Analysis
-
max time kernel
168s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 00:24
Static task
static1
Behavioral task
behavioral1
Sample
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe
Resource
win10v2004-en-20220113
General
-
Target
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe
-
Size
113KB
-
MD5
8c7e7e483cd51fd209709cadcb982bcb
-
SHA1
fcce16c3e4906feec110e93fdf75f8a12b86cad8
-
SHA256
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0
-
SHA512
32d6e10d6de35703adc71c17dc1a3722781210edd897f20a7be8eed1e39b8613f105ae86213bc0496167406cfdb4debeaceb1c87336b08894cf409795583f69b
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
pWSWMuToLlan.exeuvlNazPvglan.exepid process 1640 pWSWMuToLlan.exe 676 uvlNazPvglan.exe -
Loads dropped DLL 4 IoCs
Processes:
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exepid process 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
icacls.exeicacls.exepid process 1696 icacls.exe 1468 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\EV = "\uffff\ufffe\ufffeC:\\Users\\Admin\\AppData\\Local\\Temp\\f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1936 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exepid process 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exepWSWMuToLlan.exeuvlNazPvglan.exeWMIC.exevssvc.exedescription pid process Token: SeBackupPrivilege 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe Token: SeBackupPrivilege 1640 pWSWMuToLlan.exe Token: SeBackupPrivilege 676 uvlNazPvglan.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeSecurityPrivilege 1588 WMIC.exe Token: SeTakeOwnershipPrivilege 1588 WMIC.exe Token: SeLoadDriverPrivilege 1588 WMIC.exe Token: SeSystemProfilePrivilege 1588 WMIC.exe Token: SeSystemtimePrivilege 1588 WMIC.exe Token: SeProfSingleProcessPrivilege 1588 WMIC.exe Token: SeIncBasePriorityPrivilege 1588 WMIC.exe Token: SeCreatePagefilePrivilege 1588 WMIC.exe Token: SeBackupPrivilege 1588 WMIC.exe Token: SeRestorePrivilege 1588 WMIC.exe Token: SeShutdownPrivilege 1588 WMIC.exe Token: SeDebugPrivilege 1588 WMIC.exe Token: SeSystemEnvironmentPrivilege 1588 WMIC.exe Token: SeRemoteShutdownPrivilege 1588 WMIC.exe Token: SeUndockPrivilege 1588 WMIC.exe Token: SeManageVolumePrivilege 1588 WMIC.exe Token: 33 1588 WMIC.exe Token: 34 1588 WMIC.exe Token: 35 1588 WMIC.exe Token: SeBackupPrivilege 1580 vssvc.exe Token: SeRestorePrivilege 1580 vssvc.exe Token: SeAuditPrivilege 1580 vssvc.exe Token: SeIncreaseQuotaPrivilege 1588 WMIC.exe Token: SeSecurityPrivilege 1588 WMIC.exe Token: SeTakeOwnershipPrivilege 1588 WMIC.exe Token: SeLoadDriverPrivilege 1588 WMIC.exe Token: SeSystemProfilePrivilege 1588 WMIC.exe Token: SeSystemtimePrivilege 1588 WMIC.exe Token: SeProfSingleProcessPrivilege 1588 WMIC.exe Token: SeIncBasePriorityPrivilege 1588 WMIC.exe Token: SeCreatePagefilePrivilege 1588 WMIC.exe Token: SeBackupPrivilege 1588 WMIC.exe Token: SeRestorePrivilege 1588 WMIC.exe Token: SeShutdownPrivilege 1588 WMIC.exe Token: SeDebugPrivilege 1588 WMIC.exe Token: SeSystemEnvironmentPrivilege 1588 WMIC.exe Token: SeRemoteShutdownPrivilege 1588 WMIC.exe Token: SeUndockPrivilege 1588 WMIC.exe Token: SeManageVolumePrivilege 1588 WMIC.exe Token: 33 1588 WMIC.exe Token: 34 1588 WMIC.exe Token: 35 1588 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exenet.exenet.exenet.exedescription pid process target process PID 788 wrote to memory of 1640 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe pWSWMuToLlan.exe PID 788 wrote to memory of 1640 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe pWSWMuToLlan.exe PID 788 wrote to memory of 1640 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe pWSWMuToLlan.exe PID 788 wrote to memory of 1640 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe pWSWMuToLlan.exe PID 788 wrote to memory of 676 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe uvlNazPvglan.exe PID 788 wrote to memory of 676 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe uvlNazPvglan.exe PID 788 wrote to memory of 676 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe uvlNazPvglan.exe PID 788 wrote to memory of 676 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe uvlNazPvglan.exe PID 788 wrote to memory of 1252 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe taskhost.exe PID 788 wrote to memory of 1360 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe Dwm.exe PID 788 wrote to memory of 1072 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1072 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1072 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1072 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1668 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1668 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1668 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1668 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 1072 wrote to memory of 1664 1072 net.exe net1.exe PID 1072 wrote to memory of 1664 1072 net.exe net1.exe PID 1072 wrote to memory of 1664 1072 net.exe net1.exe PID 1072 wrote to memory of 1664 1072 net.exe net1.exe PID 1668 wrote to memory of 1044 1668 net.exe net1.exe PID 1668 wrote to memory of 1044 1668 net.exe net1.exe PID 1668 wrote to memory of 1044 1668 net.exe net1.exe PID 1668 wrote to memory of 1044 1668 net.exe net1.exe PID 788 wrote to memory of 1496 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1496 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1496 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1496 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1320 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1320 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1320 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1320 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 988 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 988 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 988 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 988 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1800 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1800 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1800 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1800 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1468 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1468 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1468 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1468 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1696 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1696 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1696 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1696 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe icacls.exe PID 788 wrote to memory of 1332 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1332 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1332 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 1332 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 1332 wrote to memory of 2008 1332 net.exe net1.exe PID 1332 wrote to memory of 2008 1332 net.exe net1.exe PID 1332 wrote to memory of 2008 1332 net.exe net1.exe PID 1332 wrote to memory of 2008 1332 net.exe net1.exe PID 788 wrote to memory of 1620 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1620 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1620 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 1620 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe cmd.exe PID 788 wrote to memory of 884 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe PID 788 wrote to memory of 884 788 f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe net.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1252
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe"C:\Users\Admin\AppData\Local\Temp\f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\pWSWMuToLlan.exe"C:\Users\Admin\AppData\Local\Temp\pWSWMuToLlan.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\uvlNazPvglan.exe"C:\Users\Admin\AppData\Local\Temp\uvlNazPvglan.exe" 8 LAN2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:676 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1664
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "WMIC.exe shadowcopy delete"2⤵PID:1496
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "bootstatuspolicy ignoreallfailures"2⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "bcdedit /set {default} recoveryenabled No & bcdedit /set {default}"2⤵PID:988
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "vssadmin.exe Delete Shadows /all /quiet"2⤵PID:1320
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1936 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Qþþ2⤵
- Modifies file permissions
PID:1468 -
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Qþþ2⤵
- Modifies file permissions
PID:1696 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "EV" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe" /f /reg:642⤵PID:1620
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "EV" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0.exe" /f /reg:643⤵
- Adds Run key to start application
PID:1580 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1916
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:2812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2836
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:2956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2980
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:59096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:59120
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_3bd845b8-ce6a-4337-9974-31490196462a
MD593a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
MD5
8c7e7e483cd51fd209709cadcb982bcb
SHA1fcce16c3e4906feec110e93fdf75f8a12b86cad8
SHA256f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0
SHA51232d6e10d6de35703adc71c17dc1a3722781210edd897f20a7be8eed1e39b8613f105ae86213bc0496167406cfdb4debeaceb1c87336b08894cf409795583f69b
-
MD5
8c7e7e483cd51fd209709cadcb982bcb
SHA1fcce16c3e4906feec110e93fdf75f8a12b86cad8
SHA256f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0
SHA51232d6e10d6de35703adc71c17dc1a3722781210edd897f20a7be8eed1e39b8613f105ae86213bc0496167406cfdb4debeaceb1c87336b08894cf409795583f69b
-
MD5
8c7e7e483cd51fd209709cadcb982bcb
SHA1fcce16c3e4906feec110e93fdf75f8a12b86cad8
SHA256f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0
SHA51232d6e10d6de35703adc71c17dc1a3722781210edd897f20a7be8eed1e39b8613f105ae86213bc0496167406cfdb4debeaceb1c87336b08894cf409795583f69b
-
MD5
8c7e7e483cd51fd209709cadcb982bcb
SHA1fcce16c3e4906feec110e93fdf75f8a12b86cad8
SHA256f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0
SHA51232d6e10d6de35703adc71c17dc1a3722781210edd897f20a7be8eed1e39b8613f105ae86213bc0496167406cfdb4debeaceb1c87336b08894cf409795583f69b
-
MD5
8c7e7e483cd51fd209709cadcb982bcb
SHA1fcce16c3e4906feec110e93fdf75f8a12b86cad8
SHA256f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0
SHA51232d6e10d6de35703adc71c17dc1a3722781210edd897f20a7be8eed1e39b8613f105ae86213bc0496167406cfdb4debeaceb1c87336b08894cf409795583f69b
-
MD5
8c7e7e483cd51fd209709cadcb982bcb
SHA1fcce16c3e4906feec110e93fdf75f8a12b86cad8
SHA256f270d56ba05344b7c1d3bdf0afbe8e0bbf3cc7fee569ccfdbb1fa1294b2e85d0
SHA51232d6e10d6de35703adc71c17dc1a3722781210edd897f20a7be8eed1e39b8613f105ae86213bc0496167406cfdb4debeaceb1c87336b08894cf409795583f69b