Analysis
-
max time kernel
109s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2022 00:14
Static task
static1
Behavioral task
behavioral1
Sample
21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe
Resource
win7-20221111-en
General
-
Target
21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe
-
Size
64KB
-
MD5
0175dabeac051e7eab1ed1d6577f2381
-
SHA1
f9d2e6822687828288ccde9a68adad3da8ef7a87
-
SHA256
21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8
-
SHA512
9aa0a613d737833406f27a63137e6d0dd6b1cbb41f4d3290cce4f2a0bd315727624afac003cff72864677b22bec65491e475746362f577309dbafa4abcc62a91
-
SSDEEP
768:kHXvbNU1/AEQCd4Rida+EcL+VT/DHhwV4JmC4nySV3XBmFSTWepIpiO90XP:kfbmHLGjDHhwSJD4nPHA0NIpiEWP
Malware Config
Signatures
-
Possible privilege escalation attempt 34 IoCs
Processes:
takeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exepid process 4420 takeown.exe 1936 takeown.exe 1608 icacls.exe 2900 icacls.exe 3732 takeown.exe 564 takeown.exe 4220 icacls.exe 2880 takeown.exe 3376 icacls.exe 4136 takeown.exe 3356 icacls.exe 3152 takeown.exe 2224 takeown.exe 3596 icacls.exe 3300 takeown.exe 4400 takeown.exe 4164 icacls.exe 3532 takeown.exe 2284 icacls.exe 3784 icacls.exe 3496 takeown.exe 3180 icacls.exe 4344 takeown.exe 628 icacls.exe 5084 icacls.exe 4188 takeown.exe 3840 takeown.exe 3632 icacls.exe 4788 icacls.exe 364 icacls.exe 1456 takeown.exe 3652 takeown.exe 628 icacls.exe 4224 icacls.exe -
Modifies file permissions 1 TTPs 34 IoCs
Processes:
icacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid process 3784 icacls.exe 3152 takeown.exe 3180 icacls.exe 4788 icacls.exe 2880 takeown.exe 3376 icacls.exe 5084 icacls.exe 3840 takeown.exe 3496 takeown.exe 1456 takeown.exe 4420 takeown.exe 2224 takeown.exe 3300 takeown.exe 4224 icacls.exe 364 icacls.exe 4136 takeown.exe 3632 icacls.exe 3532 takeown.exe 4188 takeown.exe 628 icacls.exe 1608 icacls.exe 3732 takeown.exe 2284 icacls.exe 3652 takeown.exe 3596 icacls.exe 4400 takeown.exe 3356 icacls.exe 4220 icacls.exe 4344 takeown.exe 628 icacls.exe 1936 takeown.exe 2900 icacls.exe 564 takeown.exe 4164 icacls.exe -
Drops file in System32 directory 6 IoCs
Processes:
21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exedescription ioc process File opened for modification C:\Windows\SysWOW64\qjylw.exe 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe File opened for modification C:\Windows\SysWOW64\cmd.exe 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe File opened for modification C:\Windows\SysWOW64\ftp.exe 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe File opened for modification C:\Windows\SysWOW64\wscript.exe 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe File opened for modification C:\Windows\SysWOW64\cscript.exe 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe File created C:\Windows\SysWOW64\qjylw.exe 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 4188 takeown.exe Token: SeTakeOwnershipPrivilege 1936 takeown.exe Token: SeTakeOwnershipPrivilege 3840 takeown.exe Token: SeTakeOwnershipPrivilege 4136 takeown.exe Token: SeTakeOwnershipPrivilege 2224 takeown.exe Token: SeTakeOwnershipPrivilege 564 takeown.exe Token: SeTakeOwnershipPrivilege 3532 takeown.exe Token: SeTakeOwnershipPrivilege 3496 takeown.exe Token: SeTakeOwnershipPrivilege 1456 takeown.exe Token: SeTakeOwnershipPrivilege 3152 takeown.exe Token: SeTakeOwnershipPrivilege 3652 takeown.exe Token: SeTakeOwnershipPrivilege 4344 takeown.exe Token: SeTakeOwnershipPrivilege 2880 takeown.exe Token: SeTakeOwnershipPrivilege 3300 takeown.exe Token: SeTakeOwnershipPrivilege 3732 takeown.exe Token: SeTakeOwnershipPrivilege 4400 takeown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exepid process 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exedescription pid process target process PID 1800 wrote to memory of 4420 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 4420 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 4420 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 5084 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 5084 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 5084 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 4188 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 4188 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 4188 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 364 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 364 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 364 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 1936 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 1936 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 1936 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 628 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 628 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 628 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3840 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3840 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3840 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 1608 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 1608 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 1608 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 4136 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 4136 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 4136 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3632 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3632 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3632 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 2224 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 2224 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 2224 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 2900 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 2900 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 2900 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 564 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 564 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 564 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 4164 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 4164 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 4164 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3532 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3532 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3532 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 2284 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 2284 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 2284 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3496 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3496 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3496 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3356 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3356 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3356 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 1456 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 1456 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 1456 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3784 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3784 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3784 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe PID 1800 wrote to memory of 3152 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3152 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3152 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe takeown.exe PID 1800 wrote to memory of 3180 1800 21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe"C:\Users\Admin\AppData\Local\Temp\21d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /f "C:\Windows\system32\qjylw.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe "C:\Windows\system32\qjylw.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\System32\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\System32\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cmd.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cmd.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\ftp.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\ftp.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\wscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\wscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\takeown.exetakeown.exe /f "C:\Windows\SysWOW64\cscript.exe"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "C:\Windows\SysWOW64\cscript.exe" /grant SYSTEM:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\qjylw.exeFilesize
64KB
MD50175dabeac051e7eab1ed1d6577f2381
SHA1f9d2e6822687828288ccde9a68adad3da8ef7a87
SHA25621d6758a391c13c6b47c236747722102b5e01f1c8e72362cef8aa87c154138f8
SHA5129aa0a613d737833406f27a63137e6d0dd6b1cbb41f4d3290cce4f2a0bd315727624afac003cff72864677b22bec65491e475746362f577309dbafa4abcc62a91
-
memory/364-138-0x0000000000000000-mapping.dmp
-
memory/564-147-0x0000000000000000-mapping.dmp
-
memory/628-160-0x0000000000000000-mapping.dmp
-
memory/628-140-0x0000000000000000-mapping.dmp
-
memory/1456-153-0x0000000000000000-mapping.dmp
-
memory/1608-142-0x0000000000000000-mapping.dmp
-
memory/1936-139-0x0000000000000000-mapping.dmp
-
memory/2224-145-0x0000000000000000-mapping.dmp
-
memory/2284-150-0x0000000000000000-mapping.dmp
-
memory/2880-161-0x0000000000000000-mapping.dmp
-
memory/2900-146-0x0000000000000000-mapping.dmp
-
memory/3152-155-0x0000000000000000-mapping.dmp
-
memory/3180-156-0x0000000000000000-mapping.dmp
-
memory/3300-163-0x0000000000000000-mapping.dmp
-
memory/3356-152-0x0000000000000000-mapping.dmp
-
memory/3376-162-0x0000000000000000-mapping.dmp
-
memory/3496-151-0x0000000000000000-mapping.dmp
-
memory/3532-149-0x0000000000000000-mapping.dmp
-
memory/3596-166-0x0000000000000000-mapping.dmp
-
memory/3632-144-0x0000000000000000-mapping.dmp
-
memory/3652-157-0x0000000000000000-mapping.dmp
-
memory/3732-165-0x0000000000000000-mapping.dmp
-
memory/3784-154-0x0000000000000000-mapping.dmp
-
memory/3840-141-0x0000000000000000-mapping.dmp
-
memory/4136-143-0x0000000000000000-mapping.dmp
-
memory/4164-148-0x0000000000000000-mapping.dmp
-
memory/4188-137-0x0000000000000000-mapping.dmp
-
memory/4220-158-0x0000000000000000-mapping.dmp
-
memory/4224-164-0x0000000000000000-mapping.dmp
-
memory/4344-159-0x0000000000000000-mapping.dmp
-
memory/4400-167-0x0000000000000000-mapping.dmp
-
memory/4420-134-0x0000000000000000-mapping.dmp
-
memory/4788-168-0x0000000000000000-mapping.dmp
-
memory/5084-136-0x0000000000000000-mapping.dmp