Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 08:35
Static task
static1
Behavioral task
behavioral1
Sample
SYSTEM.Critical.Upgrade.Win10.0.7f9deb08357b29.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SYSTEM.Critical.Upgrade.Win10.0.7f9deb08357b29.js
Resource
win10v2004-20220812-en
General
-
Target
SYSTEM.Critical.Upgrade.Win10.0.7f9deb08357b29.js
-
Size
222KB
-
MD5
b23cae8d39d76a08197382e0d9d5c297
-
SHA1
2bcc921be8477c6cce77ff4782e068ca798318de
-
SHA256
934cfeb5ee3d2ba49831d76dffb1a2658326e1cd90b50779d6670eb2fbdc7ed1
-
SHA512
e120d8b7f60ec7029c00f23573bff52b3d5655c0657a42fc7585e66a256afc99df78d942778a87913a9271d0e4f233b5511bf40328c6244b773ef52b41a3b72b
-
SSDEEP
1536:62W2DpnCRTcWhVW+kIsoT3C9Adztk+sIbl2/V8pfzauBNo15q/K6cU77gVsCftVY:T25gfsss
Malware Config
Signatures
-
Detect magniber ransomware 3 IoCs
Processes:
resource yara_rule behavioral2/memory/372-135-0x00000229800D8000-0x00000229800E4000-memory.dmp family_magniber behavioral2/memory/2328-137-0x0000017B1A2C0000-0x0000017B1A2CB000-memory.dmp family_magniber behavioral2/memory/372-150-0x00000229800D8000-0x00000229800E4000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 16 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
bcdedit.exebcdedit.exewbadmin.exewbadmin.exebcdedit.exebcdedit.exewbadmin.exewbadmin.exebcdedit.exebcdedit.exewbadmin.exewbadmin.exebcdedit.exewbadmin.exebcdedit.exewbadmin.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 1428 wbadmin.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 1428 wbadmin.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3100 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3252 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3848 1428 wbadmin.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 1428 wbadmin.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 1428 wbadmin.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3132 1428 wbadmin.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 1428 wbadmin.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 1428 bcdedit.exe 87 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3780 1428 wbadmin.exe 87 -
Modifies boot configuration data using bcdedit 1 TTPs 8 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid Process 2564 bcdedit.exe 1820 bcdedit.exe 3100 bcdedit.exe 3252 bcdedit.exe 2520 bcdedit.exe 2728 bcdedit.exe 2952 bcdedit.exe 1432 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exewbadmin.exewbadmin.exepid Process 2556 wbadmin.exe 3540 wbadmin.exe 3132 wbadmin.exe 3780 wbadmin.exe -
Processes:
wbadmin.exewbadmin.exewbadmin.exewbadmin.exepid Process 1284 wbadmin.exe 3848 wbadmin.exe 4908 wbadmin.exe 2720 wbadmin.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
sihost.exedescription ioc Process File renamed C:\Users\Admin\Pictures\CloseSearch.tif => C:\Users\Admin\Pictures\CloseSearch.tif.rfguxgmap sihost.exe File renamed C:\Users\Admin\Pictures\DisableSelect.tiff => C:\Users\Admin\Pictures\DisableSelect.tiff.rfguxgmap sihost.exe File renamed C:\Users\Admin\Pictures\DismountRename.tif => C:\Users\Admin\Pictures\DismountRename.tif.rfguxgmap sihost.exe File renamed C:\Users\Admin\Pictures\ExportUnlock.png => C:\Users\Admin\Pictures\ExportUnlock.png.rfguxgmap sihost.exe File renamed C:\Users\Admin\Pictures\GrantTest.tiff => C:\Users\Admin\Pictures\GrantTest.tiff.rfguxgmap sihost.exe File renamed C:\Users\Admin\Pictures\CompressExport.raw => C:\Users\Admin\Pictures\CompressExport.raw.rfguxgmap sihost.exe File renamed C:\Users\Admin\Pictures\HideWait.raw => C:\Users\Admin\Pictures\HideWait.raw.rfguxgmap sihost.exe File renamed C:\Users\Admin\Pictures\SelectTest.raw => C:\Users\Admin\Pictures\SelectTest.raw.rfguxgmap sihost.exe File opened for modification C:\Users\Admin\Pictures\DisableSelect.tiff sihost.exe File opened for modification C:\Users\Admin\Pictures\GrantTest.tiff sihost.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4580 3248 WerFault.exe 46 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vds.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Modifies registry class 42 IoCs
Processes:
RuntimeBroker.exeRuntimeBroker.exeRuntimeBroker.exesvchost.exesihost.exeExplorer.EXEtaskhostw.exesvchost.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/pcaslbo.rdb" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/sqlbpokzncn.rdb" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute sihost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer sihost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/ybtpxugwmacr.rdb" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/jcqcqzuqm.rdb" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings sihost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/uzbpcqctep.rdb" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/wepmtektahlp.rdb" taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/sopgovbqv.rdb" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/hybsjofq.rdb" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer svchost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\CurVer svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
wscript.exepid Process 372 wscript.exe 372 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 2704 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Explorer.EXERuntimeBroker.exevssvc.exewbengine.exedescription pid Process Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 3416 RuntimeBroker.exe Token: SeShutdownPrivilege 3416 RuntimeBroker.exe Token: SeShutdownPrivilege 3416 RuntimeBroker.exe Token: SeBackupPrivilege 1656 vssvc.exe Token: SeRestorePrivilege 1656 vssvc.exe Token: SeAuditPrivilege 1656 vssvc.exe Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeBackupPrivilege 4648 wbengine.exe Token: SeRestorePrivilege 4648 wbengine.exe Token: SeSecurityPrivilege 4648 wbengine.exe Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE Token: SeCreatePagefilePrivilege 2704 Explorer.EXE Token: SeShutdownPrivilege 2704 Explorer.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
wscript.execmd.exefodhelper.execmd.exefodhelper.execmd.exefodhelper.execmd.exedescription pid Process procid_target PID 372 wrote to memory of 2328 372 wscript.exe 56 PID 372 wrote to memory of 2360 372 wscript.exe 18 PID 372 wrote to memory of 2432 372 wscript.exe 55 PID 372 wrote to memory of 2704 372 wscript.exe 20 PID 372 wrote to memory of 2812 372 wscript.exe 47 PID 372 wrote to memory of 3248 372 wscript.exe 46 PID 372 wrote to memory of 3348 372 wscript.exe 45 PID 372 wrote to memory of 3416 372 wscript.exe 22 PID 372 wrote to memory of 3508 372 wscript.exe 44 PID 372 wrote to memory of 3728 372 wscript.exe 43 PID 372 wrote to memory of 4896 372 wscript.exe 41 PID 372 wrote to memory of 4076 372 wscript.exe 28 PID 4948 wrote to memory of 4232 4948 cmd.exe 96 PID 4948 wrote to memory of 4232 4948 cmd.exe 96 PID 4232 wrote to memory of 4868 4232 fodhelper.exe 98 PID 4232 wrote to memory of 4868 4232 fodhelper.exe 98 PID 1988 wrote to memory of 2108 1988 cmd.exe 115 PID 1988 wrote to memory of 2108 1988 cmd.exe 115 PID 2108 wrote to memory of 1800 2108 fodhelper.exe 117 PID 2108 wrote to memory of 1800 2108 fodhelper.exe 117 PID 1396 wrote to memory of 1612 1396 cmd.exe 128 PID 1396 wrote to memory of 1612 1396 cmd.exe 128 PID 1612 wrote to memory of 548 1612 fodhelper.exe 130 PID 1612 wrote to memory of 548 1612 fodhelper.exe 130 PID 2296 wrote to memory of 4344 2296 cmd.exe 141 PID 2296 wrote to memory of 4344 2296 cmd.exe 141
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Modifies registry class
PID:2360
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\SYSTEM.Critical.Upgrade.Win10.0.7f9deb08357b29.js2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4076
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:4896 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/sopgovbqv.rdb4⤵PID:1800
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:3728 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/sqlbpokzncn.rdb4⤵PID:548
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3508
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3348
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3248
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3248 -s 8482⤵
- Program crash
PID:4580
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Modifies registry class
PID:2812 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/uzbpcqctep.rdb4⤵PID:4868
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Modifies registry class
PID:2432
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies extensions of user files
- Modifies registry class
PID:2328 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵PID:4344
-
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/sqlbpokzncn.rdb4⤵PID:1176
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 3248 -ip 32481⤵PID:1716
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2564
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:1820
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:1284
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:2556
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3368
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:4976
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:3100
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:3252
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:3848
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:3540
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2520
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2728
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:4908
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:3132
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2952
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:2720
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:1432
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:3780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
879B
MD5098d0faaa89567d9a83140ffa9d4f847
SHA116f770710dde9c38de9aae7fc69e748d8f812e4f
SHA256c4e660d36e2736640e03ab63ea7bbd985a3232da41c3237afb900609a367f6b5
SHA512d424a32050f9c9b7bebf2cb69021125b747f0d569e14d4c27e392b9729c6ada665a6b7d5cbf469c3424f41a299a61d4f9ca56be4be5b6df45da62c6c37662781
-
Filesize
879B
MD5098d0faaa89567d9a83140ffa9d4f847
SHA116f770710dde9c38de9aae7fc69e748d8f812e4f
SHA256c4e660d36e2736640e03ab63ea7bbd985a3232da41c3237afb900609a367f6b5
SHA512d424a32050f9c9b7bebf2cb69021125b747f0d569e14d4c27e392b9729c6ada665a6b7d5cbf469c3424f41a299a61d4f9ca56be4be5b6df45da62c6c37662781
-
Filesize
879B
MD5098d0faaa89567d9a83140ffa9d4f847
SHA116f770710dde9c38de9aae7fc69e748d8f812e4f
SHA256c4e660d36e2736640e03ab63ea7bbd985a3232da41c3237afb900609a367f6b5
SHA512d424a32050f9c9b7bebf2cb69021125b747f0d569e14d4c27e392b9729c6ada665a6b7d5cbf469c3424f41a299a61d4f9ca56be4be5b6df45da62c6c37662781