Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 12:36
Static task
static1
Behavioral task
behavioral1
Sample
68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe
Resource
win7-20220901-en
General
-
Target
68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe
-
Size
68KB
-
MD5
0c5b142e4185e130b90411ec1392b0a1
-
SHA1
11880fc4b89758d1a98e74945ae3db3fbd71a01d
-
SHA256
68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf
-
SHA512
4a7dc982fb28f8cf404f31243a8d6c99da5273a51583ca67506dd845ee086efc0b2d6008c3825d5110def099ece35e1c0479f343171fa1d5cbf9e40ccf5c2ae9
-
SSDEEP
768:4DJXk7lSA2SoPfT3Dw8qLsytLA575ztRIvzeSJQJIWtEZVn1mZbvH1ogHlhcWSQI:4CgOs0cbCe3RS18lhco/Q
Malware Config
Signatures
-
Possible privilege escalation attempt 34 IoCs
Processes:
icacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exepid process 3936 icacls.exe 3572 takeown.exe 1552 takeown.exe 2464 icacls.exe 2224 takeown.exe 360 icacls.exe 4328 icacls.exe 448 takeown.exe 3948 icacls.exe 4256 icacls.exe 32 takeown.exe 4752 takeown.exe 4076 takeown.exe 2392 takeown.exe 4856 takeown.exe 3880 icacls.exe 5052 takeown.exe 896 icacls.exe 368 icacls.exe 4112 icacls.exe 5012 icacls.exe 4556 takeown.exe 4140 icacls.exe 1352 icacls.exe 4612 takeown.exe 884 icacls.exe 2784 icacls.exe 5076 takeown.exe 4404 icacls.exe 3260 takeown.exe 4444 takeown.exe 552 icacls.exe 3472 takeown.exe 2684 takeown.exe -
Modifies file permissions 1 TTPs 34 IoCs
Processes:
icacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exepid process 4112 icacls.exe 4140 icacls.exe 884 icacls.exe 3572 takeown.exe 3948 icacls.exe 5012 icacls.exe 2464 icacls.exe 3472 takeown.exe 4404 icacls.exe 2684 takeown.exe 4856 takeown.exe 32 takeown.exe 4612 takeown.exe 896 icacls.exe 2784 icacls.exe 5052 takeown.exe 4752 takeown.exe 5076 takeown.exe 4328 icacls.exe 3936 icacls.exe 4444 takeown.exe 360 icacls.exe 4556 takeown.exe 3260 takeown.exe 552 icacls.exe 4256 icacls.exe 2392 takeown.exe 448 takeown.exe 3880 icacls.exe 2224 takeown.exe 1552 takeown.exe 368 icacls.exe 4076 takeown.exe 1352 icacls.exe -
Drops file in System32 directory 6 IoCs
Processes:
68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exedescription ioc process File opened for modification C:\Windows\SysWOW64\cmd.exe 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe File opened for modification C:\Windows\SysWOW64\ftp.exe 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe File opened for modification C:\Windows\SysWOW64\wscript.exe 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe File opened for modification C:\Windows\SysWOW64\cscript.exe 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe File created C:\Windows\SysWOW64\dzlh.exe 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe File opened for modification C:\Windows\SysWOW64\dzlh.exe 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 3260 takeown.exe Token: SeTakeOwnershipPrivilege 32 takeown.exe Token: SeTakeOwnershipPrivilege 4612 takeown.exe Token: SeTakeOwnershipPrivilege 5052 takeown.exe Token: SeTakeOwnershipPrivilege 3572 takeown.exe Token: SeTakeOwnershipPrivilege 2224 takeown.exe Token: SeTakeOwnershipPrivilege 4444 takeown.exe Token: SeTakeOwnershipPrivilege 1552 takeown.exe Token: SeTakeOwnershipPrivilege 4752 takeown.exe Token: SeTakeOwnershipPrivilege 3472 takeown.exe Token: SeTakeOwnershipPrivilege 5076 takeown.exe Token: SeTakeOwnershipPrivilege 4076 takeown.exe Token: SeTakeOwnershipPrivilege 2392 takeown.exe Token: SeTakeOwnershipPrivilege 2684 takeown.exe Token: SeTakeOwnershipPrivilege 4856 takeown.exe Token: SeTakeOwnershipPrivilege 4556 takeown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exepid process 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exedescription pid process target process PID 4824 wrote to memory of 448 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 448 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 448 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 4112 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 4112 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 4112 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3260 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3260 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3260 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 5012 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 5012 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 5012 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 32 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 32 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 32 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3880 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3880 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3880 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 4612 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 4612 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 4612 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3936 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3936 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3936 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 5052 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 5052 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 5052 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 884 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 884 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 884 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3572 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3572 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3572 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 2464 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 2464 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 2464 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 2224 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 2224 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 2224 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 896 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 896 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 896 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 4444 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 4444 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 4444 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 2784 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 2784 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 2784 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 1552 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 1552 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 1552 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3948 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3948 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3948 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 4752 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 4752 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 4752 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 552 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 552 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 552 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe PID 4824 wrote to memory of 3472 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3472 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 3472 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe takeown.exe PID 4824 wrote to memory of 368 4824 68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe"C:\Users\Admin\AppData\Local\Temp\68a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /f "C:\Windows\system32\dzlh.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:448
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe "C:\Windows\system32\dzlh.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4112
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5012
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3880
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3936
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:884
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2464
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:896
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2784
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3948
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:552
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:368
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4256
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:360
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4404
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1352
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4328
-
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4140
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD50c5b142e4185e130b90411ec1392b0a1
SHA111880fc4b89758d1a98e74945ae3db3fbd71a01d
SHA25668a1e51af03c1bf76aa2d388249819f3b5c519dcc6c9eefeaec85af16d15cfbf
SHA5124a7dc982fb28f8cf404f31243a8d6c99da5273a51583ca67506dd845ee086efc0b2d6008c3825d5110def099ece35e1c0479f343171fa1d5cbf9e40ccf5c2ae9