6a39903cc05dfe495
SHA2561f366b81cfa615b53eb24345d09abee973b2b82778f5f21f8ee31fbe13e7d92a
SHA51294bfbe6b23e73435a30c6f1bb94970bf9eaa1d9cea0e38d654e23be28ff3802dbabb3984087784a3a99b12f6517389378f1d4c3016b15b6b05a498293480c7d5