#Uncommon file name and path in system32, tm1jg\\tpminit.exe,  tpminit.exe, normally lives above in the system32 folder
Parent Process: c:\\windows\\system32\\tm1jg\\tpminit.exe

#[<https://www.virustotal.com/gui/file/521a8013c45d99a20f341e1ae9910de797696e79bc6719bb5aa92be967203f3c>](<https://www.virustotal.com/gui/file/521a8013c45d99a20f341e1ae9910de797696e79bc6719bb5aa92be967203f3c>)
Parent MD5: f0d6fa1110efffd3a773757a2db0c950

#parent commandline process for tpminit.exe
Parent CLI: C:\\Windows\\system32\\Tm1jg\\TpmInit.exe

#Suspicious path and name for the DLL, potentially indicating persistence or malware
Parent File Write: c:\\users\\acme123\\appdata\\roaming\\microsoft\\3ztbfrz\\version.dll 

#No matches for this hash
File MD5: a4b0ad1bb7cfbd3cbc40860197613340

#Legitimate Windows utility, but its use here raises concern due to the nature of the task being created
Process: c:\\windows\\system32\\schtasks.exe

#<https://www.virustotal.com/gui/file/fb024503622e00466f3c18fc69737f2c217fa39ef075718b25619b93ce3a1c62>
Process MD5: 2e9e198247bf0e9bd94b42286798a5ac

#Creates a scheduled task named "Jzijbnrsxnvm" that runs every 60 minutes under the user "acme123," executing UI0Detect.exe from the suspicious directory C:\\Users\\acme123\\AppData\\Roaming\\Microsoft\\3ztBfrz. This suggests persistence and potentially malicious activity.
Process CLI: schtasks.exe /Create /F /TN “Jzijbnrsxnvm” /TR C:\\Users\\acme123\\AppData\\Roaming\\Microsoft\\3ztBfrz\\UI0Detect.exe /SC minute /MO 60 /RU “acme123”

#New payload activity or modificaiton count
File modification count: 1

https://redcanary.com/blog/threat-intelligence/grief-ransomware/

Overview

This activity indicates potential malicious activity within a Windows environment, characterized by the creation and execution of uncommon files and the misuse of legitimate system utilities for persistence. Key indicators include:

Findings

Summary