Analysis
-
max time kernel
180s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 06:39
Behavioral task
behavioral1
Sample
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe
Resource
win10v2004-20220812-en
General
-
Target
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe
-
Size
47KB
-
MD5
63f83e10075b4c8c5d77439d0db62cd1
-
SHA1
9142c668c3d48a54af8b5f3cf89e7db5a538c068
-
SHA256
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067
-
SHA512
aa1a64656ed9e4ab9c0ab572fd9edcf40cce6e6fa3f726778b1cf4dc702aab9a1673b34653f808b3b394edfd364e377012566d0abd4cf7535db334e56370af62
-
SSDEEP
768:p6XSLKmEo9lxZERGo2alk32BwTDAHzA6oGJ69Lj:pWWEov2pIj
Malware Config
Signatures
-
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" ssms.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" Sab0tagE.exe -
Modifies system executable filetype association 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" ssms.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command Sab0tagE.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\SHOWSUPERHIDDEN = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sab0tagE.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" Sab0tagE.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Sab0tagE.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ssms.exe -
Executes dropped EXE 2 IoCs
pid Process 3140 ssms.exe 368 Sab0tagE.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "rundll32.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rundll32.exe" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\Debugger = "cmd.exe /c del /a /f" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "rundll32.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe\Debugger = "cmd.exe /c del /a /f" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe\Debugger = "cmd.exe /c del /a /f" Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "rundll32.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe\Debugger = "cmd.exe /c del /a /f" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "rundll32.exe" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
resource yara_rule behavioral2/memory/1916-132-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0006000000022e4c-141.dat upx behavioral2/files/0x0006000000022e4c-142.dat upx behavioral2/memory/1916-143-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0006000000022e4e-150.dat upx behavioral2/files/0x0006000000022e4e-151.dat upx behavioral2/memory/368-156-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3140-157-0x0000000000400000-0x000000000040E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Security Center\Svc Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Security Center\Svc ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Security Center\Svc db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" ssms.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ssms = "C:\\Windows\\ssms.exe" ssms.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ssms = "C:\\Windows\\ssms.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ssms = "C:\\Windows\\ssms.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ssms.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sab0tagE.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Sab0tagE.exe ssms.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ssms.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe File opened for modification C:\Windows\ssms.exe ssms.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 724 Schtasks.exe 4432 Schtasks.exe 3284 Schtasks.exe -
Kills process with taskkill 42 IoCs
pid Process 4796 taskkill.exe 4388 taskkill.exe 4384 taskkill.exe 3320 taskkill.exe 1548 taskkill.exe 3976 taskkill.exe 4152 taskkill.exe 3808 taskkill.exe 2948 taskkill.exe 4344 taskkill.exe 3880 taskkill.exe 2244 taskkill.exe 3176 taskkill.exe 4548 taskkill.exe 928 taskkill.exe 2592 taskkill.exe 2496 taskkill.exe 4724 taskkill.exe 3144 taskkill.exe 2136 taskkill.exe 1428 taskkill.exe 3704 taskkill.exe 4988 taskkill.exe 5024 taskkill.exe 3364 taskkill.exe 5032 taskkill.exe 2036 taskkill.exe 3980 taskkill.exe 2804 taskkill.exe 3312 taskkill.exe 1400 taskkill.exe 5092 taskkill.exe 2272 taskkill.exe 1168 taskkill.exe 4512 taskkill.exe 1672 taskkill.exe 4868 taskkill.exe 4232 taskkill.exe 1104 taskkill.exe 3136 taskkill.exe 3708 taskkill.exe 5068 taskkill.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\MICROSOFT ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\WINDOWS\SYSTEM\DisableCMD = "2" ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\EXPLORER\ADVANCED Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\EXPLORER\ADVANCED ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SYSTEM ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\WINDOWS\SYSTEM\DisableCMD = "2" Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Sab0tagE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ADVANCED\SHOWSUPERHIDDEN = "0" Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SYSTEM Sab0tagE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ADVANCED\SHOWSUPERHIDDEN = "0" ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\POLICIES ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\WINDOWS\SYSTEM ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\WINDOWS ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" Sab0tagE.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" ssms.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2136 taskkill.exe Token: SeDebugPrivilege 3980 taskkill.exe Token: SeDebugPrivilege 3320 taskkill.exe Token: SeDebugPrivilege 3176 taskkill.exe Token: SeDebugPrivilege 4512 taskkill.exe Token: SeDebugPrivilege 5068 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 4868 taskkill.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 5024 taskkill.exe Token: SeDebugPrivilege 4796 taskkill.exe Token: SeDebugPrivilege 2948 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 4548 taskkill.exe Token: SeDebugPrivilege 3312 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 928 taskkill.exe Token: SeDebugPrivilege 3364 taskkill.exe Token: SeDebugPrivilege 1104 taskkill.exe Token: SeDebugPrivilege 4232 taskkill.exe Token: SeDebugPrivilege 2592 taskkill.exe Token: SeDebugPrivilege 4388 taskkill.exe Token: SeDebugPrivilege 2496 taskkill.exe Token: SeDebugPrivilege 3976 taskkill.exe Token: SeDebugPrivilege 4724 taskkill.exe Token: SeDebugPrivilege 5092 taskkill.exe Token: SeDebugPrivilege 1400 taskkill.exe Token: SeDebugPrivilege 4384 taskkill.exe Token: SeDebugPrivilege 3136 taskkill.exe Token: SeDebugPrivilege 5032 taskkill.exe Token: SeDebugPrivilege 3144 taskkill.exe Token: SeDebugPrivilege 4152 taskkill.exe Token: SeDebugPrivilege 2036 taskkill.exe Token: SeDebugPrivilege 3708 taskkill.exe Token: SeDebugPrivilege 4988 taskkill.exe Token: SeDebugPrivilege 2272 taskkill.exe Token: SeDebugPrivilege 1428 taskkill.exe Token: SeDebugPrivilege 3704 taskkill.exe Token: SeDebugPrivilege 1168 taskkill.exe Token: SeDebugPrivilege 4344 taskkill.exe Token: SeDebugPrivilege 3880 taskkill.exe Token: SeDebugPrivilege 3808 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 3140 ssms.exe 368 Sab0tagE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1100 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 82 PID 1916 wrote to memory of 1100 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 82 PID 1916 wrote to memory of 1100 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 82 PID 1916 wrote to memory of 3472 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 84 PID 1916 wrote to memory of 3472 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 84 PID 1916 wrote to memory of 3472 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 84 PID 1916 wrote to memory of 3284 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 89 PID 1916 wrote to memory of 3284 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 89 PID 1916 wrote to memory of 3284 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 89 PID 1916 wrote to memory of 2952 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 88 PID 1916 wrote to memory of 2952 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 88 PID 1916 wrote to memory of 2952 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 88 PID 1916 wrote to memory of 1664 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 93 PID 1916 wrote to memory of 1664 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 93 PID 1916 wrote to memory of 1664 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 93 PID 1916 wrote to memory of 2160 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 92 PID 1916 wrote to memory of 2160 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 92 PID 1916 wrote to memory of 2160 1916 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 92 PID 3140 wrote to memory of 724 3140 ssms.exe 95 PID 3140 wrote to memory of 724 3140 ssms.exe 95 PID 3140 wrote to memory of 724 3140 ssms.exe 95 PID 3140 wrote to memory of 4388 3140 ssms.exe 98 PID 3140 wrote to memory of 4388 3140 ssms.exe 98 PID 3140 wrote to memory of 4388 3140 ssms.exe 98 PID 3140 wrote to memory of 3772 3140 ssms.exe 99 PID 3140 wrote to memory of 3772 3140 ssms.exe 99 PID 3140 wrote to memory of 3772 3140 ssms.exe 99 PID 3140 wrote to memory of 368 3140 ssms.exe 101 PID 3140 wrote to memory of 368 3140 ssms.exe 101 PID 3140 wrote to memory of 368 3140 ssms.exe 101 PID 368 wrote to memory of 4432 368 Sab0tagE.exe 102 PID 368 wrote to memory of 4432 368 Sab0tagE.exe 102 PID 368 wrote to memory of 4432 368 Sab0tagE.exe 102 PID 3140 wrote to memory of 1672 3140 ssms.exe 113 PID 3140 wrote to memory of 1672 3140 ssms.exe 113 PID 3140 wrote to memory of 1672 3140 ssms.exe 113 PID 3140 wrote to memory of 3320 3140 ssms.exe 105 PID 3140 wrote to memory of 3320 3140 ssms.exe 105 PID 3140 wrote to memory of 3320 3140 ssms.exe 105 PID 3140 wrote to memory of 4512 3140 ssms.exe 109 PID 3140 wrote to memory of 4512 3140 ssms.exe 109 PID 3140 wrote to memory of 4512 3140 ssms.exe 109 PID 3140 wrote to memory of 5068 3140 ssms.exe 107 PID 3140 wrote to memory of 5068 3140 ssms.exe 107 PID 3140 wrote to memory of 5068 3140 ssms.exe 107 PID 3140 wrote to memory of 2136 3140 ssms.exe 106 PID 3140 wrote to memory of 2136 3140 ssms.exe 106 PID 3140 wrote to memory of 2136 3140 ssms.exe 106 PID 3140 wrote to memory of 3980 3140 ssms.exe 108 PID 3140 wrote to memory of 3980 3140 ssms.exe 108 PID 3140 wrote to memory of 3980 3140 ssms.exe 108 PID 3140 wrote to memory of 3176 3140 ssms.exe 110 PID 3140 wrote to memory of 3176 3140 ssms.exe 110 PID 3140 wrote to memory of 3176 3140 ssms.exe 110 PID 3140 wrote to memory of 4868 3140 ssms.exe 118 PID 3140 wrote to memory of 4868 3140 ssms.exe 118 PID 3140 wrote to memory of 4868 3140 ssms.exe 118 PID 3140 wrote to memory of 5024 3140 ssms.exe 119 PID 3140 wrote to memory of 5024 3140 ssms.exe 119 PID 3140 wrote to memory of 5024 3140 ssms.exe 119 PID 3140 wrote to memory of 2948 3140 ssms.exe 121 PID 3140 wrote to memory of 2948 3140 ssms.exe 121 PID 3140 wrote to memory of 2948 3140 ssms.exe 121 PID 3140 wrote to memory of 4796 3140 ssms.exe 122 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ssms.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe"C:\Users\Admin\AppData\Local\Temp\db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe"1⤵
- Modifies security service
- Modifies system executable filetype association
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1916 -
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:f /e2⤵PID:1100
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:n /e2⤵PID:3472
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:f /e2⤵PID:2952
-
-
C:\Windows\SysWOW64\Schtasks.exeSchtasks /create /sc onstart /tn ssms /tr "C:\Windows\ssms.exe" /ru System2⤵
- Creates scheduled task(s)
PID:3284
-
-
C:\Windows\SysWOW64\Schtasks.exeSchtasks /run /tn ssms2⤵PID:2160
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:n /e2⤵PID:1664
-
-
C:\Windows\ssms.exeC:\Windows\ssms.exe1⤵
- Modifies security service
- Modifies system executable filetype association
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3140 -
C:\Windows\SysWOW64\Schtasks.exeSchtasks /create /sc onstart /tn ssms /tr "C:\Windows\ssms.exe" /ru System2⤵
- Creates scheduled task(s)
PID:724
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:f /e2⤵PID:4388
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:n /e2⤵PID:3772
-
-
C:\Windows\SysWOW64\Sab0tagE.exeC:\Windows\System32\Sab0tagE.exe2⤵
- Modifies security service
- Modifies system executable filetype association
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:368 -
C:\Windows\SysWOW64\Schtasks.exeSchtasks /create /sc onstart /tn ssms /tr "C:\Windows\ssms.exe" /ru System3⤵
- Creates scheduled task(s)
PID:4432
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq msvbvm60.dll" /fi "imagename ne ssms.exe" /fi "imagename ne Sab0tagE.exe" /fi "imagename ne explorer.exe" /fi "imagename ne ssms.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpsvc.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq iscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "windowtitle eq process*"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq RegistryFX.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SmΔRTP.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SmΔRTP.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq msvbvm60.dll" /fi "imagename ne ssms.exe" /fi "imagename ne Sab0tagE.exe" /fi "imagename ne explorer.exe" /fi "imagename ne ssms.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "windowtitle eq process*"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq iscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpsvc.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq RegistryFX.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SmΔRTP.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq msvbvm60.dll" /fi "imagename ne ssms.exe" /fi "imagename ne Sab0tagE.exe" /fi "imagename ne explorer.exe" /fi "imagename ne ssms.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "windowtitle eq process*"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq iscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpsvc.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq RegistryFX.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SmΔRTP.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq msvbvm60.dll" /fi "imagename ne ssms.exe" /fi "imagename ne Sab0tagE.exe" /fi "imagename ne explorer.exe" /fi "imagename ne ssms.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "windowtitle eq process*"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq iscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpsvc.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq RegistryFX.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SmΔRTP.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq msvbvm60.dll" /fi "imagename ne ssms.exe" /fi "imagename ne Sab0tagE.exe" /fi "imagename ne explorer.exe" /fi "imagename ne ssms.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "windowtitle eq process*"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq iscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpsvc.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq RegistryFX.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SmΔRTP.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq msvbvm60.dll" /fi "imagename ne ssms.exe" /fi "imagename ne Sab0tagE.exe" /fi "imagename ne explorer.exe" /fi "imagename ne ssms.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "windowtitle eq process*"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq iscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpsvc.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq rtpscan.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /f /fi "modules eq RegistryFX.dll"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD511b033f096fe729364458aa1e30a40df
SHA1b549780efe751c51494614e18fd3df78c0110baf
SHA2565f0b47715081542bc970fa435de80d5a86001deef06b6ca2a9272a5247333bfd
SHA5124b52e5a5a35f028b34348f2dc816131dcea8836708d6d90a12a6381a0e39a4a2554d85a9581f8d064cc7b7cd5f0998f96e40a5e82aa1715f60f5a992ffd2ba1f
-
Filesize
47KB
MD511b033f096fe729364458aa1e30a40df
SHA1b549780efe751c51494614e18fd3df78c0110baf
SHA2565f0b47715081542bc970fa435de80d5a86001deef06b6ca2a9272a5247333bfd
SHA5124b52e5a5a35f028b34348f2dc816131dcea8836708d6d90a12a6381a0e39a4a2554d85a9581f8d064cc7b7cd5f0998f96e40a5e82aa1715f60f5a992ffd2ba1f
-
Filesize
47KB
MD59185b5c631bb8b7bb674395e57237457
SHA158089d5622881bf30ec7a91119ad1a449118b48f
SHA25678b95311e9c269ea1fa4f1577ed59a39727591f97768e5f7c41a6936d1180e94
SHA512ed76a7b61b202b3417855696d5d5d6fce8e897be0319a5d5f1adeba0d5f9cb369c64dd8b32d24aac94ded73790199872f12a4c2e7bac9e7ac9d8191a43d8a579
-
Filesize
47KB
MD59185b5c631bb8b7bb674395e57237457
SHA158089d5622881bf30ec7a91119ad1a449118b48f
SHA25678b95311e9c269ea1fa4f1577ed59a39727591f97768e5f7c41a6936d1180e94
SHA512ed76a7b61b202b3417855696d5d5d6fce8e897be0319a5d5f1adeba0d5f9cb369c64dd8b32d24aac94ded73790199872f12a4c2e7bac9e7ac9d8191a43d8a579
-
Filesize
1KB
MD54f6b3e8a0ca3a608ebf89fccf149d959
SHA17e611949dcb4581a5b01231d5368047d439d9208
SHA256580a43d57f08203a0a5f51c9cc3da4a2d79d3a75bba7a3ceeaa5f6ee25c1e1a3
SHA51257c9f597e2138e05eb899b2caed20a55a47edd4b5c9be944ab6bb5f4481cd2e763a6aae25a1fea2e404a1e5134a8bbcc3a1a6aec4f622c319beb8d11487771ea