Analysis
-
max time kernel
173s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 22:42
Static task
static1
Behavioral task
behavioral1
Sample
38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe
-
Size
865KB
-
MD5
a11969b7f736f7613b76a2def8c51dbc
-
SHA1
fa055058e2c1db2fb83ec6b7da9f1c41648889e3
-
SHA256
38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6
-
SHA512
9ff92c00a0a78786a2222082e3a3452f9d20249844b10cfc774849ad49e56904d9eddb0b3d3b25106bfe741d84fa685b16e15745ba304aaaeb02854bbe3705ec
Malware Config
Signatures
-
Possible privilege escalation attempt 8 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exepid process 4388 icacls.exe 4500 takeown.exe 5008 icacls.exe 3460 takeown.exe 4912 takeown.exe 4700 icacls.exe 636 icacls.exe 3568 takeown.exe -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exepid process 3568 takeown.exe 4388 icacls.exe 4500 takeown.exe 5008 icacls.exe 3460 takeown.exe 4912 takeown.exe 4700 icacls.exe 636 icacls.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 5012 taskkill.exe 1072 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exepid process 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
takeown.exetakeown.exetaskkill.exetakeown.exetakeown.exetaskkill.exedescription pid process Token: SeTakeOwnershipPrivilege 3568 takeown.exe Token: SeTakeOwnershipPrivilege 4500 takeown.exe Token: SeDebugPrivilege 5012 taskkill.exe Token: SeTakeOwnershipPrivilege 4912 takeown.exe Token: SeTakeOwnershipPrivilege 3460 takeown.exe Token: SeDebugPrivilege 1072 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exepid process 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exepid process 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1904 wrote to memory of 3676 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3676 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3676 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3536 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3536 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3536 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 1476 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 1476 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 1476 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 2052 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 2052 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 2052 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 2240 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 2240 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 2240 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 4304 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 4304 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 4304 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 4804 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 4804 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 4804 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 3676 wrote to memory of 3180 3676 cmd.exe reg.exe PID 3676 wrote to memory of 3180 3676 cmd.exe reg.exe PID 3676 wrote to memory of 3180 3676 cmd.exe reg.exe PID 3536 wrote to memory of 4400 3536 cmd.exe reg.exe PID 3536 wrote to memory of 4400 3536 cmd.exe reg.exe PID 3536 wrote to memory of 4400 3536 cmd.exe reg.exe PID 2052 wrote to memory of 3568 2052 cmd.exe takeown.exe PID 2052 wrote to memory of 3568 2052 cmd.exe takeown.exe PID 2052 wrote to memory of 3568 2052 cmd.exe takeown.exe PID 4804 wrote to memory of 5008 4804 cmd.exe icacls.exe PID 4804 wrote to memory of 5008 4804 cmd.exe icacls.exe PID 4804 wrote to memory of 5008 4804 cmd.exe icacls.exe PID 4304 wrote to memory of 4500 4304 cmd.exe takeown.exe PID 4304 wrote to memory of 4500 4304 cmd.exe takeown.exe PID 4304 wrote to memory of 4500 4304 cmd.exe takeown.exe PID 2240 wrote to memory of 4388 2240 cmd.exe icacls.exe PID 2240 wrote to memory of 4388 2240 cmd.exe icacls.exe PID 2240 wrote to memory of 4388 2240 cmd.exe icacls.exe PID 1476 wrote to memory of 5012 1476 cmd.exe taskkill.exe PID 1476 wrote to memory of 5012 1476 cmd.exe taskkill.exe PID 1476 wrote to memory of 5012 1476 cmd.exe taskkill.exe PID 1904 wrote to memory of 3068 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3068 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3068 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3628 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3628 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3628 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 320 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 320 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 320 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 220 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 220 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 220 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 1040 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 1040 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 1040 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3736 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3736 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 1904 wrote to memory of 3736 1904 38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe cmd.exe PID 320 wrote to memory of 3460 320 cmd.exe takeown.exe PID 320 wrote to memory of 3460 320 cmd.exe takeown.exe PID 320 wrote to memory of 3460 320 cmd.exe takeown.exe PID 3736 wrote to memory of 4700 3736 cmd.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe"C:\Users\Admin\AppData\Local\Temp\38674f024ba7dbc7cc7a461d1b60b948ee7abbd5e81d26f25f991373cf196ad6.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c reg add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe /v logon /t REG_SZ /d 'wscript.exe' /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe /v logon /t REG_SZ /d 'wscript.exe' /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c reg add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe /v explorer /t REG_SZ /d 'wscript.exe' /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe /v explorer /t REG_SZ /d 'wscript.exe' /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c icacls C:\Windows\System32 /Grant Users:F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32 /Grant Users:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c takeown /f C:\Windows\2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c icacls C:\Windows\ /Grant Users:F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\ /Grant Users:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c takeown /f C:\Windows\System32\2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ren C:\Windows\system32\*.* *.lolxxd2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im explorer.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c takeown /f C:\Windows\System32\2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c icacls C:\Windows\System32 /Grant Users:F2⤵
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32 /Grant Users:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c takeown /f C:\Windows\2⤵
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c icacls C:\Windows\ /Grant Users:F2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\ /Grant Users:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c ren C:\Windows\system32\*.* *.lolxxd2⤵
-
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\System32\1⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/220-147-0x0000000000000000-mapping.dmp
-
memory/320-146-0x0000000000000000-mapping.dmp
-
memory/636-153-0x0000000000000000-mapping.dmp
-
memory/1040-148-0x0000000000000000-mapping.dmp
-
memory/1072-154-0x0000000000000000-mapping.dmp
-
memory/1476-132-0x0000000000000000-mapping.dmp
-
memory/2052-133-0x0000000000000000-mapping.dmp
-
memory/2240-134-0x0000000000000000-mapping.dmp
-
memory/2656-155-0x0000000000000000-mapping.dmp
-
memory/3068-144-0x0000000000000000-mapping.dmp
-
memory/3180-137-0x0000000000000000-mapping.dmp
-
memory/3460-150-0x0000000000000000-mapping.dmp
-
memory/3536-131-0x0000000000000000-mapping.dmp
-
memory/3568-139-0x0000000000000000-mapping.dmp
-
memory/3628-145-0x0000000000000000-mapping.dmp
-
memory/3676-130-0x0000000000000000-mapping.dmp
-
memory/3736-149-0x0000000000000000-mapping.dmp
-
memory/4304-135-0x0000000000000000-mapping.dmp
-
memory/4388-142-0x0000000000000000-mapping.dmp
-
memory/4400-138-0x0000000000000000-mapping.dmp
-
memory/4500-141-0x0000000000000000-mapping.dmp
-
memory/4700-151-0x0000000000000000-mapping.dmp
-
memory/4804-136-0x0000000000000000-mapping.dmp
-
memory/4912-152-0x0000000000000000-mapping.dmp
-
memory/5008-140-0x0000000000000000-mapping.dmp
-
memory/5012-143-0x0000000000000000-mapping.dmp