Analysis
-
max time kernel
40s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-02-2021 09:58
Static task
static1
Behavioral task
behavioral1
Sample
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe
Resource
win10v20201028
General
-
Target
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe
-
Size
136KB
-
MD5
c2ae29ea86b611d8697ca715e61045a8
-
SHA1
58d835c3d204d012ee5a4e3c05a06e60b4316d0e
-
SHA256
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75
-
SHA512
571dde42ebaa5c373bcd1cd8c08e3d4d16945df54659f64ccb0e8e1bf721c11d20ac35539e071dfede3a765d2abfd6546225fb72822fa1e3e4095459b539822a
Malware Config
Extracted
C:\2lsx5g-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7BF64018E3D814A4
http://decryptor.cc/7BF64018E3D814A4
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exedescription ioc process File renamed C:\Users\Admin\Pictures\AssertAdd.tiff => \??\c:\users\admin\pictures\AssertAdd.tiff.2lsx5g 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File renamed C:\Users\Admin\Pictures\CompareShow.crw => \??\c:\users\admin\pictures\CompareShow.crw.2lsx5g 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File renamed C:\Users\Admin\Pictures\ConvertDebug.png => \??\c:\users\admin\pictures\ConvertDebug.png.2lsx5g 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File renamed C:\Users\Admin\Pictures\DisconnectImport.png => \??\c:\users\admin\pictures\DisconnectImport.png.2lsx5g 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\users\admin\pictures\PopTest.tiff 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\users\admin\pictures\AssertAdd.tiff 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File renamed C:\Users\Admin\Pictures\LockNew.crw => \??\c:\users\admin\pictures\LockNew.crw.2lsx5g 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File renamed C:\Users\Admin\Pictures\PopTest.tiff => \??\c:\users\admin\pictures\PopTest.tiff.2lsx5g 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File renamed C:\Users\Admin\Pictures\ExitExport.raw => \??\c:\users\admin\pictures\ExitExport.raw.2lsx5g 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exedescription ioc process File opened (read-only) \??\E: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\J: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\K: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\T: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\U: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\Y: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\B: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\F: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\H: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\L: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\M: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\O: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\P: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\S: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\W: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\Z: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\G: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\R: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\V: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\X: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\A: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\I: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\N: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\Q: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened (read-only) \??\D: 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\82d9c2v9y.bmp" 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe -
Drops file in Program Files directory 34 IoCs
Processes:
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exedescription ioc process File opened for modification \??\c:\program files\DisableMerge.aiff 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\RestoreCheckpoint.midi 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File created \??\c:\program files\2lsx5g-readme.txt 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\ApproveUnprotect.pptm 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\BackupTrace.wps 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\CheckpointUpdate.rm 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\MergeWait.dotx 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\SkipConnect.3gp2 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File created \??\c:\program files (x86)\2lsx5g-readme.txt 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\CopyGet.mp4 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\DisableApprove.3gp2 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\ExportFormat.xlt 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\OpenSkip.ram 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\ResizeResume.jfif 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\ResumeInstall.mht 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\UninstallExpand.xlsx 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\ConnectUnregister.mov 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\DenySelect.mpeg3 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\GetMerge.ppsx 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\MountOpen.ppt 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\DebugShow.ex_ 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\SelectFind.ppt 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\SwitchComplete.inf 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\GetUnpublish.pptx 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\GroupCompress.ogg 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\OutSearch.aifc 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\PublishConfirm.wax 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\MeasureClear.ADT 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\PushUnprotect.tiff 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\GrantConnect.rtf 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\OptimizeBlock.ppsm 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\ExpandDeny.mov 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\OpenSelect.mht 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe File opened for modification \??\c:\program files\SaveRemove.xlsx 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe -
Suspicious behavior: EnumeratesProcesses 77 IoCs
Processes:
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exepowershell.exepid process 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 3700 powershell.exe 3700 powershell.exe 3700 powershell.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeBackupPrivilege 1324 vssvc.exe Token: SeRestorePrivilege 1324 vssvc.exe Token: SeAuditPrivilege 1324 vssvc.exe Token: SeTakeOwnershipPrivilege 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exedescription pid process target process PID 4020 wrote to memory of 3700 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe powershell.exe PID 4020 wrote to memory of 3700 4020 801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe"C:\Users\Admin\AppData\Local\Temp\801e1f5f623edd2771367a79c94c8d9414f2d8f6af5cec707baa410a1ebf4b75.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2572
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3700-2-0x0000000000000000-mapping.dmp
-
memory/3700-3-0x00007FFE03B60000-0x00007FFE0454C000-memory.dmpFilesize
9.9MB
-
memory/3700-4-0x0000019707800000-0x0000019707801000-memory.dmpFilesize
4KB
-
memory/3700-5-0x0000019721270000-0x0000019721271000-memory.dmpFilesize
4KB
-
memory/3700-6-0x000001971FE00000-0x000001971FE02000-memory.dmpFilesize
8KB
-
memory/3700-7-0x000001971FE03000-0x000001971FE05000-memory.dmpFilesize
8KB
-
memory/3700-8-0x000001971FE06000-0x000001971FE08000-memory.dmpFilesize
8KB