Analysis
-
max time kernel
160s -
max time network
24s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20/02/2022, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe
Resource
win10v2004-en-20220113
General
-
Target
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe
-
Size
200KB
-
MD5
7d6d8c3caadbd235247c750ce3280e0f
-
SHA1
223b210cdbeb47ff015180150730c6a0057fa000
-
SHA256
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8
-
SHA512
dfc3f55204755be47a5d7273dfa66d1dfc1bfc7e97ccfd48aca5a7e4c8c5eea2b85a6cfb17ba990fa69259be46e3d7c6134e2b47cfe2be0f42227cd3df349e8c
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Drops desktop.ini file(s) 51 IoCs
description ioc Process File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Pictures\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 1136 taskhost.exe 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 1136 taskhost.exe 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 1136 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe Token: SeBackupPrivilege 1136 taskhost.exe Token: SeBackupPrivilege 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1136 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 16 PID 1376 wrote to memory of 1184 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 15 PID 1376 wrote to memory of 668 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 27 PID 1376 wrote to memory of 668 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 27 PID 1376 wrote to memory of 668 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 27 PID 1376 wrote to memory of 560 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 29 PID 1376 wrote to memory of 560 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 29 PID 1376 wrote to memory of 560 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 29 PID 560 wrote to memory of 1868 560 net.exe 31 PID 560 wrote to memory of 1868 560 net.exe 31 PID 560 wrote to memory of 1868 560 net.exe 31 PID 668 wrote to memory of 868 668 net.exe 32 PID 668 wrote to memory of 868 668 net.exe 32 PID 668 wrote to memory of 868 668 net.exe 32 PID 1136 wrote to memory of 1104 1136 taskhost.exe 37 PID 1136 wrote to memory of 1104 1136 taskhost.exe 37 PID 1136 wrote to memory of 1104 1136 taskhost.exe 37 PID 1376 wrote to memory of 1108 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 35 PID 1376 wrote to memory of 1108 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 35 PID 1376 wrote to memory of 1108 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 35 PID 1104 wrote to memory of 672 1104 net.exe 36 PID 1104 wrote to memory of 672 1104 net.exe 36 PID 1104 wrote to memory of 672 1104 net.exe 36 PID 1108 wrote to memory of 1384 1108 net.exe 38 PID 1108 wrote to memory of 1384 1108 net.exe 38 PID 1108 wrote to memory of 1384 1108 net.exe 38 PID 1136 wrote to memory of 1176 1136 taskhost.exe 39 PID 1136 wrote to memory of 1176 1136 taskhost.exe 39 PID 1136 wrote to memory of 1176 1136 taskhost.exe 39 PID 1376 wrote to memory of 844 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 41 PID 1376 wrote to memory of 844 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 41 PID 1376 wrote to memory of 844 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 41 PID 1176 wrote to memory of 532 1176 net.exe 44 PID 1176 wrote to memory of 532 1176 net.exe 44 PID 1176 wrote to memory of 532 1176 net.exe 44 PID 844 wrote to memory of 1324 844 net.exe 43 PID 844 wrote to memory of 1324 844 net.exe 43 PID 844 wrote to memory of 1324 844 net.exe 43 PID 1376 wrote to memory of 16612 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 47 PID 1376 wrote to memory of 16612 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 47 PID 1376 wrote to memory of 16612 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 47 PID 16612 wrote to memory of 16636 16612 net.exe 49 PID 16612 wrote to memory of 16636 16612 net.exe 49 PID 16612 wrote to memory of 16636 16612 net.exe 49 PID 1376 wrote to memory of 16656 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 50 PID 1376 wrote to memory of 16656 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 50 PID 1376 wrote to memory of 16656 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 50 PID 1136 wrote to memory of 16672 1136 taskhost.exe 52 PID 1136 wrote to memory of 16672 1136 taskhost.exe 52 PID 1136 wrote to memory of 16672 1136 taskhost.exe 52 PID 16656 wrote to memory of 16704 16656 net.exe 54 PID 16656 wrote to memory of 16704 16656 net.exe 54 PID 16656 wrote to memory of 16704 16656 net.exe 54 PID 16672 wrote to memory of 16712 16672 net.exe 55 PID 16672 wrote to memory of 16712 16672 net.exe 55 PID 16672 wrote to memory of 16712 16672 net.exe 55 PID 1376 wrote to memory of 17000 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 56 PID 1376 wrote to memory of 17000 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 56 PID 1376 wrote to memory of 17000 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 56 PID 17000 wrote to memory of 17024 17000 net.exe 58 PID 17000 wrote to memory of 17024 17000 net.exe 58 PID 17000 wrote to memory of 17024 17000 net.exe 58 PID 1376 wrote to memory of 17044 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 59 PID 1376 wrote to memory of 17044 1376 3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe 59
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1104
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:532
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16672 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16712
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17072
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17104
-
-
-
C:\Users\Admin\AppData\Local\Temp\3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe"C:\Users\Admin\AppData\Local\Temp\3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:868
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1868
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1384
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1324
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16612 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16636
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16656 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16704
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:17000 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17024
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17088
-
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y1⤵PID:672