Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2022 06:30
Static task
static1
Behavioral task
behavioral1
Sample
934cfeb5ee3d2ba49831d76dffb1a2658326e1cd90b50779d6670eb2fbdc7ed1.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
934cfeb5ee3d2ba49831d76dffb1a2658326e1cd90b50779d6670eb2fbdc7ed1.js
Resource
win10v2004-20220812-en
General
-
Target
934cfeb5ee3d2ba49831d76dffb1a2658326e1cd90b50779d6670eb2fbdc7ed1.js
-
Size
222KB
-
MD5
b23cae8d39d76a08197382e0d9d5c297
-
SHA1
2bcc921be8477c6cce77ff4782e068ca798318de
-
SHA256
934cfeb5ee3d2ba49831d76dffb1a2658326e1cd90b50779d6670eb2fbdc7ed1
-
SHA512
e120d8b7f60ec7029c00f23573bff52b3d5655c0657a42fc7585e66a256afc99df78d942778a87913a9271d0e4f233b5511bf40328c6244b773ef52b41a3b72b
-
SSDEEP
1536:62W2DpnCRTcWhVW+kIsoT3C9Adztk+sIbl2/V8pfzauBNo15q/K6cU77gVsCftVY:T25gfsss
Malware Config
Signatures
-
Detect magniber ransomware 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5068-135-0x00000175800D8000-0x00000175800E4000-memory.dmp family_magniber behavioral2/memory/2500-136-0x000002B34D790000-0x000002B34D79B000-memory.dmp family_magniber behavioral2/memory/5068-150-0x00000175800D8000-0x00000175800E4000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
bcdedit.exebcdedit.exewbadmin.exewbadmin.exebcdedit.exebcdedit.exewbadmin.exewbadmin.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4020 3572 bcdedit.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3180 3572 bcdedit.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 3572 wbadmin.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4704 3572 wbadmin.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5068 3572 bcdedit.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 3572 bcdedit.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 3572 wbadmin.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 3572 wbadmin.exe -
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 4020 bcdedit.exe 3180 bcdedit.exe 5068 bcdedit.exe 2888 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exepid process 4704 wbadmin.exe 3096 wbadmin.exe -
Processes:
wbadmin.exewbadmin.exepid process 4800 wbadmin.exe 2884 wbadmin.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
svchost.exedescription ioc process File renamed C:\Users\Admin\Pictures\RestoreFind.png => C:\Users\Admin\Pictures\RestoreFind.png.rfguxgmap svchost.exe File renamed C:\Users\Admin\Pictures\AssertExpand.tif => C:\Users\Admin\Pictures\AssertExpand.tif.rfguxgmap svchost.exe File renamed C:\Users\Admin\Pictures\DisableFind.png => C:\Users\Admin\Pictures\DisableFind.png.rfguxgmap svchost.exe File opened for modification C:\Users\Admin\Pictures\JoinEnable.tiff svchost.exe File renamed C:\Users\Admin\Pictures\JoinEnable.tiff => C:\Users\Admin\Pictures\JoinEnable.tiff.rfguxgmap svchost.exe File renamed C:\Users\Admin\Pictures\MeasureRestore.png => C:\Users\Admin\Pictures\MeasureRestore.png.rfguxgmap svchost.exe -
Drops file in Windows directory 3 IoCs
Processes:
wbadmin.exedescription ioc process File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3232 3252 WerFault.exe DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vds.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Modifies registry class 42 IoCs
Processes:
Explorer.EXEtaskhostw.exeRuntimeBroker.exesvchost.exeRuntimeBroker.exesihost.exesvchost.exeRuntimeBroker.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/dpdqtet.rdb" taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/fhkyhnvbfu.rdb" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/zsmyph.rdb" sihost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings sihost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/tjuintflur.rdb" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/qzotfrz.rdb" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/xjxckrzhp.rdb" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/ulwlbsf.rdb" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/gcsnamdugcd.rdb" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\ms-settings RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute sihost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
wscript.exepid process 5068 wscript.exe 5068 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2220 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
Explorer.EXERuntimeBroker.exevssvc.exewbengine.exedescription pid process Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 3420 RuntimeBroker.exe Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeBackupPrivilege 2216 vssvc.exe Token: SeRestorePrivilege 2216 vssvc.exe Token: SeAuditPrivilege 2216 vssvc.exe Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeBackupPrivilege 1924 wbengine.exe Token: SeRestorePrivilege 1924 wbengine.exe Token: SeSecurityPrivilege 1924 wbengine.exe Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE Token: SeShutdownPrivilege 2220 Explorer.EXE Token: SeCreatePagefilePrivilege 2220 Explorer.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
wscript.execmd.exefodhelper.execmd.exefodhelper.execmd.exefodhelper.execmd.exefodhelper.execmd.exefodhelper.exedescription pid process target process PID 5068 wrote to memory of 2500 5068 wscript.exe sihost.exe PID 5068 wrote to memory of 2648 5068 wscript.exe svchost.exe PID 5068 wrote to memory of 2868 5068 wscript.exe taskhostw.exe PID 5068 wrote to memory of 2220 5068 wscript.exe Explorer.EXE PID 5068 wrote to memory of 2668 5068 wscript.exe svchost.exe PID 5068 wrote to memory of 3252 5068 wscript.exe DllHost.exe PID 5068 wrote to memory of 3356 5068 wscript.exe StartMenuExperienceHost.exe PID 5068 wrote to memory of 3420 5068 wscript.exe RuntimeBroker.exe PID 5068 wrote to memory of 3500 5068 wscript.exe SearchApp.exe PID 5068 wrote to memory of 3712 5068 wscript.exe RuntimeBroker.exe PID 5068 wrote to memory of 4708 5068 wscript.exe RuntimeBroker.exe PID 5068 wrote to memory of 4928 5068 wscript.exe RuntimeBroker.exe PID 4428 wrote to memory of 3260 4428 cmd.exe fodhelper.exe PID 4428 wrote to memory of 3260 4428 cmd.exe fodhelper.exe PID 3260 wrote to memory of 4672 3260 fodhelper.exe wscript.exe PID 3260 wrote to memory of 4672 3260 fodhelper.exe wscript.exe PID 2924 wrote to memory of 1656 2924 cmd.exe fodhelper.exe PID 2924 wrote to memory of 1656 2924 cmd.exe fodhelper.exe PID 1656 wrote to memory of 4884 1656 fodhelper.exe wscript.exe PID 1656 wrote to memory of 4884 1656 fodhelper.exe wscript.exe PID 1588 wrote to memory of 4648 1588 cmd.exe fodhelper.exe PID 1588 wrote to memory of 4648 1588 cmd.exe fodhelper.exe PID 4648 wrote to memory of 3976 4648 fodhelper.exe wscript.exe PID 4648 wrote to memory of 3976 4648 fodhelper.exe wscript.exe PID 3960 wrote to memory of 2608 3960 cmd.exe fodhelper.exe PID 3960 wrote to memory of 2608 3960 cmd.exe fodhelper.exe PID 2608 wrote to memory of 3824 2608 fodhelper.exe wscript.exe PID 2608 wrote to memory of 3824 2608 fodhelper.exe wscript.exe PID 3296 wrote to memory of 480 3296 cmd.exe fodhelper.exe PID 3296 wrote to memory of 480 3296 cmd.exe fodhelper.exe PID 480 wrote to memory of 1496 480 fodhelper.exe wscript.exe PID 480 wrote to memory of 1496 480 fodhelper.exe wscript.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\934cfeb5ee3d2ba49831d76dffb1a2658326e1cd90b50779d6670eb2fbdc7ed1.js2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:3712
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3500
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:4708 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/fhkyhnvbfu.rdb4⤵PID:4884
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/zsmyph.rdb4⤵PID:1496
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3356
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3252
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3252 -s 3722⤵
- Program crash
PID:3232
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Modifies registry class
PID:2668 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/fhkyhnvbfu.rdb4⤵PID:3976
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Modifies registry class
PID:2868 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/fhkyhnvbfu.rdb4⤵PID:3824
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Modifies extensions of user files
- Modifies registry class
PID:2648 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\system32\wscript.exe"wscript.exe" /B /E:VBScript.Encode ../../Users/Public/fhkyhnvbfu.rdb4⤵PID:4672
-
-
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
PID:2500
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4928
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 396 -p 3252 -ip 32521⤵PID:2144
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:4020
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:3180
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:4800
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
- Drops file in Windows directory
PID:4704
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2168
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:1184
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:5068
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2888
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:3096
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:2884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
879B
MD5098d0faaa89567d9a83140ffa9d4f847
SHA116f770710dde9c38de9aae7fc69e748d8f812e4f
SHA256c4e660d36e2736640e03ab63ea7bbd985a3232da41c3237afb900609a367f6b5
SHA512d424a32050f9c9b7bebf2cb69021125b747f0d569e14d4c27e392b9729c6ada665a6b7d5cbf469c3424f41a299a61d4f9ca56be4be5b6df45da62c6c37662781
-
Filesize
879B
MD5098d0faaa89567d9a83140ffa9d4f847
SHA116f770710dde9c38de9aae7fc69e748d8f812e4f
SHA256c4e660d36e2736640e03ab63ea7bbd985a3232da41c3237afb900609a367f6b5
SHA512d424a32050f9c9b7bebf2cb69021125b747f0d569e14d4c27e392b9729c6ada665a6b7d5cbf469c3424f41a299a61d4f9ca56be4be5b6df45da62c6c37662781