Analysis
-
max time kernel
191s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:53
Behavioral task
behavioral1
Sample
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
Resource
win10v2004-20221111-en
General
-
Target
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
-
Size
380KB
-
MD5
91dc7d7c0608c2e76a59704c7ad83b7c
-
SHA1
9fe75c22fef8caa144765406df4a83d279290c4e
-
SHA256
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26
-
SHA512
b9763fabd191e9690fa84883ce0fdce7748c6b6f1981ae761cd978d6253e8af6cfe40fe9ae7636757591332e208b1e0ba5f077fa5b789c71f946d46fbb4a7e02
-
SSDEEP
6144:Uzv+kSZBbdH19ex4T02J4fqz22tvymTiB62iKnWKKmDTcNwjreOwI+Tm1T8vbp:UzcRD02J4Sq2vHGB67KWKKmDWKSp
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Processes:
resource yara_rule behavioral1/memory/1444-55-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe.lnk aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1444-55-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1896 taskkill.exe 1696 taskkill.exe 1708 taskkill.exe 1556 taskkill.exe 848 taskkill.exe 1092 taskkill.exe 924 taskkill.exe 1576 taskkill.exe 1644 taskkill.exe 816 taskkill.exe 1336 taskkill.exe -
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exepid process 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exepid process 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 848 taskkill.exe Token: SeDebugPrivilege 1644 taskkill.exe Token: SeDebugPrivilege 816 taskkill.exe Token: SeDebugPrivilege 1708 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeDebugPrivilege 1896 taskkill.exe Token: SeDebugPrivilege 924 taskkill.exe Token: SeDebugPrivilege 1092 taskkill.exe Token: SeDebugPrivilege 1336 taskkill.exe Token: SeDebugPrivilege 1576 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exepid process 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1444 wrote to memory of 756 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 756 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 756 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 756 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 756 wrote to memory of 1556 756 cmd.exe taskkill.exe PID 756 wrote to memory of 1556 756 cmd.exe taskkill.exe PID 756 wrote to memory of 1556 756 cmd.exe taskkill.exe PID 756 wrote to memory of 1556 756 cmd.exe taskkill.exe PID 1444 wrote to memory of 772 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 772 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 772 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 772 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 772 wrote to memory of 1644 772 cmd.exe taskkill.exe PID 772 wrote to memory of 1644 772 cmd.exe taskkill.exe PID 772 wrote to memory of 1644 772 cmd.exe taskkill.exe PID 772 wrote to memory of 1644 772 cmd.exe taskkill.exe PID 1444 wrote to memory of 1884 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1884 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1884 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1884 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1884 wrote to memory of 848 1884 cmd.exe taskkill.exe PID 1884 wrote to memory of 848 1884 cmd.exe taskkill.exe PID 1884 wrote to memory of 848 1884 cmd.exe taskkill.exe PID 1884 wrote to memory of 848 1884 cmd.exe taskkill.exe PID 1444 wrote to memory of 1104 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1104 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1104 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1104 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1104 wrote to memory of 1092 1104 cmd.exe taskkill.exe PID 1104 wrote to memory of 1092 1104 cmd.exe taskkill.exe PID 1104 wrote to memory of 1092 1104 cmd.exe taskkill.exe PID 1104 wrote to memory of 1092 1104 cmd.exe taskkill.exe PID 1444 wrote to memory of 532 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 532 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 532 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 532 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 532 wrote to memory of 1896 532 cmd.exe taskkill.exe PID 532 wrote to memory of 1896 532 cmd.exe taskkill.exe PID 532 wrote to memory of 1896 532 cmd.exe taskkill.exe PID 532 wrote to memory of 1896 532 cmd.exe taskkill.exe PID 1444 wrote to memory of 1732 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1732 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1732 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1732 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1732 wrote to memory of 816 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 816 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 816 1732 cmd.exe taskkill.exe PID 1732 wrote to memory of 816 1732 cmd.exe taskkill.exe PID 1444 wrote to memory of 1752 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1752 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1752 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 1752 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1752 wrote to memory of 1696 1752 cmd.exe taskkill.exe PID 1752 wrote to memory of 1696 1752 cmd.exe taskkill.exe PID 1752 wrote to memory of 1696 1752 cmd.exe taskkill.exe PID 1752 wrote to memory of 1696 1752 cmd.exe taskkill.exe PID 1444 wrote to memory of 360 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 360 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 360 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1444 wrote to memory of 360 1444 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 360 wrote to memory of 1336 360 cmd.exe taskkill.exe PID 360 wrote to memory of 1336 360 cmd.exe taskkill.exe PID 360 wrote to memory of 1336 360 cmd.exe taskkill.exe PID 360 wrote to memory of 1336 360 cmd.exe taskkill.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu = "1" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe"C:\Users\Admin\AppData\Local\Temp\aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Drops startup file
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵PID:580
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵PID:520
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵PID:1676
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576