Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 13:27
Behavioral task
behavioral1
Sample
4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe
Resource
win10v2004-20240226-en
General
-
Target
4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe
-
Size
775KB
-
MD5
44fb0f501a68a977f383121e0b8dc2c2
-
SHA1
d0c45e92dfd81418d6794d44a81c2f8f2a5656a3
-
SHA256
4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2
-
SHA512
92cb15d0c2cd61698540c52dc7c61a19cc342f9daa49da72fd351faec5461f8ee7da6bb81b05825f410326b07918ba3e9bf0eac2816c6a36d5ab3501ede933ab
-
SSDEEP
24576:+Cso9+OXLpMePfI8TgmBTCDqEbOpPtpFaHxfq:YvOXLpMePfzVTCD7gPtLaRfq
Malware Config
Extracted
C:\odt\8yOn8_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Downloads\8yOn8_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Signatures
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002326a-437.dat family_avaddon -
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4760 4604 wmic.exe 99 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 4604 wmic.exe 99 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3544 4604 wmic.exe 99 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (154) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 5776 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\desktop.ini 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\L: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\I: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\Y: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\Z: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\O: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\P: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\R: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\B: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\E: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\H: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\K: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\M: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\S: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\T: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\W: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\V: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\X: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\G: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\J: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\N: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\Q: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe File opened (read-only) \??\U: 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4760 wmic.exe Token: SeSecurityPrivilege 4760 wmic.exe Token: SeTakeOwnershipPrivilege 4760 wmic.exe Token: SeLoadDriverPrivilege 4760 wmic.exe Token: SeSystemProfilePrivilege 4760 wmic.exe Token: SeSystemtimePrivilege 4760 wmic.exe Token: SeProfSingleProcessPrivilege 4760 wmic.exe Token: SeIncBasePriorityPrivilege 4760 wmic.exe Token: SeCreatePagefilePrivilege 4760 wmic.exe Token: SeBackupPrivilege 4760 wmic.exe Token: SeRestorePrivilege 4760 wmic.exe Token: SeShutdownPrivilege 4760 wmic.exe Token: SeDebugPrivilege 4760 wmic.exe Token: SeSystemEnvironmentPrivilege 4760 wmic.exe Token: SeRemoteShutdownPrivilege 4760 wmic.exe Token: SeUndockPrivilege 4760 wmic.exe Token: SeManageVolumePrivilege 4760 wmic.exe Token: 33 4760 wmic.exe Token: 34 4760 wmic.exe Token: 35 4760 wmic.exe Token: 36 4760 wmic.exe Token: SeIncreaseQuotaPrivilege 3544 wmic.exe Token: SeSecurityPrivilege 3544 wmic.exe Token: SeTakeOwnershipPrivilege 3544 wmic.exe Token: SeLoadDriverPrivilege 3544 wmic.exe Token: SeSystemProfilePrivilege 3544 wmic.exe Token: SeSystemtimePrivilege 3544 wmic.exe Token: SeProfSingleProcessPrivilege 3544 wmic.exe Token: SeIncBasePriorityPrivilege 3544 wmic.exe Token: SeCreatePagefilePrivilege 3544 wmic.exe Token: SeBackupPrivilege 3544 wmic.exe Token: SeRestorePrivilege 3544 wmic.exe Token: SeShutdownPrivilege 3544 wmic.exe Token: SeDebugPrivilege 3544 wmic.exe Token: SeSystemEnvironmentPrivilege 3544 wmic.exe Token: SeRemoteShutdownPrivilege 3544 wmic.exe Token: SeUndockPrivilege 3544 wmic.exe Token: SeManageVolumePrivilege 3544 wmic.exe Token: 33 3544 wmic.exe Token: 34 3544 wmic.exe Token: 35 3544 wmic.exe Token: 36 3544 wmic.exe Token: SeIncreaseQuotaPrivilege 1504 wmic.exe Token: SeSecurityPrivilege 1504 wmic.exe Token: SeTakeOwnershipPrivilege 1504 wmic.exe Token: SeLoadDriverPrivilege 1504 wmic.exe Token: SeSystemProfilePrivilege 1504 wmic.exe Token: SeSystemtimePrivilege 1504 wmic.exe Token: SeProfSingleProcessPrivilege 1504 wmic.exe Token: SeIncBasePriorityPrivilege 1504 wmic.exe Token: SeCreatePagefilePrivilege 1504 wmic.exe Token: SeBackupPrivilege 1504 wmic.exe Token: SeRestorePrivilege 1504 wmic.exe Token: SeShutdownPrivilege 1504 wmic.exe Token: SeDebugPrivilege 1504 wmic.exe Token: SeSystemEnvironmentPrivilege 1504 wmic.exe Token: SeRemoteShutdownPrivilege 1504 wmic.exe Token: SeUndockPrivilege 1504 wmic.exe Token: SeManageVolumePrivilege 1504 wmic.exe Token: 33 1504 wmic.exe Token: 34 1504 wmic.exe Token: 35 1504 wmic.exe Token: 36 1504 wmic.exe Token: SeIncreaseQuotaPrivilege 4760 wmic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4264 wrote to memory of 1296 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 107 PID 4264 wrote to memory of 1296 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 107 PID 4264 wrote to memory of 1296 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 107 PID 4264 wrote to memory of 696 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 112 PID 4264 wrote to memory of 696 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 112 PID 4264 wrote to memory of 696 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 112 PID 4264 wrote to memory of 4076 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 114 PID 4264 wrote to memory of 4076 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 114 PID 4264 wrote to memory of 4076 4264 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe 114 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe"C:\Users\Admin\AppData\Local\Temp\4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4264 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic SHADOWCOPY DELETE /nointeractive2⤵PID:1296
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic SHADOWCOPY DELETE /nointeractive2⤵PID:696
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic SHADOWCOPY DELETE /nointeractive2⤵PID:4076
-
-
C:\Windows\system32\wbem\wmic.exewmic SHADOWCOPY DELETE /nointeractive1⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
C:\Windows\system32\wbem\wmic.exewmic SHADOWCOPY DELETE /nointeractive1⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
C:\Windows\system32\wbem\wmic.exewmic SHADOWCOPY DELETE /nointeractive1⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1428 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:5176
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe1⤵
- Executes dropped EXE
PID:5776
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\4c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2.exe
Filesize775KB
MD544fb0f501a68a977f383121e0b8dc2c2
SHA1d0c45e92dfd81418d6794d44a81c2f8f2a5656a3
SHA2564c4477f81ec823fa43bc2499d0fac1c8ccc1e828f1086aa8bfc7ba7122605da2
SHA51292cb15d0c2cd61698540c52dc7c61a19cc342f9daa49da72fd351faec5461f8ee7da6bb81b05825f410326b07918ba3e9bf0eac2816c6a36d5ab3501ede933ab
-
Filesize
3KB
MD5cfc12ac0b34e5a90077b96755826080a
SHA16d74b5674435c3a0d9bdb457dc74554b02da30e2
SHA2567702a23e824da1220ed00d46a5f3a00d8842a9a35a202a149769e4aa3114cb43
SHA512e5c67dd1d93911b58a7418b37a5f526f4e575d9e08f92f1f5b3242a1868326362adac913a6d8ebd284147a96b8adcac072d2c99443844717aeb739197fc72ef4
-
Filesize
3KB
MD5e2678b93656fa0a5c7110f28c668f757
SHA1811237982472aa54452745ccae01e9d2c2c6d260
SHA25644da06d0dc1456dee0c23f8fcff441a5de75acbc4f5805d76a7dc3a3602d572e
SHA512346505561318b447db4a34a55df6a891260f94c06f50db1fc7037d341cacd6095c35798653c423f39f019ede9916d572268d25f846460022417dd3868323fe02