Analysis
-
max time kernel
1836s -
max time network
1610s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
decoding_data.exe
Resource
win7-20220812-en
General
-
Target
decoding_data.exe
-
Size
3.4MB
-
MD5
177417be748814f6168171a42545f9dd
-
SHA1
9c8b988e66e0fe6f9dab69b1055e4ee200531094
-
SHA256
47dbb2594cd5eb7015ef08b7fb803cd5adc1a1fbe4849dc847c0940f1ccace35
-
SHA512
c90eebbd4663ffe4bec089e21e4f7c1a1441e21a2f78cc190b9ce85fd048bf46901aa74273695df7b6434887284a26d4fdaaf657cb5d9c5469574158adc351c2
-
SSDEEP
49152:EynbnX4Rsrb/TFvO90dL3BmAFd4A64nsfJUvelzON7j93aqSCD0BUCoQPr8bg11t:EyrAe2lS75Hw+i4JROD5R
Malware Config
Extracted
C:\Program Files\7-Zip\Djfk_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 1412 wevtutil.exe 3516 wevtutil.exe 2692 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 4508 bcdedit.exe 2572 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
decoding_data.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ul-phn.xrm-ms.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_GlJi1-rl-Gg0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\cef_extensions.pak.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_bUzAbK0yv1g0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Trial-ppd.xrm-ms.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn__8EKguDpKFY0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square150x150\PaintMedTile.scale-150.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-200_contrast-white.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-20_altform-unplated.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarWideTile.scale-200.png decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-phn.xrm-ms.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_GWyS9VMh8O00.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.scale-125.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-40_altform-unplated.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeLogo.scale-200_contrast-black.png decoding_data.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\iexplore.exe.mui decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL020.XML.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_16iTnXIRn0s0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\PICTIM32.FLT.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_-Gjf3HrRX-E0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Dial\Tolerance.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\animations\OneNoteAudio_RecordingPlayback.gif decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\eu-ES\View3d\3DViewerProductDescription-universal.xml decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sk-sk\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\153.png decoding_data.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSGet.Resource.psd1.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_7pRUDkhnCWM0.snwkz decoding_data.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.targetsize-30_altform-unplated.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-80_altform-lightunplated.png decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\ui-strings.js.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_zFbKOdlynBg0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sv-se\ui-strings.js.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_5vh59o9LlRo0.snwkz decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.p2.ui.overridden_5.5.0.165303.jar.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_F76r5Wazzgo0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial4-pl.xrm-ms.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_7yOgb9Pzd9g0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\VoiceRecorderLargeTile.contrast-white_scale-125.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-80_altform-unplated.png decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\es-es\ui-strings.js.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_XWbRNRSMRk80.snwkz decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-100.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\SplashScreen.scale-200.png decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets.nl_ja_4.4.0.v20140623020002.jar.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_-qYSV5o9MlU0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Gallery.thmx.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_D1OvyAh1fAk0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ppd.xrm-ms.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_ZhHf9W8oaNI0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_COL.HXT.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_R695f81fA_s0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\warning_2x.png.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_-Ft-HASavXo0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\PipelineSegments.store.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_H8ZbyVYRNRA0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_SplashScreen.scale-100.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-24.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorSplashScreen.contrast-white_scale-100.png decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\aic_file_icons_highcontrast.png.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_iKcwRrbQ5oo0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYMXL.TTF.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_ZRN3YNCzqj00.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\168.png decoding_data.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\de-de\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-ul-oob.xrm-ms.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_1FIuGspkMlk0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\THMBNAIL.PNG.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_1Rm7_u2k8WQ0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupMedTile.scale-100.png decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\pt-br\ui-strings.js.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_uyOUMmaRjDc0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_delete_18.svg.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_Ma8-vWwd0DQ0.snwkz decoding_data.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\be_get.svg.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_1cSAeJmMOMI0.snwkz decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pt-br\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\boot_zh_CN.jar.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_Rwzs9kCJikI0.snwkz decoding_data.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-pl.xrm-ms.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_9_Z-ssmr8Ec0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-60_altform-fullcolor.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-32_altform-lightunplated.png decoding_data.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pl-pl\Djfk_HOW_TO_DECRYPT.txt decoding_data.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423496926556.profile.gz.MlmqG3sHoRD9jCwwQudoxhn-moP2N_reB9KC51Uo1wn_ZbH1YX-OVao0.snwkz decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_TileSmallSquare.scale-100.png decoding_data.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\LargeTile.scale-100_contrast-black.png decoding_data.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1496 sc.exe 3108 sc.exe 2720 sc.exe 3712 sc.exe 1704 sc.exe 2136 sc.exe 4672 sc.exe 2436 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2452 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exedecoding_data.exepid process 3728 powershell.exe 3728 powershell.exe 228 powershell.exe 228 powershell.exe 2132 decoding_data.exe 2132 decoding_data.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 1412 wevtutil.exe Token: SeBackupPrivilege 1412 wevtutil.exe Token: SeSecurityPrivilege 3516 wevtutil.exe Token: SeBackupPrivilege 3516 wevtutil.exe Token: SeSecurityPrivilege 2692 wevtutil.exe Token: SeBackupPrivilege 2692 wevtutil.exe Token: SeIncreaseQuotaPrivilege 4440 wmic.exe Token: SeSecurityPrivilege 4440 wmic.exe Token: SeTakeOwnershipPrivilege 4440 wmic.exe Token: SeLoadDriverPrivilege 4440 wmic.exe Token: SeSystemProfilePrivilege 4440 wmic.exe Token: SeSystemtimePrivilege 4440 wmic.exe Token: SeProfSingleProcessPrivilege 4440 wmic.exe Token: SeIncBasePriorityPrivilege 4440 wmic.exe Token: SeCreatePagefilePrivilege 4440 wmic.exe Token: SeBackupPrivilege 4440 wmic.exe Token: SeRestorePrivilege 4440 wmic.exe Token: SeShutdownPrivilege 4440 wmic.exe Token: SeDebugPrivilege 4440 wmic.exe Token: SeSystemEnvironmentPrivilege 4440 wmic.exe Token: SeRemoteShutdownPrivilege 4440 wmic.exe Token: SeUndockPrivilege 4440 wmic.exe Token: SeManageVolumePrivilege 4440 wmic.exe Token: 33 4440 wmic.exe Token: 34 4440 wmic.exe Token: 35 4440 wmic.exe Token: 36 4440 wmic.exe Token: SeIncreaseQuotaPrivilege 3912 wmic.exe Token: SeSecurityPrivilege 3912 wmic.exe Token: SeTakeOwnershipPrivilege 3912 wmic.exe Token: SeLoadDriverPrivilege 3912 wmic.exe Token: SeSystemProfilePrivilege 3912 wmic.exe Token: SeSystemtimePrivilege 3912 wmic.exe Token: SeProfSingleProcessPrivilege 3912 wmic.exe Token: SeIncBasePriorityPrivilege 3912 wmic.exe Token: SeCreatePagefilePrivilege 3912 wmic.exe Token: SeBackupPrivilege 3912 wmic.exe Token: SeRestorePrivilege 3912 wmic.exe Token: SeShutdownPrivilege 3912 wmic.exe Token: SeDebugPrivilege 3912 wmic.exe Token: SeSystemEnvironmentPrivilege 3912 wmic.exe Token: SeRemoteShutdownPrivilege 3912 wmic.exe Token: SeUndockPrivilege 3912 wmic.exe Token: SeManageVolumePrivilege 3912 wmic.exe Token: 33 3912 wmic.exe Token: 34 3912 wmic.exe Token: 35 3912 wmic.exe Token: 36 3912 wmic.exe Token: SeIncreaseQuotaPrivilege 3912 wmic.exe Token: SeSecurityPrivilege 3912 wmic.exe Token: SeTakeOwnershipPrivilege 3912 wmic.exe Token: SeLoadDriverPrivilege 3912 wmic.exe Token: SeSystemProfilePrivilege 3912 wmic.exe Token: SeSystemtimePrivilege 3912 wmic.exe Token: SeProfSingleProcessPrivilege 3912 wmic.exe Token: SeIncBasePriorityPrivilege 3912 wmic.exe Token: SeCreatePagefilePrivilege 3912 wmic.exe Token: SeBackupPrivilege 3912 wmic.exe Token: SeRestorePrivilege 3912 wmic.exe Token: SeShutdownPrivilege 3912 wmic.exe Token: SeDebugPrivilege 3912 wmic.exe Token: SeSystemEnvironmentPrivilege 3912 wmic.exe Token: SeRemoteShutdownPrivilege 3912 wmic.exe Token: SeUndockPrivilege 3912 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
decoding_data.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2132 wrote to memory of 360 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 360 2132 decoding_data.exe net.exe PID 360 wrote to memory of 4232 360 net.exe net1.exe PID 360 wrote to memory of 4232 360 net.exe net1.exe PID 2132 wrote to memory of 4484 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 4484 2132 decoding_data.exe net.exe PID 4484 wrote to memory of 2776 4484 net.exe net1.exe PID 4484 wrote to memory of 2776 4484 net.exe net1.exe PID 2132 wrote to memory of 308 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 308 2132 decoding_data.exe net.exe PID 308 wrote to memory of 4920 308 net.exe net1.exe PID 308 wrote to memory of 4920 308 net.exe net1.exe PID 2132 wrote to memory of 3888 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 3888 2132 decoding_data.exe net.exe PID 3888 wrote to memory of 2696 3888 net.exe net1.exe PID 3888 wrote to memory of 2696 3888 net.exe net1.exe PID 2132 wrote to memory of 3800 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 3800 2132 decoding_data.exe net.exe PID 3800 wrote to memory of 3680 3800 net.exe net1.exe PID 3800 wrote to memory of 3680 3800 net.exe net1.exe PID 2132 wrote to memory of 3944 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 3944 2132 decoding_data.exe net.exe PID 3944 wrote to memory of 3724 3944 net.exe net1.exe PID 3944 wrote to memory of 3724 3944 net.exe net1.exe PID 2132 wrote to memory of 4116 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 4116 2132 decoding_data.exe net.exe PID 4116 wrote to memory of 4868 4116 net.exe net1.exe PID 4116 wrote to memory of 4868 4116 net.exe net1.exe PID 2132 wrote to memory of 1244 2132 decoding_data.exe net.exe PID 2132 wrote to memory of 1244 2132 decoding_data.exe net.exe PID 1244 wrote to memory of 3012 1244 net.exe net1.exe PID 1244 wrote to memory of 3012 1244 net.exe net1.exe PID 2132 wrote to memory of 3712 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 3712 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 1704 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 1704 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 2136 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 2136 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 4672 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 4672 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 2436 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 2436 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 1496 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 1496 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 3108 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 3108 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 2720 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 2720 2132 decoding_data.exe sc.exe PID 2132 wrote to memory of 1460 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 1460 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 2604 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 2604 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 5048 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 5048 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 2308 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 2308 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 4056 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 4056 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 2260 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 2260 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 3300 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 3300 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 5020 2132 decoding_data.exe reg.exe PID 2132 wrote to memory of 5020 2132 decoding_data.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"C:\Users\Admin\AppData\Local\Temp\decoding_data.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:4232
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2776
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:4920
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:2696
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:3680
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:3724
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:4868
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_1c219" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_1c219" /y3⤵PID:3012
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:3712
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:1704
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2136
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
PID:4672
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2436
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1496
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:3108
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_1c219" start= disabled2⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1460
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2604
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:5048
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2308
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:4056
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2260
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3300
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:5020
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4724
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:404
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1492
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2152
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:4396
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:4304
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:4732
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1372
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:4312
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:4400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:260
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:4292
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:3444
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:4648
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:2888
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:2724
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3900
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2980
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:528
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:664
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2492
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1864
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4576
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:752
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1424
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2452
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:4508
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2572
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:892
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1268
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2200
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085