Analysis
-
max time kernel
135s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 00:29
Behavioral task
behavioral1
Sample
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
-
Size
1.6MB
-
MD5
4c0e5c4aa3eb66907cf32b7bd869dd8f
-
SHA1
2f97ad58991c727a897f4613e00d6b24a3300a85
-
SHA256
31aa2f05a7cd0b81002336c0f0b5397415b9ee70250862f91215e2bc4bb571d8
-
SHA512
56ddad28ad605fe95b4b8f1ea00a130db1e07e082391ce2a1c8336d4ee6f177d1d9806b8a5e200ddc2bf7319f9ba44f194cb48f52f3e9f2c689e7d9b502eea51
-
SSDEEP
24576:T1I8mdFc9nPV3EouDm6BkNEnzC5CW78UV:OFc3C37zCyG
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 3 IoCs
resource yara_rule behavioral1/memory/816-1-0x0000000000B30000-0x0000000000CCE000-memory.dmp family_chaos behavioral1/files/0x00100000000122f3-6.dat family_chaos behavioral1/memory/2388-8-0x0000000000130000-0x00000000002CE000-memory.dmp family_chaos -
Chaos family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1640 bcdedit.exe 2216 bcdedit.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
pid Process 2404 wbadmin.exe -
Disables Task Manager via registry modification
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\UpdateTask = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4TDQSVWU\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G0UQMQ1C\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BBWU148F\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini svchost.exe File opened for modification C:\Users\Public\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ADWO43R6\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini svchost.exe File opened for modification C:\Users\Public\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4KNYJNXZ\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SEGJVAZC\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini svchost.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Public\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rzxjl1ptq.jpg" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2956 vssadmin.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2392 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2388 svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 816 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 816 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 816 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 2388 svchost.exe 2388 svchost.exe 2388 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2780 explorer.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeDebugPrivilege 816 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe Token: SeDebugPrivilege 2388 svchost.exe Token: SeBackupPrivilege 2940 vssvc.exe Token: SeRestorePrivilege 2940 vssvc.exe Token: SeAuditPrivilege 2940 vssvc.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeIncreaseQuotaPrivilege 860 WMIC.exe Token: SeSecurityPrivilege 860 WMIC.exe Token: SeTakeOwnershipPrivilege 860 WMIC.exe Token: SeLoadDriverPrivilege 860 WMIC.exe Token: SeSystemProfilePrivilege 860 WMIC.exe Token: SeSystemtimePrivilege 860 WMIC.exe Token: SeProfSingleProcessPrivilege 860 WMIC.exe Token: SeIncBasePriorityPrivilege 860 WMIC.exe Token: SeCreatePagefilePrivilege 860 WMIC.exe Token: SeBackupPrivilege 860 WMIC.exe Token: SeRestorePrivilege 860 WMIC.exe Token: SeShutdownPrivilege 860 WMIC.exe Token: SeDebugPrivilege 860 WMIC.exe Token: SeSystemEnvironmentPrivilege 860 WMIC.exe Token: SeRemoteShutdownPrivilege 860 WMIC.exe Token: SeUndockPrivilege 860 WMIC.exe Token: SeManageVolumePrivilege 860 WMIC.exe Token: 33 860 WMIC.exe Token: 34 860 WMIC.exe Token: 35 860 WMIC.exe Token: SeIncreaseQuotaPrivilege 860 WMIC.exe Token: SeSecurityPrivilege 860 WMIC.exe Token: SeTakeOwnershipPrivilege 860 WMIC.exe Token: SeLoadDriverPrivilege 860 WMIC.exe Token: SeSystemProfilePrivilege 860 WMIC.exe Token: SeSystemtimePrivilege 860 WMIC.exe Token: SeProfSingleProcessPrivilege 860 WMIC.exe Token: SeIncBasePriorityPrivilege 860 WMIC.exe Token: SeCreatePagefilePrivilege 860 WMIC.exe Token: SeBackupPrivilege 860 WMIC.exe Token: SeRestorePrivilege 860 WMIC.exe Token: SeShutdownPrivilege 860 WMIC.exe Token: SeDebugPrivilege 860 WMIC.exe Token: SeSystemEnvironmentPrivilege 860 WMIC.exe Token: SeRemoteShutdownPrivilege 860 WMIC.exe Token: SeUndockPrivilege 860 WMIC.exe Token: SeManageVolumePrivilege 860 WMIC.exe Token: 33 860 WMIC.exe Token: 34 860 WMIC.exe Token: 35 860 WMIC.exe Token: SeBackupPrivilege 1940 wbengine.exe Token: SeRestorePrivilege 1940 wbengine.exe Token: SeSecurityPrivilege 1940 wbengine.exe Token: SeShutdownPrivilege 2780 explorer.exe Token: SeShutdownPrivilege 2780 explorer.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe 2780 explorer.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 816 wrote to memory of 2388 816 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 30 PID 816 wrote to memory of 2388 816 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 30 PID 816 wrote to memory of 2388 816 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 30 PID 2388 wrote to memory of 2884 2388 svchost.exe 31 PID 2388 wrote to memory of 2884 2388 svchost.exe 31 PID 2388 wrote to memory of 2884 2388 svchost.exe 31 PID 2884 wrote to memory of 2956 2884 cmd.exe 33 PID 2884 wrote to memory of 2956 2884 cmd.exe 33 PID 2884 wrote to memory of 2956 2884 cmd.exe 33 PID 2884 wrote to memory of 860 2884 cmd.exe 38 PID 2884 wrote to memory of 860 2884 cmd.exe 38 PID 2884 wrote to memory of 860 2884 cmd.exe 38 PID 2388 wrote to memory of 2000 2388 svchost.exe 40 PID 2388 wrote to memory of 2000 2388 svchost.exe 40 PID 2388 wrote to memory of 2000 2388 svchost.exe 40 PID 2000 wrote to memory of 1640 2000 cmd.exe 42 PID 2000 wrote to memory of 1640 2000 cmd.exe 42 PID 2000 wrote to memory of 1640 2000 cmd.exe 42 PID 2000 wrote to memory of 2216 2000 cmd.exe 43 PID 2000 wrote to memory of 2216 2000 cmd.exe 43 PID 2000 wrote to memory of 2216 2000 cmd.exe 43 PID 2388 wrote to memory of 944 2388 svchost.exe 44 PID 2388 wrote to memory of 944 2388 svchost.exe 44 PID 2388 wrote to memory of 944 2388 svchost.exe 44 PID 944 wrote to memory of 2404 944 cmd.exe 46 PID 944 wrote to memory of 2404 944 cmd.exe 46 PID 944 wrote to memory of 2404 944 cmd.exe 46 PID 2388 wrote to memory of 2392 2388 svchost.exe 51 PID 2388 wrote to memory of 2392 2388 svchost.exe 51 PID 2388 wrote to memory of 2392 2388 svchost.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2956
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1640
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2216
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:2404
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2392
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2780
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582B
MD5ed5cc52876db869de48a4783069c2a5e
SHA1a9d51ceaeff715ace430f9462ab2ee4e7f33e70e
SHA25645726f2f29967ef016f8d556fb6468a577307d67388cc4530295a9ca10fdfa36
SHA5121745aefb9b4db4cdd7c08ee3a7d133db08f35a336fd18b598211519b481ef25ac84a3e8a3da3db06caef9f531288d1cf0ca8d4b2560637945e7953e8b45421f5
-
Filesize
1.6MB
MD54c0e5c4aa3eb66907cf32b7bd869dd8f
SHA12f97ad58991c727a897f4613e00d6b24a3300a85
SHA25631aa2f05a7cd0b81002336c0f0b5397415b9ee70250862f91215e2bc4bb571d8
SHA51256ddad28ad605fe95b4b8f1ea00a130db1e07e082391ce2a1c8336d4ee6f177d1d9806b8a5e200ddc2bf7319f9ba44f194cb48f52f3e9f2c689e7d9b502eea51
-
Filesize
246KB
MD56acd963970ad2b322f39384c173473c0
SHA1fbfa48c131bc85176229cf7a2da3752591324a94
SHA2569c8ea3fdf0a1444c95c73313116ff171e665c09142cf6b9fd8dedc58753e5270
SHA51290706910784e0af98a80aa91baa68a28ea47f37d1db9aae048efa6f1eb178e204cca42372c768155e61feb5e6d5f82996f8ecd242a2b07ffdacc5a71ae1557a2
-
Filesize
10KB
MD567c9d57c117ef7b65c15f2feb1ddc722
SHA1c97eae2c086ae1ae12409922942811cf0ff7091e
SHA2566155defa9ecf62f2537745c73d238c1c720820ecb41ebfddf30aa04743709669
SHA512ecff0f8872733144d27c1a80c1e2b3e35ac630d96c2095c6a90dad05fa3f37285021c0a2d92ae5d25f90cac9391367b14833bf774da5fede0c2e167dcef872cd
-
Filesize
373KB
MD54c489046dcb7976dad1348d78045d7e2
SHA1f8ff4c8be381ab880153a059270f8c29e21db07e
SHA256ff7c4a5f53fd917db22daabcaa7800e4551b15302880607ba3f111b3531e82ae
SHA5124f39cde288e635e6d735f228df385d3f468c9f435d827b770d9dfac8388989c3224cbda2366a25e9242e6566eef2a1f9a3b3ec1fe8fb5244ccf686835bf7d4b5
-
Filesize
1B
MD5d1457b72c3fb323a2671125aef3eab5d
SHA15bab61eb53176449e25c2c82f172b82cb13ffb9d
SHA2568a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1
SHA512ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0
-
Filesize
212KB
MD536399cec0878b9d4e52b5bf52ee4881a
SHA1533aa54dcdbec8a98f844fa82efc2fe786271fb3
SHA2567a9aa861cf69a9c4d8ad1b68206291d8305276f0ea138e3f097b7e08286fa9cf
SHA51285ab229b42bc8dfeb4c0c7039f42afad5a081b7397262ff27131a8b64e4796500f80f9aa51f0282fcc4317b9cea32e4a4a444f3b538bd266e3046801fba73e1e
-
Filesize
562KB
MD555d159cd5df8b36f4c6493d7a8b74132
SHA1220fa3eb9ab1e98822b1562913f83285cd9fa790
SHA2565518e2ce8b7e7bcd6c739d643c789451d82d56ea4907cdc83910215f3c939aa0
SHA512f7ab712e1d01092e9b7690aa5599a9169617ecb42685cf0a5dc345a5934071ed9cdeb6075772e496a0dd9891fa711c9c9c228d455b6fbc49c5b1e67a7dc3d4c9
-
Filesize
384KB
MD56b5d612dbfec090e7d7a84a200f5115c
SHA1ab0e03c36be626df83f0bff593914521404af2fd
SHA2565639ad12cd75f26e47f9a0ff77881419cd76402509a9480269b564ec6506d24f
SHA512775aa5e9bb9f095f58c9740e4798b2adff45422dfe45c254b05ad6ba0eb31eea660a06494df331becade780f21046430143e07b85ddd17d1f2613d57f1f58197
-
Filesize
143KB
MD5ec9bc460a31c54673d2d77d3ea4e4cb8
SHA1f272f5a5eb7e46278a0775b4d8bf56848418a98a
SHA256177f3bce2da45f46a3ab5791d01a8997278aa933ddf0f7fd053d7ed8d8cf601d
SHA512fed22eb7faad5dbc14b7266d729a8edf04ee8068907c4aeda47accc4b815c6f2abaddbed8c364f53dd336f96b4a113d4617458202990e2e1cf8529c84e1ed336
-
Filesize
201KB
MD56c38d90cf35ed8f79394719e86d54432
SHA1398f75512b111e2d3e16e9c4783972ad1e473e17
SHA2569f6f807dff3e77cb57546c0ed91c14214df7a1f0a57321c6750a659a5016cf03
SHA512e08fa14cd1d92ea5f0589f4fb08cbced33acd74880f8945a73bf38333f5706a1ca4e37f1b09dadcaa3021f5d42db78e4a486096a6c0bc6d3b783c2ef2b2241ae
-
Filesize
155KB
MD51dabcd1838cd8d7ab3cee458f73c029b
SHA18087b98cd16f652c2eedb31a5c5db1e45f7e4896
SHA2569de45749ee9c0a8d1967ca55cad7c6ec5fd44b0d6045a7b41d3c581fa6337a31
SHA51221c793f26b1a6ebe104aa43e43740f43eb4f548d649efed23a3e1b7cb3cf1eec55b29c40088c0a67948a5ba943066f15cb66c5285f5e961126355c448edb5ce0
-
Filesize
15KB
MD5abaae5b324d1f2076c652fa64bc1ce3b
SHA16ae88359e847e5e931b6975952f74b4793463c33
SHA25621e61c1366ca11ca4dd8821a9f5a55de7f0caccc673969704eb5247e575702aa
SHA51211ccf9e9f915414ee6b7e8f153928185ec82e8ea39bf4de73bf09430da91c609d014371ded7d193604f6eb266ac12b81ab7444429e2099b357685f06df27e5c3
-
Filesize
396KB
MD5bab4a5843a7148ca5e7558465059c730
SHA1db4cd1f400252f6a73b0881b64853e93a074880e
SHA2563b2972514b49fb1afc9f8cea867fd8f61a6cc1c3658b8f19f131193e458b65fd
SHA512328c1dc305c28d3aa128ede64a8f0f35ac3f2dde8443f3e5be496c2100183b00191781d061eba601f5d3e2ac599f56a28e0e8cccadef44cc13695c6c4798908b
-
Filesize
189KB
MD5b43e4ae9e55980811c6e6fa2740bc385
SHA19c055648840cea6076a71c64db93025bc23bc1ab
SHA256fe6f0e41abbf4d4f2cf7415a053839b6e37b2ff24e8507fe14d4c82f81aac16b
SHA5127e6995b406eb7f235477037ed283e72ea349580eb4cd075c59281b67ea98b6a0165d8d4420c166bfde0585ce27d6d345ee6b7a50496ddb6de5b75aeb9df043ba
-
Filesize
2KB
MD5deb05599e6c7474430f6f6ea82c095e6
SHA10826278051d7888c8da418de082b7b2699124e0c
SHA256756a89b88860eef5e29e93d29d89d5e0e7b90df128e2e929a46fd3bb5f38694f
SHA5125f765c07656e2917e37b7c3264841c1f611f635a638505e6d302b3418938052ec884183f24e4a26c4c564a8cbe1babe917cf1e8619288faf206d29cfadc76312
-
Filesize
1KB
MD5378d3a155c66fb5ef31db7eb87060950
SHA16ecaa88bfdb5f57ec136c3d9ac7d6526907de4a2
SHA25603c6a654d99adb1f357985a13392200220be987bfb38b53add30ed5235f3fedb
SHA5125f3edbf860e6c1be181e7df98f7b589f3c903f69bda26a76ec8577f3fbcbcc7e9b83ccc8dc8260c530ed1dec025755d78fd726282bf7c4d039284b08541ed3c2
-
Filesize
2KB
MD5e1cb6c6e9bfcbda7249c883780a1f2e1
SHA1cc8aaf53165634c373f8e8d9f114cd3a47d91661
SHA256c417df8daa047739783841781b0279f7c1f5a4f46f1725c3bc25deb2ec5b9871
SHA51221d02f772de68d5fd60e1cd436fdb5239d7c9db65eef3c2c198aae70df6cb9bbfa0825df30efddd75a09bcc321f7ea2a1e2ac51ddff1c76c15186eb772c33dc8
-
Filesize
1KB
MD54227833dc06aa72914c750aad44bbfb7
SHA14ee9f0f6e04d215be3fd2a9f6acdde62eb10e4a6
SHA25671ce6a6596b34d2618ffee8b1a4708f0c639e8cf3f7c97816a3b395851e6f1df
SHA5127417165e1a9e5b58100933904f4e2a13e650dd28bfb26e6dfb1dc7e689e81798cfd29e337249871be9808477c3c0029a5b57f409ba110079cc89334f021580a1