Analysis
-
max time kernel
247s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
64new_cip.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
64new_cip.exe
Resource
win10v2004-20220901-en
General
-
Target
64new_cip.exe
-
Size
309KB
-
MD5
fb13a3efdbb801aef77603f6aaea272e
-
SHA1
62f526f82da55e5e3bc835d0e3b770b236d5e99d
-
SHA256
eb5666adbcd60ab11747e32a63a98c0ff4b3949fdac0f6fb7f2b86246e34b51d
-
SHA512
3baaf4bf823895f6916519dd571f984b79dd6756b9b9944ab02b4f19bbac466a6417ce1d6525d29acb1b92788bf15134146ae495d654828c52774233d8a2b0d3
-
SSDEEP
6144:vPLavV9JccWJzcwYuUxhCKrSjZ5pjedRYc4ihyYr+3l09K2yaw7c:v+vV9CZMuUxhC6SjZfjeu++3GK7aw7c
Malware Config
Extracted
\??\A:\!-Recovery_Instructions-!.html
<h2>Mikesupp77@outlook.com</h2>
https://tox.chat/download.html</p>
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
64new_cip.exedescription pid process target process PID 560 created 1212 560 64new_cip.exe Explorer.EXE -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
64new_cip.exedescription ioc process File renamed C:\Users\Admin\Pictures\MergeRepair.tiff => C:\Users\Admin\Pictures\MergeRepair.tiff.cipher 64new_cip.exe File renamed C:\Users\Admin\Pictures\RedoJoin.png => C:\Users\Admin\Pictures\RedoJoin.png.cipher 64new_cip.exe File opened for modification C:\Users\Admin\Pictures\TraceUnpublish.tiff 64new_cip.exe File renamed C:\Users\Admin\Pictures\TraceUnpublish.tiff => C:\Users\Admin\Pictures\TraceUnpublish.tiff.cipher 64new_cip.exe File renamed C:\Users\Admin\Pictures\CompareGroup.raw => C:\Users\Admin\Pictures\CompareGroup.raw.cipher 64new_cip.exe File opened for modification C:\Users\Admin\Pictures\MergeRepair.tiff 64new_cip.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
64new_cip.exedescription ioc process File opened (read-only) \??\A: 64new_cip.exe File opened (read-only) \??\G: 64new_cip.exe File opened (read-only) \??\U: 64new_cip.exe File opened (read-only) \??\Z: 64new_cip.exe File opened (read-only) \??\B: 64new_cip.exe File opened (read-only) \??\K: 64new_cip.exe File opened (read-only) \??\L: 64new_cip.exe File opened (read-only) \??\P: 64new_cip.exe File opened (read-only) \??\V: 64new_cip.exe File opened (read-only) \??\H: 64new_cip.exe File opened (read-only) \??\N: 64new_cip.exe File opened (read-only) \??\O: 64new_cip.exe File opened (read-only) \??\R: 64new_cip.exe File opened (read-only) \??\S: 64new_cip.exe File opened (read-only) \??\W: 64new_cip.exe File opened (read-only) \??\E: 64new_cip.exe File opened (read-only) \??\F: 64new_cip.exe File opened (read-only) \??\I: 64new_cip.exe File opened (read-only) \??\J: 64new_cip.exe File opened (read-only) \??\M: 64new_cip.exe File opened (read-only) \??\Q: 64new_cip.exe File opened (read-only) \??\T: 64new_cip.exe File opened (read-only) \??\X: 64new_cip.exe File opened (read-only) \??\Y: 64new_cip.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 976 1212 WerFault.exe Explorer.EXE -
Kills process with taskkill 16 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1028 taskkill.exe 1692 taskkill.exe 604 taskkill.exe 1008 taskkill.exe 820 taskkill.exe 1244 taskkill.exe 1648 taskkill.exe 868 taskkill.exe 900 taskkill.exe 1436 taskkill.exe 240 taskkill.exe 1372 taskkill.exe 1496 taskkill.exe 1000 taskkill.exe 1020 taskkill.exe 1324 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
64new_cip.exepid process 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe 560 64new_cip.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1372 taskkill.exe Token: SeDebugPrivilege 1008 taskkill.exe Token: SeDebugPrivilege 1020 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 1324 taskkill.exe Token: SeDebugPrivilege 1000 taskkill.exe Token: SeDebugPrivilege 868 taskkill.exe Token: SeDebugPrivilege 820 taskkill.exe Token: SeDebugPrivilege 1028 taskkill.exe Token: SeDebugPrivilege 1692 taskkill.exe Token: SeDebugPrivilege 1436 taskkill.exe Token: SeDebugPrivilege 240 taskkill.exe Token: SeDebugPrivilege 900 taskkill.exe Token: SeDebugPrivilege 604 taskkill.exe Token: SeDebugPrivilege 1244 taskkill.exe Token: SeDebugPrivilege 1648 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
64new_cip.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 560 wrote to memory of 1920 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 1920 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 1920 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 1920 560 64new_cip.exe cmd.exe PID 1920 wrote to memory of 868 1920 cmd.exe cmd.exe PID 1920 wrote to memory of 868 1920 cmd.exe cmd.exe PID 1920 wrote to memory of 868 1920 cmd.exe cmd.exe PID 1920 wrote to memory of 868 1920 cmd.exe cmd.exe PID 560 wrote to memory of 532 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 532 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 532 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 532 560 64new_cip.exe cmd.exe PID 532 wrote to memory of 820 532 cmd.exe cmd.exe PID 532 wrote to memory of 820 532 cmd.exe cmd.exe PID 532 wrote to memory of 820 532 cmd.exe cmd.exe PID 532 wrote to memory of 820 532 cmd.exe cmd.exe PID 820 wrote to memory of 1372 820 cmd.exe taskkill.exe PID 820 wrote to memory of 1372 820 cmd.exe taskkill.exe PID 820 wrote to memory of 1372 820 cmd.exe taskkill.exe PID 560 wrote to memory of 432 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 432 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 432 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 432 560 64new_cip.exe cmd.exe PID 432 wrote to memory of 1144 432 cmd.exe cmd.exe PID 432 wrote to memory of 1144 432 cmd.exe cmd.exe PID 432 wrote to memory of 1144 432 cmd.exe cmd.exe PID 432 wrote to memory of 1144 432 cmd.exe cmd.exe PID 1144 wrote to memory of 1008 1144 cmd.exe taskkill.exe PID 1144 wrote to memory of 1008 1144 cmd.exe taskkill.exe PID 1144 wrote to memory of 1008 1144 cmd.exe taskkill.exe PID 560 wrote to memory of 1740 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 1740 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 1740 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 1740 560 64new_cip.exe cmd.exe PID 1740 wrote to memory of 872 1740 cmd.exe cmd.exe PID 1740 wrote to memory of 872 1740 cmd.exe cmd.exe PID 1740 wrote to memory of 872 1740 cmd.exe cmd.exe PID 1740 wrote to memory of 872 1740 cmd.exe cmd.exe PID 872 wrote to memory of 1020 872 cmd.exe taskkill.exe PID 872 wrote to memory of 1020 872 cmd.exe taskkill.exe PID 872 wrote to memory of 1020 872 cmd.exe taskkill.exe PID 560 wrote to memory of 508 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 508 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 508 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 508 560 64new_cip.exe cmd.exe PID 508 wrote to memory of 1064 508 cmd.exe cmd.exe PID 508 wrote to memory of 1064 508 cmd.exe cmd.exe PID 508 wrote to memory of 1064 508 cmd.exe cmd.exe PID 508 wrote to memory of 1064 508 cmd.exe cmd.exe PID 1064 wrote to memory of 1496 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 1496 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 1496 1064 cmd.exe taskkill.exe PID 560 wrote to memory of 976 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 976 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 976 560 64new_cip.exe cmd.exe PID 560 wrote to memory of 976 560 64new_cip.exe cmd.exe PID 976 wrote to memory of 1696 976 cmd.exe cmd.exe PID 976 wrote to memory of 1696 976 cmd.exe cmd.exe PID 976 wrote to memory of 1696 976 cmd.exe cmd.exe PID 976 wrote to memory of 1696 976 cmd.exe cmd.exe PID 1696 wrote to memory of 1324 1696 cmd.exe taskkill.exe PID 1696 wrote to memory of 1324 1696 cmd.exe taskkill.exe PID 1696 wrote to memory of 1324 1696 cmd.exe taskkill.exe PID 560 wrote to memory of 2004 560 64new_cip.exe cmd.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
64new_cip.exe64new_cip.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 64new_cip.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 64new_cip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 64new_cip.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 64new_cip.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\64new_cip.exe"C:\Users\Admin\AppData\Local\Temp\64new_cip.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c rem Kill "SQL"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c rem Kill "SQL"4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill -f -im sqlbrowser.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlwriter.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlwriter.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill -f -im sqlwriter.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill -f -im sqlservr.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill -f -im msmdsrv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill -f -im MsDtsSrvr.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im sqlceip.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im fdlauncher.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im Ssms.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im Ssms.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im Ssms.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im SQLAGENT.EXE5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdhost.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im fdhost.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im fdhost.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im fdlauncher.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im sqlservr.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im ReportingServicesService.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msftesql.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im msftesql.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im msftesql.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im pg_ctl.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im postgres.exe3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im postgres.exe4⤵
-
C:\Windows\system32\taskkill.exetaskkill -f -im postgres.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQLServerADHelper1003⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop MSSQLServerADHelper1004⤵
-
C:\Windows\system32\net.exenet stop MSSQLServerADHelper1005⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper1006⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$ISARS3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop MSSQL$ISARS4⤵
-
C:\Windows\system32\net.exenet stop MSSQL$ISARS5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$ISARS6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$MSFW3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop MSSQL$MSFW4⤵
-
C:\Windows\system32\net.exenet stop MSSQL$MSFW5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$MSFW6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$ISARS3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLAgent$ISARS4⤵
-
C:\Windows\system32\net.exenet stop SQLAgent$ISARS5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$ISARS6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$MSFW3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLAgent$MSFW4⤵
-
C:\Windows\system32\net.exenet stop SQLAgent$MSFW5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$MSFW6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLBrowser3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLBrowser4⤵
-
C:\Windows\system32\net.exenet stop SQLBrowser5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLBrowser6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop ReportServer$ISARS3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop ReportServer$ISARS4⤵
-
C:\Windows\system32\net.exenet stop ReportServer$ISARS5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer$ISARS6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLWriter3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLWriter4⤵
-
C:\Windows\system32\net.exenet stop SQLWriter5⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLWriter6⤵
-
C:\Users\Admin\AppData\Local\Temp\64new_cip.exe\\?\C:\Users\Admin\AppData\Local\Temp\64new_cip.exe -network2⤵
- System policy modification
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1212 -s 15362⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/240-92-0x0000000000000000-mapping.dmp
-
memory/240-116-0x0000000000000000-mapping.dmp
-
memory/328-107-0x0000000000000000-mapping.dmp
-
memory/432-60-0x0000000000000000-mapping.dmp
-
memory/508-110-0x0000000000000000-mapping.dmp
-
memory/508-66-0x0000000000000000-mapping.dmp
-
memory/532-100-0x0000000000000000-mapping.dmp
-
memory/532-57-0x0000000000000000-mapping.dmp
-
memory/560-54-0x0000000075551000-0x0000000075553000-memory.dmpFilesize
8KB
-
memory/604-98-0x0000000000000000-mapping.dmp
-
memory/616-90-0x0000000000000000-mapping.dmp
-
memory/688-76-0x0000000000000000-mapping.dmp
-
memory/760-94-0x0000000000000000-mapping.dmp
-
memory/800-87-0x0000000000000000-mapping.dmp
-
memory/820-80-0x0000000000000000-mapping.dmp
-
memory/820-58-0x0000000000000000-mapping.dmp
-
memory/824-103-0x0000000000000000-mapping.dmp
-
memory/868-77-0x0000000000000000-mapping.dmp
-
memory/868-56-0x0000000000000000-mapping.dmp
-
memory/872-64-0x0000000000000000-mapping.dmp
-
memory/900-95-0x0000000000000000-mapping.dmp
-
memory/976-114-0x0000000000000000-mapping.dmp
-
memory/976-69-0x0000000000000000-mapping.dmp
-
memory/1000-74-0x0000000000000000-mapping.dmp
-
memory/1000-118-0x0000000000000000-mapping.dmp
-
memory/1008-62-0x0000000000000000-mapping.dmp
-
memory/1020-106-0x0000000000000000-mapping.dmp
-
memory/1020-65-0x0000000000000000-mapping.dmp
-
memory/1028-83-0x0000000000000000-mapping.dmp
-
memory/1064-67-0x0000000000000000-mapping.dmp
-
memory/1144-61-0x0000000000000000-mapping.dmp
-
memory/1244-101-0x0000000000000000-mapping.dmp
-
memory/1320-91-0x0000000000000000-mapping.dmp
-
memory/1324-71-0x0000000000000000-mapping.dmp
-
memory/1364-79-0x0000000000000000-mapping.dmp
-
memory/1372-59-0x0000000000000000-mapping.dmp
-
memory/1436-112-0x0000000000000000-mapping.dmp
-
memory/1436-89-0x0000000000000000-mapping.dmp
-
memory/1440-117-0x0000000000000000-mapping.dmp
-
memory/1496-68-0x0000000000000000-mapping.dmp
-
memory/1544-111-0x0000000000000000-mapping.dmp
-
memory/1568-102-0x0000000000000000-mapping.dmp
-
memory/1588-96-0x0000000000000000-mapping.dmp
-
memory/1620-78-0x0000000000000000-mapping.dmp
-
memory/1648-104-0x0000000000000000-mapping.dmp
-
memory/1668-84-0x0000000000000000-mapping.dmp
-
memory/1676-105-0x0000000000000000-mapping.dmp
-
memory/1692-86-0x0000000000000000-mapping.dmp
-
memory/1692-108-0x0000000000000000-mapping.dmp
-
memory/1696-70-0x0000000000000000-mapping.dmp
-
memory/1704-75-0x0000000000000000-mapping.dmp
-
memory/1720-115-0x0000000000000000-mapping.dmp
-
memory/1736-93-0x0000000000000000-mapping.dmp
-
memory/1740-63-0x0000000000000000-mapping.dmp
-
memory/1768-97-0x0000000000000000-mapping.dmp
-
memory/1856-81-0x0000000000000000-mapping.dmp
-
memory/1920-55-0x0000000000000000-mapping.dmp
-
memory/1960-109-0x0000000000000000-mapping.dmp
-
memory/1968-113-0x0000000000000000-mapping.dmp
-
memory/1988-82-0x0000000000000000-mapping.dmp
-
memory/1996-85-0x0000000000000000-mapping.dmp
-
memory/2000-88-0x0000000000000000-mapping.dmp
-
memory/2004-72-0x0000000000000000-mapping.dmp
-
memory/2012-73-0x0000000000000000-mapping.dmp
-
memory/2032-99-0x0000000000000000-mapping.dmp