Analysis
-
max time kernel
157s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 09:27
Static task
static1
Behavioral task
behavioral1
Sample
134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe
Resource
win7-20220812-en
General
-
Target
134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe
-
Size
72KB
-
MD5
0ce83cefec533da1b55a19fb5fbc5a91
-
SHA1
274d8fadc082bad379f72e459b6be282db079aee
-
SHA256
134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075
-
SHA512
0fd2130f2f1ff2f276b93272e688d062429b3fe614525b6716a9ac797e8e240eb38bbfc6ae2ce9e3f01411175da63fc5eba7a0c3960e89a56f2c75f7f98746dc
-
SSDEEP
1536:1aO7qWmNYhwMLeOB4NGMciVOwRRl7hXXjp:1thwMVTiVOwRDdV
Malware Config
Signatures
-
Possible privilege escalation attempt 34 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exepid process 2172 takeown.exe 4328 icacls.exe 4112 takeown.exe 2140 icacls.exe 2980 takeown.exe 2760 takeown.exe 3924 takeown.exe 4892 icacls.exe 4176 icacls.exe 3656 takeown.exe 2392 takeown.exe 3940 takeown.exe 4016 icacls.exe 2400 icacls.exe 3640 icacls.exe 3752 icacls.exe 3976 icacls.exe 2584 icacls.exe 4400 takeown.exe 1724 takeown.exe 1216 icacls.exe 888 icacls.exe 3464 takeown.exe 1956 icacls.exe 4600 takeown.exe 2416 icacls.exe 3880 takeown.exe 3808 takeown.exe 4144 takeown.exe 4760 takeown.exe 3388 takeown.exe 1508 icacls.exe 2088 icacls.exe 2936 icacls.exe -
Modifies file permissions 1 TTPs 34 IoCs
Processes:
icacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exepid process 888 icacls.exe 2392 takeown.exe 2400 icacls.exe 1956 icacls.exe 4600 takeown.exe 3752 icacls.exe 2760 takeown.exe 2416 icacls.exe 4892 icacls.exe 4176 icacls.exe 3388 takeown.exe 3880 takeown.exe 3656 takeown.exe 4760 takeown.exe 3976 icacls.exe 2172 takeown.exe 4016 icacls.exe 2936 icacls.exe 4144 takeown.exe 3924 takeown.exe 2140 icacls.exe 3808 takeown.exe 1508 icacls.exe 4328 icacls.exe 4112 takeown.exe 3640 icacls.exe 2980 takeown.exe 2584 icacls.exe 3464 takeown.exe 1724 takeown.exe 1216 icacls.exe 2088 icacls.exe 4400 takeown.exe 3940 takeown.exe -
Drops file in System32 directory 6 IoCs
Processes:
134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exedescription ioc process File opened for modification C:\Windows\SysWOW64\wscript.exe 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe File opened for modification C:\Windows\SysWOW64\cscript.exe 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe File created C:\Windows\SysWOW64\rwela.exe 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe File opened for modification C:\Windows\SysWOW64\rwela.exe 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe File opened for modification C:\Windows\SysWOW64\cmd.exe 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe File opened for modification C:\Windows\SysWOW64\ftp.exe 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 4112 takeown.exe Token: SeTakeOwnershipPrivilege 4600 takeown.exe Token: SeTakeOwnershipPrivilege 4760 takeown.exe Token: SeTakeOwnershipPrivilege 3924 takeown.exe Token: SeTakeOwnershipPrivilege 3388 takeown.exe Token: SeTakeOwnershipPrivilege 2980 takeown.exe Token: SeTakeOwnershipPrivilege 2760 takeown.exe Token: SeTakeOwnershipPrivilege 2172 takeown.exe Token: SeTakeOwnershipPrivilege 3880 takeown.exe Token: SeTakeOwnershipPrivilege 4400 takeown.exe Token: SeTakeOwnershipPrivilege 3808 takeown.exe Token: SeTakeOwnershipPrivilege 3656 takeown.exe Token: SeTakeOwnershipPrivilege 2392 takeown.exe Token: SeTakeOwnershipPrivilege 4144 takeown.exe Token: SeTakeOwnershipPrivilege 3940 takeown.exe Token: SeTakeOwnershipPrivilege 3464 takeown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exepid process 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exedescription pid process target process PID 4632 wrote to memory of 1724 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 1724 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 1724 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4328 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4328 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4328 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4112 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4112 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4112 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4176 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4176 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4176 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4600 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4600 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4600 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 1216 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 1216 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 1216 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4760 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4760 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4760 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3640 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3640 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3640 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3924 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3924 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3924 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3752 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3752 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3752 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3388 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3388 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3388 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2140 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2140 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2140 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2980 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2980 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2980 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3976 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3976 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3976 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2760 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2760 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2760 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2416 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2416 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2416 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2172 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2172 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2172 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4892 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4892 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4892 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 3880 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3880 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 3880 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 2584 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2584 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 2584 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe PID 4632 wrote to memory of 4400 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4400 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4400 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe takeown.exe PID 4632 wrote to memory of 4016 4632 134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe"C:\Users\Admin\AppData\Local\Temp\134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /f "C:\Windows\system32\rwela.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe "C:\Windows\system32\rwela.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\rwela.exeFilesize
72KB
MD50ce83cefec533da1b55a19fb5fbc5a91
SHA1274d8fadc082bad379f72e459b6be282db079aee
SHA256134067df9a813752b9551424bbd3d196e6bd695b5a991e2caaf6260b1f7f0075
SHA5120fd2130f2f1ff2f276b93272e688d062429b3fe614525b6716a9ac797e8e240eb38bbfc6ae2ce9e3f01411175da63fc5eba7a0c3960e89a56f2c75f7f98746dc
-
memory/888-160-0x0000000000000000-mapping.dmp
-
memory/1216-140-0x0000000000000000-mapping.dmp
-
memory/1508-164-0x0000000000000000-mapping.dmp
-
memory/1724-134-0x0000000000000000-mapping.dmp
-
memory/1956-168-0x0000000000000000-mapping.dmp
-
memory/2088-166-0x0000000000000000-mapping.dmp
-
memory/2140-146-0x0000000000000000-mapping.dmp
-
memory/2172-151-0x0000000000000000-mapping.dmp
-
memory/2392-161-0x0000000000000000-mapping.dmp
-
memory/2400-162-0x0000000000000000-mapping.dmp
-
memory/2416-150-0x0000000000000000-mapping.dmp
-
memory/2584-154-0x0000000000000000-mapping.dmp
-
memory/2760-149-0x0000000000000000-mapping.dmp
-
memory/2936-158-0x0000000000000000-mapping.dmp
-
memory/2980-147-0x0000000000000000-mapping.dmp
-
memory/3388-145-0x0000000000000000-mapping.dmp
-
memory/3464-167-0x0000000000000000-mapping.dmp
-
memory/3640-142-0x0000000000000000-mapping.dmp
-
memory/3656-159-0x0000000000000000-mapping.dmp
-
memory/3752-144-0x0000000000000000-mapping.dmp
-
memory/3808-157-0x0000000000000000-mapping.dmp
-
memory/3880-153-0x0000000000000000-mapping.dmp
-
memory/3924-143-0x0000000000000000-mapping.dmp
-
memory/3940-165-0x0000000000000000-mapping.dmp
-
memory/3976-148-0x0000000000000000-mapping.dmp
-
memory/4016-156-0x0000000000000000-mapping.dmp
-
memory/4112-137-0x0000000000000000-mapping.dmp
-
memory/4144-163-0x0000000000000000-mapping.dmp
-
memory/4176-138-0x0000000000000000-mapping.dmp
-
memory/4328-136-0x0000000000000000-mapping.dmp
-
memory/4400-155-0x0000000000000000-mapping.dmp
-
memory/4600-139-0x0000000000000000-mapping.dmp
-
memory/4760-141-0x0000000000000000-mapping.dmp
-
memory/4892-152-0x0000000000000000-mapping.dmp