Analysis
-
max time kernel
164s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 11:13
Static task
static1
Behavioral task
behavioral1
Sample
aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe
Resource
win7-20220812-en
General
-
Target
aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe
-
Size
68KB
-
MD5
06e2bd79a1367dd6f114da4d8643e111
-
SHA1
581154dfcb968c8e3bdbccbda1c91b30e73711e1
-
SHA256
aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115
-
SHA512
e7654175fec67810bb56740d25bd2d5a6319d6df853b76b69b0b5551f8761fe009829994cf4b39578224ae542652864233e46db6162e1b43128beed315363d51
-
SSDEEP
768:uXHeO9zRdxHhIUthktJxetK7qGaEqWBqenLuP+CmYV3wafxKEVKy8r3kVfV3cjE8:ctY95aENq+9Y9wafikVNMQkT
Malware Config
Signatures
-
Possible privilege escalation attempt 34 IoCs
Processes:
icacls.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exepid process 916 icacls.exe 3144 takeown.exe 4552 takeown.exe 1720 icacls.exe 4300 takeown.exe 4780 takeown.exe 4060 takeown.exe 1684 icacls.exe 696 icacls.exe 3916 takeown.exe 4752 takeown.exe 4992 icacls.exe 4912 takeown.exe 5056 icacls.exe 4468 takeown.exe 868 icacls.exe 228 takeown.exe 3208 takeown.exe 1604 takeown.exe 1192 icacls.exe 2260 icacls.exe 4548 icacls.exe 3324 icacls.exe 2936 takeown.exe 2880 takeown.exe 3868 icacls.exe 4140 icacls.exe 2100 takeown.exe 3844 takeown.exe 540 icacls.exe 3976 icacls.exe 1012 icacls.exe 4896 icacls.exe 692 takeown.exe -
Modifies file permissions 1 TTPs 34 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exepid process 2880 takeown.exe 4912 takeown.exe 692 takeown.exe 4780 takeown.exe 2100 takeown.exe 868 icacls.exe 3208 takeown.exe 3868 icacls.exe 4548 icacls.exe 4552 takeown.exe 1720 icacls.exe 5056 icacls.exe 4752 takeown.exe 540 icacls.exe 2936 takeown.exe 4060 takeown.exe 4992 icacls.exe 228 takeown.exe 3844 takeown.exe 3916 takeown.exe 2260 icacls.exe 4300 takeown.exe 3976 icacls.exe 4140 icacls.exe 916 icacls.exe 1604 takeown.exe 3144 takeown.exe 1012 icacls.exe 3324 icacls.exe 4896 icacls.exe 1192 icacls.exe 1684 icacls.exe 4468 takeown.exe 696 icacls.exe -
Drops file in System32 directory 6 IoCs
Processes:
aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exedescription ioc process File created C:\Windows\SysWOW64\bwwx.exe aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe File opened for modification C:\Windows\SysWOW64\bwwx.exe aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe File opened for modification C:\Windows\SysWOW64\cmd.exe aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe File opened for modification C:\Windows\SysWOW64\ftp.exe aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe File opened for modification C:\Windows\SysWOW64\wscript.exe aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe File opened for modification C:\Windows\SysWOW64\cscript.exe aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 4912 takeown.exe Token: SeTakeOwnershipPrivilege 692 takeown.exe Token: SeTakeOwnershipPrivilege 4468 takeown.exe Token: SeTakeOwnershipPrivilege 2100 takeown.exe Token: SeTakeOwnershipPrivilege 228 takeown.exe Token: SeTakeOwnershipPrivilege 3208 takeown.exe Token: SeTakeOwnershipPrivilege 4300 takeown.exe Token: SeTakeOwnershipPrivilege 3844 takeown.exe Token: SeTakeOwnershipPrivilege 1604 takeown.exe Token: SeTakeOwnershipPrivilege 3144 takeown.exe Token: SeTakeOwnershipPrivilege 3916 takeown.exe Token: SeTakeOwnershipPrivilege 4752 takeown.exe Token: SeTakeOwnershipPrivilege 4552 takeown.exe Token: SeTakeOwnershipPrivilege 2936 takeown.exe Token: SeTakeOwnershipPrivilege 4780 takeown.exe Token: SeTakeOwnershipPrivilege 4060 takeown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exepid process 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exedescription pid process target process PID 3420 wrote to memory of 2880 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 2880 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 2880 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 1192 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 1192 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 1192 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 4912 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4912 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4912 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 5056 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 5056 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 5056 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 692 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 692 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 692 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 1684 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 1684 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 1684 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 4468 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4468 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4468 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4992 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 4992 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 4992 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 2100 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 2100 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 2100 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 868 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 868 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 868 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 228 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 228 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 228 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 696 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 696 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 696 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 3208 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3208 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3208 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 2260 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 2260 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 2260 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 4300 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4300 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4300 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3976 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 3976 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 3976 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 3844 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3844 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3844 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 916 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 916 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 916 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 1604 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 1604 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 1604 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3868 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 3868 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 3868 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe PID 3420 wrote to memory of 3144 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3144 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 3144 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe takeown.exe PID 3420 wrote to memory of 4548 3420 aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe"C:\Users\Admin\AppData\Local\Temp\aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /f "C:\Windows\system32\bwwx.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2880
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe "C:\Windows\system32\bwwx.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1192
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5056
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1684
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4992
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:868
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:696
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2260
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3976
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:916
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3868
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4548
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4140
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1012
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3324
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4896
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:540
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD506e2bd79a1367dd6f114da4d8643e111
SHA1581154dfcb968c8e3bdbccbda1c91b30e73711e1
SHA256aaa2bb4633a740ab001960de4b9c07a60b42d4621f5f78c916041a69dd839115
SHA512e7654175fec67810bb56740d25bd2d5a6319d6df853b76b69b0b5551f8761fe009829994cf4b39578224ae542652864233e46db6162e1b43128beed315363d51