Analysis
-
max time kernel
137s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-10-2022 19:45
Static task
static1
Behavioral task
behavioral1
Sample
0e4d44dde522c07d09d9e3086cfae803.exe
Resource
win7-20220812-en
General
-
Target
0e4d44dde522c07d09d9e3086cfae803.exe
-
Size
3.9MB
-
MD5
0e4d44dde522c07d09d9e3086cfae803
-
SHA1
d8dc26e2094869a0da78ecb47494c931419302dc
-
SHA256
33aceb3dc0681a56226d4cfce32eee7a431e66f5c746a4d6dc7506a72b317277
-
SHA512
ac1f269b028217210a72fc5c2e0cb07461e2ff896f8b5ba65771787f99ec34b0f9951cf73d9d387086f79c348c343d147aebc2fd5b7e18da009bc2041e2eee06
-
SSDEEP
49152:e2NiZPNNirb/T2vO90dL3BmAFd4A64nsfJk0NuXCdmTQb0/6VCrrPrsbg11VgWA2:e2ANB04yIa0hsirubO
Malware Config
Extracted
C:\Program Files\7-Zip\n8pw_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 1888 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 1708 wevtutil.exe 1624 wevtutil.exe 1352 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 432 bcdedit.exe 756 bcdedit.exe -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
0e4d44dde522c07d09d9e3086cfae803.exedescription ioc process File renamed C:\Users\Admin\Pictures\ImportPing.crw => C:\Users\Admin\Pictures\ImportPing.crw.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\ImportPing.crw.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\LockTrace.tif => C:\Users\Admin\Pictures\LockTrace.tif.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\StartWatch.png => C:\Users\Admin\Pictures\StartWatch.png.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\StartWatch.png.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\DismountLock.png => C:\Users\Admin\Pictures\DismountLock.png.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\DisconnectRevoke.crw => C:\Users\Admin\Pictures\DisconnectRevoke.crw.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\DisconnectRevoke.crw.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\RenameSend.png.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\DismountLock.png.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\LockTrace.tif.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\RenameSend.png => C:\Users\Admin\Pictures\RenameSend.png.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
0e4d44dde522c07d09d9e3086cfae803.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\BUZZ.WAV.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Paramaribo.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Real.mpp.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00372_.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\feature.properties.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-first-quarter.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00008_.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe.sig.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\GRDEN_01.MID.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18243_.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Apia.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Syowa.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_config_window.html.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\SETUP.XML.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0158007.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR_COL.HXC.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Reunion.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\mpvis.dll.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18189_.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\wmplayer.exe.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\classes.jsa 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Aqtobe.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.nl_zh_4.4.0.v20140623020002.jar.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-editor-mimelookup-impl.jar.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-queries.xml.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\currency.html 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00330_.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\currency.html 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files\Microsoft Games\More Games\en-US\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore.xmi_2.10.1.v20140901-1043.jar.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\WMPDMC.exe.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-BoldIt.otf.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105412.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\larrow.gif.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_10.MID.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePage.gif.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\mpvis.dll.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\access-bridge-64.jar.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.commands_3.6.100.v20140528-1422.jar.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\currency.css 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\SONORA.ELM.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD19986_.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\ELPHRG01.WAV.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Events.accdt.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\slideShow.css 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\background.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ust-Nera.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Darwin.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\background.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BAN98.POC.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_snow.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\wmpnetwk.exe.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02125_.WMF.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsBlankPage.html.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\LATIN1.SHP.oPWjTdN0f8VNB2HAEr0zJSl_YKrR8TYdfY3pjlB1jwP_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl-hot.png 0e4d44dde522c07d09d9e3086cfae803.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1940 sc.exe 1964 sc.exe 788 sc.exe 980 sc.exe 1736 sc.exe 364 sc.exe 268 sc.exe 1576 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 820 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exe0e4d44dde522c07d09d9e3086cfae803.exepid process 1996 powershell.exe 1240 powershell.exe 1944 0e4d44dde522c07d09d9e3086cfae803.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 1708 wevtutil.exe Token: SeBackupPrivilege 1708 wevtutil.exe Token: SeSecurityPrivilege 1624 wevtutil.exe Token: SeBackupPrivilege 1624 wevtutil.exe Token: SeSecurityPrivilege 1352 wevtutil.exe Token: SeBackupPrivilege 1352 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1772 wmic.exe Token: SeSecurityPrivilege 1772 wmic.exe Token: SeTakeOwnershipPrivilege 1772 wmic.exe Token: SeLoadDriverPrivilege 1772 wmic.exe Token: SeSystemProfilePrivilege 1772 wmic.exe Token: SeSystemtimePrivilege 1772 wmic.exe Token: SeProfSingleProcessPrivilege 1772 wmic.exe Token: SeIncBasePriorityPrivilege 1772 wmic.exe Token: SeCreatePagefilePrivilege 1772 wmic.exe Token: SeBackupPrivilege 1772 wmic.exe Token: SeRestorePrivilege 1772 wmic.exe Token: SeShutdownPrivilege 1772 wmic.exe Token: SeDebugPrivilege 1772 wmic.exe Token: SeSystemEnvironmentPrivilege 1772 wmic.exe Token: SeRemoteShutdownPrivilege 1772 wmic.exe Token: SeUndockPrivilege 1772 wmic.exe Token: SeManageVolumePrivilege 1772 wmic.exe Token: 33 1772 wmic.exe Token: 34 1772 wmic.exe Token: 35 1772 wmic.exe Token: SeIncreaseQuotaPrivilege 1912 wmic.exe Token: SeSecurityPrivilege 1912 wmic.exe Token: SeTakeOwnershipPrivilege 1912 wmic.exe Token: SeLoadDriverPrivilege 1912 wmic.exe Token: SeSystemProfilePrivilege 1912 wmic.exe Token: SeSystemtimePrivilege 1912 wmic.exe Token: SeProfSingleProcessPrivilege 1912 wmic.exe Token: SeIncBasePriorityPrivilege 1912 wmic.exe Token: SeCreatePagefilePrivilege 1912 wmic.exe Token: SeBackupPrivilege 1912 wmic.exe Token: SeRestorePrivilege 1912 wmic.exe Token: SeShutdownPrivilege 1912 wmic.exe Token: SeDebugPrivilege 1912 wmic.exe Token: SeSystemEnvironmentPrivilege 1912 wmic.exe Token: SeRemoteShutdownPrivilege 1912 wmic.exe Token: SeUndockPrivilege 1912 wmic.exe Token: SeManageVolumePrivilege 1912 wmic.exe Token: 33 1912 wmic.exe Token: 34 1912 wmic.exe Token: 35 1912 wmic.exe Token: SeIncreaseQuotaPrivilege 1912 wmic.exe Token: SeSecurityPrivilege 1912 wmic.exe Token: SeTakeOwnershipPrivilege 1912 wmic.exe Token: SeLoadDriverPrivilege 1912 wmic.exe Token: SeSystemProfilePrivilege 1912 wmic.exe Token: SeSystemtimePrivilege 1912 wmic.exe Token: SeProfSingleProcessPrivilege 1912 wmic.exe Token: SeIncBasePriorityPrivilege 1912 wmic.exe Token: SeCreatePagefilePrivilege 1912 wmic.exe Token: SeBackupPrivilege 1912 wmic.exe Token: SeRestorePrivilege 1912 wmic.exe Token: SeShutdownPrivilege 1912 wmic.exe Token: SeDebugPrivilege 1912 wmic.exe Token: SeSystemEnvironmentPrivilege 1912 wmic.exe Token: SeRemoteShutdownPrivilege 1912 wmic.exe Token: SeUndockPrivilege 1912 wmic.exe Token: SeManageVolumePrivilege 1912 wmic.exe Token: 33 1912 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0e4d44dde522c07d09d9e3086cfae803.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1944 wrote to memory of 1536 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1536 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1536 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1536 wrote to memory of 1340 1536 net.exe net1.exe PID 1536 wrote to memory of 1340 1536 net.exe net1.exe PID 1536 wrote to memory of 1340 1536 net.exe net1.exe PID 1944 wrote to memory of 1316 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1316 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1316 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1316 wrote to memory of 1148 1316 net.exe net1.exe PID 1316 wrote to memory of 1148 1316 net.exe net1.exe PID 1316 wrote to memory of 1148 1316 net.exe net1.exe PID 1944 wrote to memory of 1356 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1356 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1356 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1356 wrote to memory of 944 1356 net.exe net1.exe PID 1356 wrote to memory of 944 1356 net.exe net1.exe PID 1356 wrote to memory of 944 1356 net.exe net1.exe PID 1944 wrote to memory of 1692 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1692 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1692 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1692 wrote to memory of 1216 1692 net.exe net1.exe PID 1692 wrote to memory of 1216 1692 net.exe net1.exe PID 1692 wrote to memory of 1216 1692 net.exe net1.exe PID 1944 wrote to memory of 1776 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1776 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1776 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1776 wrote to memory of 1212 1776 net.exe net1.exe PID 1776 wrote to memory of 1212 1776 net.exe net1.exe PID 1776 wrote to memory of 1212 1776 net.exe net1.exe PID 1944 wrote to memory of 1408 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1408 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1408 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1408 wrote to memory of 108 1408 net.exe net1.exe PID 1408 wrote to memory of 108 1408 net.exe net1.exe PID 1408 wrote to memory of 108 1408 net.exe net1.exe PID 1944 wrote to memory of 1248 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1248 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1248 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1248 wrote to memory of 824 1248 net.exe net1.exe PID 1248 wrote to memory of 824 1248 net.exe net1.exe PID 1248 wrote to memory of 824 1248 net.exe net1.exe PID 1944 wrote to memory of 1880 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1880 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1944 wrote to memory of 1880 1944 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1880 wrote to memory of 972 1880 net.exe net1.exe PID 1880 wrote to memory of 972 1880 net.exe net1.exe PID 1880 wrote to memory of 972 1880 net.exe net1.exe PID 1944 wrote to memory of 1736 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1736 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1736 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 364 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 364 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 364 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 268 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 268 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 268 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1576 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1576 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1576 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1940 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1940 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1940 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 1944 wrote to memory of 1964 1944 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4d44dde522c07d09d9e3086cfae803.exe"C:\Users\Admin\AppData\Local\Temp\0e4d44dde522c07d09d9e3086cfae803.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:1340
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1148
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:944
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1216
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1212
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:108
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:824
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:972
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:1736
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:364
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:268
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:1576
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1940
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1964
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:788
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:980
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1656
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:764
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:280
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1592
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1380
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1148
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1992
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1900
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:936
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:468
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:108
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:792
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:968
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1320
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:840
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1572
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1144
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1500
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:836
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1472
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1100
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:616
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1740
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1308
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1212
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:976
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1564
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1620
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:624
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1440
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1448
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1192
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:544
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:820
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:432
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:756
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1032
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1888
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:1596
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58bfa16ad31a236deeb985e46ba1ad6b2
SHA1c1b815a89ef5714849fe577d6e6e6069fd96b9ce
SHA2560b045280c448753d16d77e5077e6cd18026c46873ddc8ea97e5e20d4282db6b0
SHA512c28c87521d8db59bacdab519e8ffe21bd8ca26781adcc539bb729039b7cf69d976b8e1c026772251a29ebc328d0d43d384499b986d13f2f7478a0c6d3e9cede2