Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Resource
win10v2004-20240226-en
General
-
Target
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
-
Size
440KB
-
MD5
1fd22d479393ef533918ecebb145d1e0
-
SHA1
6ebd97682c08a6e8d25e489762c956e2374b6663
-
SHA256
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c
-
SHA512
715c69dccb6ed42278284bfc53dd8f7d07caca1b09e68eb4e59319afc0a5ac6c536bdeb95c2a03a3cab3ef6ee28eb309a7b9822e22760bb12c096d3c1ee74cfa
-
SSDEEP
12288:GElIOIAeHc4MrTfLES5q8oX0Y4MjD6Opp:GE33e6DEkq8oEdMjD6O
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/1968-3-0x0000000000AD0000-0x0000000000B42000-memory.dmp family_purelog_stealer -
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2012 bcdedit.exe 2352 bcdedit.exe -
Renames multiple (7305) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies file permissions 1 TTPs 18 IoCs
pid Process 1516 takeown.exe 1964 takeown.exe 792 takeown.exe 2140 takeown.exe 2356 takeown.exe 1464 takeown.exe 1188 takeown.exe 2132 takeown.exe 2196 takeown.exe 2572 takeown.exe 2840 takeown.exe 1420 takeown.exe 300 takeown.exe 1928 takeown.exe 2972 takeown.exe 2472 takeown.exe 556 takeown.exe 2784 takeown.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ynprinm = "C:\\Users\\Admin\\AppData\\Roaming\\Ynprinm.exe" 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\O: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\S: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\T: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\G: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\H: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\K: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\U: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Y: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\A: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\J: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\M: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\N: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\P: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\R: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Z: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\D: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\B: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\L: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Q: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\V: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\W: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\X: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\E: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Tripoli 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\Center 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.RSD 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXC 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_scrapbook_Thumbnail.bmp 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ashgabat 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\ReadOutLoud.api 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187859.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01244_.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate.css 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Yakutat 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\sunjce_provider.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\vlc.mo 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00004_.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143745.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR51F.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyclient.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\computericonMask.bmp 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\README.html 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh87 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309567.JPG 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\ChessIconImagesMask.bmp 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Kwajalein 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-uisupport.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jre7\lib\management\management.properties 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\JNTFiltr.dll.mui 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10264_.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Person.gif 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Payment Type.accft 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\SynchronizationEula.rtf 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\WMPDMC.exe.mui 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB1A.BDR 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-charts.xml 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Windows Journal\en-US\Journal.exe.mui 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297725.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR3F.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-io-ui.xml 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_justify.gif 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.registry_3.5.400.v20140428-1507.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ODBC.SAM 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-threaddump.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD20013_.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02085_.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.nl_ja_4.4.0.v20140623020002.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunjce_provider.jar 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-execution.xml 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.bmp 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0301050.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB_F_COL.HXK 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\TAB_OFF.GIF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03459_.WMF 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Fakaofo 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmlaunch.exe.mui 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2784 takeown.exe Token: SeTakeOwnershipPrivilege 1516 takeown.exe Token: SeTakeOwnershipPrivilege 556 takeown.exe Token: SeTakeOwnershipPrivilege 1928 takeown.exe Token: SeTakeOwnershipPrivilege 1420 takeown.exe Token: SeTakeOwnershipPrivilege 2356 takeown.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeDebugPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2840 takeown.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2140 takeown.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 1964 takeown.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 792 takeown.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2560 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2556 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 28 PID 1968 wrote to memory of 2556 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 28 PID 1968 wrote to memory of 2556 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 28 PID 2556 wrote to memory of 2672 2556 cmd.exe 30 PID 2556 wrote to memory of 2672 2556 cmd.exe 30 PID 2556 wrote to memory of 2672 2556 cmd.exe 30 PID 2556 wrote to memory of 2784 2556 cmd.exe 31 PID 2556 wrote to memory of 2784 2556 cmd.exe 31 PID 2556 wrote to memory of 2784 2556 cmd.exe 31 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 2556 wrote to memory of 2776 2556 cmd.exe 33 PID 2556 wrote to memory of 2776 2556 cmd.exe 33 PID 2556 wrote to memory of 2776 2556 cmd.exe 33 PID 2556 wrote to memory of 2524 2556 cmd.exe 34 PID 2556 wrote to memory of 2524 2556 cmd.exe 34 PID 2556 wrote to memory of 2524 2556 cmd.exe 34 PID 1968 wrote to memory of 2560 1968 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 32 PID 2556 wrote to memory of 2436 2556 cmd.exe 35 PID 2556 wrote to memory of 2436 2556 cmd.exe 35 PID 2556 wrote to memory of 2436 2556 cmd.exe 35 PID 2556 wrote to memory of 2752 2556 cmd.exe 36 PID 2556 wrote to memory of 2752 2556 cmd.exe 36 PID 2556 wrote to memory of 2752 2556 cmd.exe 36 PID 2556 wrote to memory of 2572 2556 cmd.exe 328 PID 2556 wrote to memory of 2572 2556 cmd.exe 328 PID 2556 wrote to memory of 2572 2556 cmd.exe 328 PID 2556 wrote to memory of 2200 2556 cmd.exe 180 PID 2556 wrote to memory of 2200 2556 cmd.exe 180 PID 2556 wrote to memory of 2200 2556 cmd.exe 180 PID 2556 wrote to memory of 2408 2556 cmd.exe 39 PID 2556 wrote to memory of 2408 2556 cmd.exe 39 PID 2556 wrote to memory of 2408 2556 cmd.exe 39 PID 2556 wrote to memory of 2404 2556 cmd.exe 40 PID 2556 wrote to memory of 2404 2556 cmd.exe 40 PID 2556 wrote to memory of 2404 2556 cmd.exe 40 PID 2556 wrote to memory of 2428 2556 cmd.exe 41 PID 2556 wrote to memory of 2428 2556 cmd.exe 41 PID 2556 wrote to memory of 2428 2556 cmd.exe 41 PID 2556 wrote to memory of 2472 2556 cmd.exe 42 PID 2556 wrote to memory of 2472 2556 cmd.exe 42 PID 2556 wrote to memory of 2472 2556 cmd.exe 42 PID 2556 wrote to memory of 2528 2556 cmd.exe 43 PID 2556 wrote to memory of 2528 2556 cmd.exe 43 PID 2556 wrote to memory of 2528 2556 cmd.exe 43 PID 2556 wrote to memory of 2168 2556 cmd.exe 44 PID 2556 wrote to memory of 2168 2556 cmd.exe 44 PID 2556 wrote to memory of 2168 2556 cmd.exe 44 PID 2556 wrote to memory of 2880 2556 cmd.exe 45 PID 2556 wrote to memory of 2880 2556 cmd.exe 45 PID 2556 wrote to memory of 2880 2556 cmd.exe 45 PID 2556 wrote to memory of 2452 2556 cmd.exe 46 PID 2556 wrote to memory of 2452 2556 cmd.exe 46 PID 2556 wrote to memory of 2452 2556 cmd.exe 46 PID 2556 wrote to memory of 1676 2556 cmd.exe 47 PID 2556 wrote to memory of 1676 2556 cmd.exe 47 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe"C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Kill-Delete.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor" /v "AutoRun" /f3⤵PID:2672
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\cmd.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2776
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /g Administrators:f3⤵PID:2524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2436
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g Users:r3⤵PID:2752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g Administrators:r3⤵PID:2200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2408
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d SERVICE3⤵PID:2404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2428
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d mssqlserver3⤵PID:2472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2528
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d "network service"3⤵PID:2168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2880
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g system:r3⤵PID:2452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1676
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d mssql$sqlexpress3⤵PID:2884
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\cmd.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1784
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /g Administrators:f3⤵PID:2396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2700
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g Users:r3⤵PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2704
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g Administrators:r3⤵PID:2716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2740
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d SERVICE3⤵PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2852
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d mssqlserver3⤵PID:2868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2856
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d "network service"3⤵PID:2296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1460
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g system:r3⤵PID:1172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2908
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d mssql$sqlexpress3⤵PID:1468
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\net.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:856
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /g Administrators:f3⤵PID:876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2144
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /g Users:r3⤵PID:1552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /g Administrators:r3⤵PID:1892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1876
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d SERVICE3⤵PID:1372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1564
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d mssqlserver3⤵PID:868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1432
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d "network service"3⤵PID:1328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2032
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d system3⤵PID:3024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1692
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d mssql$sqlexpress3⤵PID:2096
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\net.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /g Administrators:f3⤵PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2448
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /g Users:r3⤵PID:324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:828
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /g Administrators:r3⤵PID:2280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2236
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d SERVICE3⤵PID:1376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2744
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d mssqlserver3⤵PID:1632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1744
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d "network service"3⤵PID:2244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2256
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d system3⤵PID:2240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1188
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d mssql$sqlexpress3⤵PID:576
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\net1.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /g Administrators:f3⤵PID:1416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2804
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /g Users:r3⤵PID:1792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:328
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /g Administrators:r3⤵PID:2924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1136
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d SERVICE3⤵PID:352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d mssqlserver3⤵PID:1952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1056
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d "network service"3⤵PID:2268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:452
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d system3⤵PID:2364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d mssql$sqlexpress3⤵PID:2984
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\net1.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2340
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /g Administrators:f3⤵PID:1860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1704
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /g Users:r3⤵PID:1492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1684
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /g Administrators:r3⤵PID:776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1324
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d SERVICE3⤵PID:1036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1804
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d mssqlserver3⤵PID:2076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:920
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d "network service"3⤵PID:280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:712
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d system3⤵PID:1700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2072
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d mssql$sqlexpress3⤵PID:1668
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\mshta.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1652
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /g Administrators:f3⤵PID:2948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1884
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /g Users:r3⤵PID:648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:900
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /g Administrators:r3⤵PID:1440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1888
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d SERVICE3⤵PID:2820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1532
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d mssqlserver3⤵PID:2688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d "network service"3⤵PID:2664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2596
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d system3⤵PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1552
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d mssql$sqlexpress3⤵PID:1624
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\mshta.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:688
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /g Administrators:f3⤵PID:2016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2096
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /g Users:r3⤵PID:1916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2248
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /g Administrators:r3⤵PID:2712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2392
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d SERVICE3⤵PID:1796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2172
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d mssqlserver3⤵PID:1952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1240
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d "network service"3⤵PID:964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:712
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d system3⤵PID:2844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1448
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d mssql$sqlexpress3⤵PID:2996
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\FTP.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2820
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /g Administrators:f3⤵PID:1724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2980
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /g Users:r3⤵PID:2648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2608
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /g Administrators:r3⤵PID:2200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2988
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d SERVICE3⤵PID:2528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2876
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d mssqlserver3⤵PID:2228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1516
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d "network service"3⤵PID:1596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2756
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d system3⤵PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1328
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d mssql$sqlexpress3⤵PID:2032
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\FTP.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2280
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /g Administrators:f3⤵PID:1376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1856
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /g Users:r3⤵PID:2088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:996
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /g Administrators:r3⤵PID:2264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1792
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d SERVICE3⤵PID:328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1796
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d mssqlserver3⤵PID:1012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:412
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d "network service"3⤵PID:452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1608
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d system3⤵PID:1952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1584
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d mssql$sqlexpress3⤵PID:1556
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\wscript.exe /a3⤵
- Modifies file permissions
PID:300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:280
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /g Administrators:f3⤵PID:2968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:712
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /g Users:r3⤵PID:2844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1476
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /g Administrators:r3⤵PID:812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:848
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d SERVICE3⤵PID:2948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1896
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d mssqlserver3⤵PID:1512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2632
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d "network service"3⤵PID:2784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2688
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d system3⤵PID:2456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2956
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d mssql$sqlexpress3⤵PID:2988
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\wscript.exe /a3⤵
- Modifies file permissions
PID:2472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2580
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /g Administrators:f3⤵PID:492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1784
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /g Users:r3⤵PID:2624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2720
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /g Administrators:r3⤵PID:2396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d SERVICE3⤵PID:2724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d mssqlserver3⤵PID:2852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2488
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d "network service"3⤵PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d system3⤵PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1636
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d mssql$sqlexpress3⤵PID:2536
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\cscript.exe /a3⤵
- Modifies file permissions
PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2508
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /g Administrators:f3⤵PID:1800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:704
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /g Users:r3⤵PID:1432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2896
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /g Administrators:r3⤵PID:1624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2504
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d SERVICE3⤵PID:2032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d mssqlserver3⤵PID:2096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2224
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d "network service"3⤵PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2068
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d system3⤵PID:1376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1744
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d mssql$sqlexpress3⤵PID:1856
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\cscript.exe /a3⤵
- Modifies file permissions
PID:1188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:784
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /g Administrators:f3⤵PID:864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2924
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /g Users:r3⤵PID:652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1416
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /g Administrators:r3⤵PID:1792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2056
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d SERVICE3⤵PID:2268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d mssqlserver3⤵PID:2372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d "network service"3⤵PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1952
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d system3⤵PID:1608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:920
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d mssql$sqlexpress3⤵PID:1556
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /a3⤵
- Modifies file permissions
PID:2132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1688
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f3⤵PID:2164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1652
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r3⤵PID:1884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1908
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r3⤵PID:3036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2604
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE3⤵PID:2632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2992
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver3⤵PID:2420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2616
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"3⤵PID:492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d system3⤵PID:2848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress3⤵PID:2724
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a3⤵
- Modifies file permissions
PID:2196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f3⤵PID:1592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1872
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r3⤵PID:2536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1892
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r3⤵PID:1800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1432
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE3⤵PID:1564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2292
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver3⤵PID:2260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"3⤵PID:3056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1632
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system3⤵PID:2220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:592
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress3⤵PID:1792
-
-
C:\Windows\system32\takeown.exetakeown /f C:\ProgramData /a3⤵
- Modifies file permissions
PID:2972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1492
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /g Administrators:f3⤵PID:776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:920
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /g Users:r3⤵PID:560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1132
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /g Administrators:r3⤵PID:1688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1948
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d SERVICE3⤵PID:820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1920
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d mssqlserver3⤵PID:2524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2404
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d "network service"3⤵PID:2480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2988
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d system3⤵PID:2412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2544
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d mssql$sqlexpress3⤵PID:2396
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Users\Public /a3⤵
- Modifies file permissions
PID:2572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2680
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /g Administrators:f3⤵PID:2724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2860
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /g Users:r3⤵PID:1876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1464
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /g Administrators:r3⤵PID:1872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2140
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d SERVICE3⤵PID:2036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:856
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d mssqlserver3⤵PID:2908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1944
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d "network service"3⤵PID:2260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1976
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d system3⤵PID:2096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1744
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d mssql$sqlexpress3⤵PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exeC:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵PID:820
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no3⤵PID:1448
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2352
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD51726416850d3bba46eeb804fae57083d
SHA17e7957d7e7fd7c27b9fb903a0828b09cbb44c196
SHA256c207a7a561ab726fb272b5abd99c4da8e927b5da788210d5dd186023c2783990
SHA5127747e5c6bd77a43ee958cb7b533a73757e8bfb7b3706af4eb7ec9a99458720f89cd30bb23b4cb069826dc36a6ce737424ad0007307be67a7391591f6c936df27
-
Filesize
1KB
MD52438ab1b86d00937a81b8093e4b0d537
SHA1c2b93e2c63e5913f1be93df812b7ba5e4e2b1024
SHA256adfe101e3266e9c185734590efc72761c50e73a0504d7f9ae17998ab96c028de
SHA5127707466755a2799ce8f518f19cd5de9b88b51d04da010f958440bf3e1399794b96e26257f4d53df68fcd1d84a24674394235db6bd0ed2a8ba7abf496d47d3aea