Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 05:05
Static task
static1
Behavioral task
behavioral1
Sample
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe
Resource
win10v2004-20220721-en
General
-
Target
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe
-
Size
384KB
-
MD5
1b3d2d2e5f98531456a561f0556b9e06
-
SHA1
34b9baffc913ac2c23df1982b8a09e9dad707b7f
-
SHA256
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
-
SHA512
dc972d6741d1ceb475007c782f351bd6895c2669c1c2fb7793085fe54315388c47157bde82caf3273ad56ce7774d931f2c540e7d59593212425a9aaa87b3954b
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-335065374-4263250628-1829373619-1000\Recovery+yevoa.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/FB5172C50A3F4A3
http://kkd47eh4hdjshb5t.angortra.at/FB5172C50A3F4A3
http://ytrest84y5i456hghadefdsd.pontogrot.com/FB5172C50A3F4A3
http://xlowfznrg4wf7dli.ONION/FB5172C50A3F4A3
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
lnkxnrnvehhc.exelnkxnrnvehhc.exepid Process 1820 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1700 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
lnkxnrnvehhc.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run lnkxnrnvehhc.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcthjkubufvb = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\lnkxnrnvehhc.exe\"" lnkxnrnvehhc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exelnkxnrnvehhc.exedescription pid Process procid_target PID 1752 set thread context of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1820 set thread context of 1704 1820 lnkxnrnvehhc.exe 30 -
Drops file in Program Files directory 64 IoCs
Processes:
lnkxnrnvehhc.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\1047x576black.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\ja-JP\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\7-Zip\readme.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_ButtonGraphic.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\fr-FR\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\Logo.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Mso Example Intl Setup File B.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\System\msadc\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\flight_recorder.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Internet Explorer\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Services\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\DVD Maker\Shared\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\Recovery+yevoa.txt lnkxnrnvehhc.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\Recovery+yevoa.html lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\Recovery+yevoa.png lnkxnrnvehhc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\Recovery+yevoa.png lnkxnrnvehhc.exe -
Drops file in Windows directory 2 IoCs
Processes:
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exedescription ioc Process File created C:\Windows\lnkxnrnvehhc.exe 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe File opened for modification C:\Windows\lnkxnrnvehhc.exe 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 47 IoCs
Processes:
lnkxnrnvehhc.exepid Process 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe 1704 lnkxnrnvehhc.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exelnkxnrnvehhc.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe Token: SeDebugPrivilege 1704 lnkxnrnvehhc.exe Token: SeIncreaseQuotaPrivilege 892 WMIC.exe Token: SeSecurityPrivilege 892 WMIC.exe Token: SeTakeOwnershipPrivilege 892 WMIC.exe Token: SeLoadDriverPrivilege 892 WMIC.exe Token: SeSystemProfilePrivilege 892 WMIC.exe Token: SeSystemtimePrivilege 892 WMIC.exe Token: SeProfSingleProcessPrivilege 892 WMIC.exe Token: SeIncBasePriorityPrivilege 892 WMIC.exe Token: SeCreatePagefilePrivilege 892 WMIC.exe Token: SeBackupPrivilege 892 WMIC.exe Token: SeRestorePrivilege 892 WMIC.exe Token: SeShutdownPrivilege 892 WMIC.exe Token: SeDebugPrivilege 892 WMIC.exe Token: SeSystemEnvironmentPrivilege 892 WMIC.exe Token: SeRemoteShutdownPrivilege 892 WMIC.exe Token: SeUndockPrivilege 892 WMIC.exe Token: SeManageVolumePrivilege 892 WMIC.exe Token: 33 892 WMIC.exe Token: 34 892 WMIC.exe Token: 35 892 WMIC.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exelnkxnrnvehhc.exelnkxnrnvehhc.exedescription pid Process procid_target PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1752 wrote to memory of 1680 1752 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 26 PID 1680 wrote to memory of 1820 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 27 PID 1680 wrote to memory of 1820 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 27 PID 1680 wrote to memory of 1820 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 27 PID 1680 wrote to memory of 1820 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 27 PID 1680 wrote to memory of 1700 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 28 PID 1680 wrote to memory of 1700 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 28 PID 1680 wrote to memory of 1700 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 28 PID 1680 wrote to memory of 1700 1680 592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe 28 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1820 wrote to memory of 1704 1820 lnkxnrnvehhc.exe 30 PID 1704 wrote to memory of 892 1704 lnkxnrnvehhc.exe 31 PID 1704 wrote to memory of 892 1704 lnkxnrnvehhc.exe 31 PID 1704 wrote to memory of 892 1704 lnkxnrnvehhc.exe 31 PID 1704 wrote to memory of 892 1704 lnkxnrnvehhc.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
lnkxnrnvehhc.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lnkxnrnvehhc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" lnkxnrnvehhc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe"C:\Users\Admin\AppData\Local\Temp\592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe"C:\Users\Admin\AppData\Local\Temp\592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\lnkxnrnvehhc.exeC:\Windows\lnkxnrnvehhc.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\lnkxnrnvehhc.exeC:\Windows\lnkxnrnvehhc.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1704 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\592EC2~1.EXE3⤵
- Deletes itself
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD51b3d2d2e5f98531456a561f0556b9e06
SHA134b9baffc913ac2c23df1982b8a09e9dad707b7f
SHA256592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
SHA512dc972d6741d1ceb475007c782f351bd6895c2669c1c2fb7793085fe54315388c47157bde82caf3273ad56ce7774d931f2c540e7d59593212425a9aaa87b3954b
-
Filesize
384KB
MD51b3d2d2e5f98531456a561f0556b9e06
SHA134b9baffc913ac2c23df1982b8a09e9dad707b7f
SHA256592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
SHA512dc972d6741d1ceb475007c782f351bd6895c2669c1c2fb7793085fe54315388c47157bde82caf3273ad56ce7774d931f2c540e7d59593212425a9aaa87b3954b
-
Filesize
384KB
MD51b3d2d2e5f98531456a561f0556b9e06
SHA134b9baffc913ac2c23df1982b8a09e9dad707b7f
SHA256592ec29fbf68307cc62a234c11a414576801914ea7eaca2cc7a718178a11a964
SHA512dc972d6741d1ceb475007c782f351bd6895c2669c1c2fb7793085fe54315388c47157bde82caf3273ad56ce7774d931f2c540e7d59593212425a9aaa87b3954b