Analysis
-
max time kernel
168s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 08:20
Static task
static1
Behavioral task
behavioral1
Sample
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
Resource
win10v2004-en-20220112
General
-
Target
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
-
Size
203KB
-
MD5
ea9759d8023c9f6f269fbd0875561783
-
SHA1
1c4c718294647cb7df8dae914100394f2668715a
-
SHA256
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f
-
SHA512
2be12260b22224132c27f60c8943303c89210d58b22acc5efce03fb379d912254493df9eee97a7d1777faf7bf5702537331373711690d9621e642cf698140e81
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Links\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Searches\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Maintenance\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Start Menu\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Start Menu\Programs\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Desktop\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\Sample Music\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\Sample Music\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Startup\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Accessibility\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\Sample Videos\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Videos\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links for United States\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Desktop\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Administrative Tools\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\System Tools\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\Sample Pictures\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1124 taskhost.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1124 taskhost.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1124 taskhost.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe Token: SeBackupPrivilege 1124 taskhost.exe Token: SeBackupPrivilege 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1124 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 4 PID 1660 wrote to memory of 2044 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 27 PID 1660 wrote to memory of 2044 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 27 PID 1660 wrote to memory of 2044 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 27 PID 1660 wrote to memory of 1180 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 10 PID 1660 wrote to memory of 1628 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 29 PID 1660 wrote to memory of 1628 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 29 PID 1660 wrote to memory of 1628 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 29 PID 1660 wrote to memory of 980 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 31 PID 1660 wrote to memory of 980 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 31 PID 1660 wrote to memory of 980 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 31 PID 2044 wrote to memory of 1104 2044 net.exe 33 PID 2044 wrote to memory of 1104 2044 net.exe 33 PID 2044 wrote to memory of 1104 2044 net.exe 33 PID 1628 wrote to memory of 1516 1628 net.exe 35 PID 1628 wrote to memory of 1516 1628 net.exe 35 PID 1628 wrote to memory of 1516 1628 net.exe 35 PID 980 wrote to memory of 1532 980 net.exe 34 PID 980 wrote to memory of 1532 980 net.exe 34 PID 980 wrote to memory of 1532 980 net.exe 34 PID 1124 wrote to memory of 1140 1124 taskhost.exe 37 PID 1124 wrote to memory of 1140 1124 taskhost.exe 37 PID 1124 wrote to memory of 1140 1124 taskhost.exe 37 PID 1140 wrote to memory of 1264 1140 net.exe 39 PID 1140 wrote to memory of 1264 1140 net.exe 39 PID 1140 wrote to memory of 1264 1140 net.exe 39 PID 1124 wrote to memory of 1780 1124 taskhost.exe 40 PID 1124 wrote to memory of 1780 1124 taskhost.exe 40 PID 1124 wrote to memory of 1780 1124 taskhost.exe 40 PID 1780 wrote to memory of 1608 1780 net.exe 42 PID 1780 wrote to memory of 1608 1780 net.exe 42 PID 1780 wrote to memory of 1608 1780 net.exe 42 PID 1660 wrote to memory of 568 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 43 PID 1660 wrote to memory of 568 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 43 PID 1660 wrote to memory of 568 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 43 PID 568 wrote to memory of 2040 568 net.exe 45 PID 568 wrote to memory of 2040 568 net.exe 45 PID 568 wrote to memory of 2040 568 net.exe 45 PID 1660 wrote to memory of 6152 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 48 PID 1660 wrote to memory of 6152 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 48 PID 1660 wrote to memory of 6152 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 48 PID 6152 wrote to memory of 6344 6152 net.exe 50 PID 6152 wrote to memory of 6344 6152 net.exe 50 PID 6152 wrote to memory of 6344 6152 net.exe 50 PID 1124 wrote to memory of 6636 1124 taskhost.exe 51 PID 1124 wrote to memory of 6636 1124 taskhost.exe 51 PID 1124 wrote to memory of 6636 1124 taskhost.exe 51 PID 6636 wrote to memory of 6660 6636 net.exe 53 PID 6636 wrote to memory of 6660 6636 net.exe 53 PID 6636 wrote to memory of 6660 6636 net.exe 53 PID 1660 wrote to memory of 9580 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 54 PID 1660 wrote to memory of 9580 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 54 PID 1660 wrote to memory of 9580 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 54 PID 9580 wrote to memory of 9604 9580 net.exe 56 PID 9580 wrote to memory of 9604 9580 net.exe 56 PID 9580 wrote to memory of 9604 9580 net.exe 56 PID 1660 wrote to memory of 16952 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 57 PID 1660 wrote to memory of 16952 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 57 PID 1660 wrote to memory of 16952 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 57 PID 16952 wrote to memory of 16976 16952 net.exe 59 PID 16952 wrote to memory of 16976 16952 net.exe 59 PID 16952 wrote to memory of 16976 16952 net.exe 59 PID 1124 wrote to memory of 17000 1124 taskhost.exe 60 PID 1124 wrote to memory of 17000 1124 taskhost.exe 60
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1264
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1608
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:6636 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:6660
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17024
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe"C:\Users\Admin\AppData\Local\Temp\0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "spooler" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "spooler" /y3⤵PID:1104
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1516
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1532
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2040
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:6152 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:6344
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:9580 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:9604
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16952 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16976
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17288
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17312
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:1216