Resubmissions
09-10-2023 22:49
231009-2rxwfsgh8z 1006-03-2021 22:20
210306-e542m4kcwn 1009-11-2020 19:51
201109-ldpapz7ekx 10Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
06-03-2021 22:20
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe
-
Size
291KB
-
MD5
5a5c745bf3e97fe2be01880132662f28
-
SHA1
924af25d379fc88319bc55958db898dbf5054309
-
SHA256
0ec947a4f30a6ad7d055c72f5d6c1ffe7a538349f41e8156e9aa5c7a8b0d7811
-
SHA512
151e4a07e19350d677e049c57c971b64924150eec007e665843cb6142ec73fc06ae4145c64164d3f7f25a376a7536ac6d9b3c85180503549a0c86f09cc0ded10
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Executes dropped EXE 1 IoCs
pid Process 808 drpbx.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SelectPublish.tif.zemblax drpbx.exe File created C:\Users\Admin\Pictures\SyncConvertTo.tif.zemblax drpbx.exe File created C:\Users\Admin\Pictures\CompareTest.raw.zemblax drpbx.exe File created C:\Users\Admin\Pictures\InvokeReset.raw.zemblax drpbx.exe File created C:\Users\Admin\Pictures\LockUninstall.png.zemblax drpbx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe File opened for modification C:\Windows\assembly\Desktop.ini SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-util-enumerations.xml.zemblax drpbx.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.repository.nl_ja_4.4.0.v20140623020002.jar.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_ja.jar drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\root\ui-strings.js.zemblax drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\js\startup.js drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-30.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\bl.gif.zemblax drpbx.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-1000-0000000FF1CE.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Assets\starttile.dualsim2.smile.small.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\sm_16x11.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.targetsize-36_altform-unplated.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_ellipses_selected-hover.svg drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\sa.txt.zemblax drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Audio\Daily_challenge_Coins Hit progress bar.wav drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ru-ru\ui-strings.js.zemblax drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppPackageLargeTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_Cloud.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_zh_CN.jar drpbx.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\new_icons_retina.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.14.2002.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-180.png.zemblax drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-80.png.zemblax drpbx.exe File created C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME.txt.zemblax drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\29.jpg drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\OneNoteWideTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Office\ResetCoord.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSplashLogo.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\SmallLogo.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Aquarium\aquarium_12s.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_zh_CN.jar drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\ui-strings.js.zemblax drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nl-nl\ui-strings.js.zemblax drpbx.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptg.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.scale-100_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-40_altform-unplated.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ExcelNaiveBayesCommandRanker.txt.zemblax drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Logos\Wide310x150\PaintWideTile.scale-125.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sv-se\ui-strings.js.zemblax drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-cn\ui-strings.js.zemblax drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSplashLogo.scale-150.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Dark.scale-400.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\MedTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-40.png drpbx.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.nl_zh_4.4.0.v20140623020002.jar.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\es-es\ui-strings.js drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgeCalls.c drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings.nl_ja_4.4.0.v20140623020002.jar drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\ui-strings.js.zemblax drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesstylish.dotx drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_ja_135x40.svg.zemblax drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected] drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-20.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-36.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\s_opencarat_18.svg.zemblax drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-140.png.zemblax drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\MapsAppList.targetsize-64_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\topnav.gif drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\sfs_icons.png.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\ui-strings.js drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator.nl_ja_4.4.0.v20140623020002.jar drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Beach\mask\1h.png drpbx.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe File opened for modification C:\Windows\assembly\Desktop.ini SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe File opened for modification C:\Windows\assembly SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2188 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1456 SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe Token: SeDebugPrivilege 808 drpbx.exe Token: SeDebugPrivilege 2188 taskmgr.exe Token: SeSystemProfilePrivilege 2188 taskmgr.exe Token: SeCreateGlobalPrivilege 2188 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe 2188 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1456 wrote to memory of 808 1456 SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe 76 PID 1456 wrote to memory of 808 1456 SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe 76 PID 1456 wrote to memory of 808 1456 SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.dc.28918.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2188