Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Resource
win10v2004-20240226-en
General
-
Target
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
-
Size
440KB
-
MD5
1fd22d479393ef533918ecebb145d1e0
-
SHA1
6ebd97682c08a6e8d25e489762c956e2374b6663
-
SHA256
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c
-
SHA512
715c69dccb6ed42278284bfc53dd8f7d07caca1b09e68eb4e59319afc0a5ac6c536bdeb95c2a03a3cab3ef6ee28eb309a7b9822e22760bb12c096d3c1ee74cfa
-
SSDEEP
12288:GElIOIAeHc4MrTfLES5q8oX0Y4MjD6Opp:GE33e6DEkq8oEdMjD6O
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-1650401615-1019878084-3673944445-1000\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2792 bcdedit.exe 2672 bcdedit.exe -
Renames multiple (7162) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies file permissions 1 TTPs 18 IoCs
pid Process 1456 takeown.exe 2216 takeown.exe 980 takeown.exe 560 takeown.exe 2480 takeown.exe 2872 takeown.exe 2272 takeown.exe 2708 takeown.exe 2644 takeown.exe 2568 takeown.exe 3888 takeown.exe 2608 takeown.exe 1736 takeown.exe 2864 takeown.exe 1500 takeown.exe 2496 takeown.exe 2060 takeown.exe 320 takeown.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ynprinm = "C:\\Users\\Admin\\AppData\\Roaming\\Ynprinm.exe" 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\I: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\K: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\L: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\X: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\G: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\H: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\P: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\R: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\W: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\E: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\J: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\S: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\T: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\U: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Y: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\V: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Z: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\D: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\A: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\M: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\N: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\O: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Q: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1244 set thread context of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR.HXS 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01658_.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_en.dub 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BORDERBB.POC 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationRight_SelectionSubpicture.png 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt32.clx 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101863.BMP 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02617_.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Mazatlan 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00158_.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLJRNL.FAE 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.jpg 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_zh_4.4.0.v20140623020002.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DataListIconImages.jpg 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSIDEBR.XML 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialLetter.dotx 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.commons.codec_1.6.0.v201305230611.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107148.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\stopNetworkServer 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1258.TXT 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299763.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\HEADER.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert.css 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\mainimage-mask.png 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\setup_wm.exe.mui 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00898_.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090777.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL109.XML 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\vlc.mo 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.workbench.nl_zh_4.4.0.v20140623020002.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-profiling.xml 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SplashScreen.bmp 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainBackground.wmv 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\HEADER.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\org-openide-util.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0136865.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jre7\lib\resources.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\VideoLAN\VLC\NEWS.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Lindeman 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099150.JPG 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00485_.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01332U.BMP 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.DEV_K_COL.HXK 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Puerto_Rico 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\ODBCR.SAM 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ACT3.SAM 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195248.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18215_.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Couture.eftx 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2608 takeown.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeDebugPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 1736 takeown.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 320 takeown.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2216 takeown.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 980 takeown.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 560 takeown.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2088 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2716 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 28 PID 1244 wrote to memory of 2716 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 28 PID 1244 wrote to memory of 2716 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 28 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 2716 wrote to memory of 2556 2716 cmd.exe 31 PID 2716 wrote to memory of 2556 2716 cmd.exe 31 PID 2716 wrote to memory of 2556 2716 cmd.exe 31 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 2716 wrote to memory of 2608 2716 cmd.exe 32 PID 2716 wrote to memory of 2608 2716 cmd.exe 32 PID 2716 wrote to memory of 2608 2716 cmd.exe 32 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 1244 wrote to memory of 2088 1244 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 30 PID 2716 wrote to memory of 2516 2716 cmd.exe 33 PID 2716 wrote to memory of 2516 2716 cmd.exe 33 PID 2716 wrote to memory of 2516 2716 cmd.exe 33 PID 2716 wrote to memory of 2656 2716 cmd.exe 34 PID 2716 wrote to memory of 2656 2716 cmd.exe 34 PID 2716 wrote to memory of 2656 2716 cmd.exe 34 PID 2716 wrote to memory of 2528 2716 cmd.exe 35 PID 2716 wrote to memory of 2528 2716 cmd.exe 35 PID 2716 wrote to memory of 2528 2716 cmd.exe 35 PID 2716 wrote to memory of 2588 2716 cmd.exe 36 PID 2716 wrote to memory of 2588 2716 cmd.exe 36 PID 2716 wrote to memory of 2588 2716 cmd.exe 36 PID 2716 wrote to memory of 2892 2716 cmd.exe 37 PID 2716 wrote to memory of 2892 2716 cmd.exe 37 PID 2716 wrote to memory of 2892 2716 cmd.exe 37 PID 2716 wrote to memory of 1304 2716 cmd.exe 38 PID 2716 wrote to memory of 1304 2716 cmd.exe 38 PID 2716 wrote to memory of 1304 2716 cmd.exe 38 PID 2716 wrote to memory of 2548 2716 cmd.exe 39 PID 2716 wrote to memory of 2548 2716 cmd.exe 39 PID 2716 wrote to memory of 2548 2716 cmd.exe 39 PID 2716 wrote to memory of 2996 2716 cmd.exe 40 PID 2716 wrote to memory of 2996 2716 cmd.exe 40 PID 2716 wrote to memory of 2996 2716 cmd.exe 40 PID 2716 wrote to memory of 2584 2716 cmd.exe 41 PID 2716 wrote to memory of 2584 2716 cmd.exe 41 PID 2716 wrote to memory of 2584 2716 cmd.exe 41 PID 2716 wrote to memory of 2456 2716 cmd.exe 42 PID 2716 wrote to memory of 2456 2716 cmd.exe 42 PID 2716 wrote to memory of 2456 2716 cmd.exe 42 PID 2716 wrote to memory of 2660 2716 cmd.exe 43 PID 2716 wrote to memory of 2660 2716 cmd.exe 43 PID 2716 wrote to memory of 2660 2716 cmd.exe 43 PID 2716 wrote to memory of 2408 2716 cmd.exe 44 PID 2716 wrote to memory of 2408 2716 cmd.exe 44 PID 2716 wrote to memory of 2408 2716 cmd.exe 44 PID 2716 wrote to memory of 2420 2716 cmd.exe 45 PID 2716 wrote to memory of 2420 2716 cmd.exe 45 PID 2716 wrote to memory of 2420 2716 cmd.exe 45 PID 2716 wrote to memory of 2428 2716 cmd.exe 46 PID 2716 wrote to memory of 2428 2716 cmd.exe 46 PID 2716 wrote to memory of 2428 2716 cmd.exe 46 PID 2716 wrote to memory of 1844 2716 cmd.exe 47 PID 2716 wrote to memory of 1844 2716 cmd.exe 47 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe"C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Kill-Delete.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor" /v "AutoRun" /f3⤵PID:2556
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\cmd.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2516
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /g Administrators:f3⤵PID:2656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2528
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g Users:r3⤵PID:2588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2892
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g Administrators:r3⤵PID:1304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2548
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d SERVICE3⤵PID:2996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2584
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d mssqlserver3⤵PID:2456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2660
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d "network service"3⤵PID:2408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2420
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g system:r3⤵PID:2428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1844
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d mssql$sqlexpress3⤵PID:2992
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\cmd.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:548
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /g Administrators:f3⤵PID:668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:788
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g Users:r3⤵PID:2752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2724
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g Administrators:r3⤵PID:2828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1748
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d SERVICE3⤵PID:2396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d mssqlserver3⤵PID:1036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1948
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d "network service"3⤵PID:1032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2664
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g system:r3⤵PID:1176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1108
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d mssql$sqlexpress3⤵PID:748
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\net.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /g Administrators:f3⤵PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1412
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /g Users:r3⤵PID:1256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1836
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /g Administrators:r3⤵PID:604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:836
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d SERVICE3⤵PID:1140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1368
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d mssqlserver3⤵PID:1512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d "network service"3⤵PID:1016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d system3⤵PID:2084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1764
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d mssql$sqlexpress3⤵PID:1744
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\net.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2488
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /g Administrators:f3⤵PID:3056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2636
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /g Users:r3⤵PID:2436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2712
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /g Administrators:r3⤵PID:2580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2988
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d SERVICE3⤵PID:2980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:668
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d mssqlserver3⤵PID:296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2752
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d "network service"3⤵PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d system3⤵PID:1988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:580
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d mssql$sqlexpress3⤵PID:1872
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\net1.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1636
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /g Administrators:f3⤵PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1408
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /g Users:r3⤵PID:2888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1284
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /g Administrators:r3⤵PID:2824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1208
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d SERVICE3⤵PID:1936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:832
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d mssqlserver3⤵PID:2124
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1924
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d "network service"3⤵PID:2020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2120
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d system3⤵PID:632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d mssql$sqlexpress3⤵PID:1100
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\net1.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2252
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /g Administrators:f3⤵PID:2024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2292
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /g Users:r3⤵PID:1404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1568
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /g Administrators:r3⤵PID:2204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1792
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d SERVICE3⤵PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1320
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d mssqlserver3⤵PID:2592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2616
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d "network service"3⤵PID:2700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3056
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d system3⤵PID:2612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2876
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d mssql$sqlexpress3⤵PID:2636
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\mshta.exe /a3⤵
- Modifies file permissions
PID:2708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2996
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /g Administrators:f3⤵PID:2344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3004
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /g Users:r3⤵PID:1040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:268
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /g Administrators:r3⤵PID:3000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:788
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d SERVICE3⤵PID:668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2788
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d mssqlserver3⤵PID:2696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2644
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d "network service"3⤵PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d system3⤵PID:2764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2044
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d mssql$sqlexpress3⤵PID:1724
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\mshta.exe /a3⤵
- Modifies file permissions
PID:2864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /g Administrators:f3⤵PID:1580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2100
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /g Users:r3⤵PID:2060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2064
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /g Administrators:r3⤵PID:2228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1936
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d SERVICE3⤵PID:1208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d mssqlserver3⤵PID:288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1768
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d "network service"3⤵PID:536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1360
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d system3⤵PID:308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:832
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d mssql$sqlexpress3⤵PID:1028
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\FTP.exe /a3⤵
- Modifies file permissions
PID:1500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:560
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /g Administrators:f3⤵PID:1952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2172
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /g Users:r3⤵PID:3040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /g Administrators:r3⤵PID:1732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2560
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d SERVICE3⤵PID:872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2612
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d mssqlserver3⤵PID:2908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2996
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d "network service"3⤵PID:2344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2388
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d system3⤵PID:2036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d mssql$sqlexpress3⤵PID:2828
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\FTP.exe /a3⤵
- Modifies file permissions
PID:2644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1156
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /g Administrators:f3⤵PID:568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2380
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /g Users:r3⤵PID:1412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1784
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /g Administrators:r3⤵PID:2092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1052
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d SERVICE3⤵PID:700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1056
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d mssqlserver3⤵PID:2136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1556
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d "network service"3⤵PID:1764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2656
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d system3⤵PID:2516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2444
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d mssql$sqlexpress3⤵PID:2668
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\wscript.exe /a3⤵
- Modifies file permissions
PID:2480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:828
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /g Administrators:f3⤵PID:296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1748
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /g Users:r3⤵PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /g Administrators:r3⤵PID:1988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2764
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d SERVICE3⤵PID:2736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1716
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d mssqlserver3⤵PID:2840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2844
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d "network service"3⤵PID:1772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2776
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d system3⤵PID:1620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1256
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d mssql$sqlexpress3⤵PID:2824
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\wscript.exe /a3⤵
- Modifies file permissions
PID:2872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2340
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /g Administrators:f3⤵PID:1752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2072
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /g Users:r3⤵PID:2132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2180
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /g Administrators:r3⤵PID:1208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1368
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d SERVICE3⤵PID:944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1756
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d mssqlserver3⤵PID:308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1812
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d "network service"3⤵PID:1824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1820
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d system3⤵PID:700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d mssql$sqlexpress3⤵PID:1500
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\cscript.exe /a3⤵
- Modifies file permissions
PID:2272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2032
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /g Administrators:f3⤵PID:2252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2292
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /g Users:r3⤵PID:1592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2216
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /g Administrators:r3⤵PID:1964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2648
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d SERVICE3⤵PID:2608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2592
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d mssqlserver3⤵PID:2140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2544
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d "network service"3⤵PID:2612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2660
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d system3⤵PID:1844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2668
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d mssql$sqlexpress3⤵PID:2792
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\cscript.exe /a3⤵
- Modifies file permissions
PID:2496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2752
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /g Administrators:f3⤵PID:868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2780
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /g Users:r3⤵PID:796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2508
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /g Administrators:r3⤵PID:2804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:832
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d SERVICE3⤵PID:2464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:744
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d mssqlserver3⤵PID:3048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2564
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d "network service"3⤵PID:2316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d system3⤵PID:1836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3020
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d mssql$sqlexpress3⤵PID:904
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /a3⤵
- Modifies file permissions
PID:2568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f3⤵PID:1812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1352
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r3⤵PID:1932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2312
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r3⤵PID:2032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1684
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE3⤵PID:2204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2856
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver3⤵PID:2780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3532
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"3⤵PID:3540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3596
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d system3⤵PID:3604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2808
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress3⤵PID:2736
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a3⤵
- Modifies file permissions
PID:1456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3056
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f3⤵PID:1796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3664
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r3⤵PID:3672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3276
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r3⤵PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1980
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE3⤵PID:1556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1496
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver3⤵PID:1380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2968
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"3⤵PID:1324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3188
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system3⤵PID:3204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2776
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress3⤵PID:2396
-
-
C:\Windows\system32\takeown.exetakeown /f C:\ProgramData /a3⤵
- Modifies file permissions
PID:3888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1728
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /g Administrators:f3⤵PID:3000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3392
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /g Users:r3⤵PID:3404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3272
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /g Administrators:r3⤵PID:3876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3872
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d SERVICE3⤵PID:3756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2292
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d mssqlserver3⤵PID:2672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4092
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d "network service"3⤵PID:4084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2584
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d system3⤵PID:548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1204
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d mssql$sqlexpress3⤵PID:2652
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Users\Public /a3⤵
- Modifies file permissions
PID:2060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:868
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /g Administrators:f3⤵PID:3012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3228
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /g Users:r3⤵PID:2712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1768
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /g Administrators:r3⤵PID:1784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2668
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d SERVICE3⤵PID:3020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3204
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d mssqlserver3⤵PID:3040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3092
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d "network service"3⤵PID:2656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:744
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d system3⤵PID:2324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3796
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d mssql$sqlexpress3⤵PID:2532
-
-
-
C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exeC:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2088 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵PID:3000
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:2672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no3⤵PID:2704
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2792
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD51726416850d3bba46eeb804fae57083d
SHA17e7957d7e7fd7c27b9fb903a0828b09cbb44c196
SHA256c207a7a561ab726fb272b5abd99c4da8e927b5da788210d5dd186023c2783990
SHA5127747e5c6bd77a43ee958cb7b533a73757e8bfb7b3706af4eb7ec9a99458720f89cd30bb23b4cb069826dc36a6ce737424ad0007307be67a7391591f6c936df27
-
Filesize
1KB
MD5905681904a72fd6f720d55ffdab9b055
SHA1131b0dee12dd8f038a3a52847b4c9c66cb84f138
SHA256f84e7a7ad3d65c3080d01376c4b141bba2b0db23304f7e511e236688d84ed7ca
SHA51295beb5f4c4e35e3e42821b64435551976f55658cca98c7e5dbaf415bc7c5348a6adff502dba80d47cfc9ab39867666feb4870b755577ce50ba2ba6dceaec2224