Analysis
-
max time kernel
48s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Resource
win10v2004-20240226-en
General
-
Target
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
-
Size
440KB
-
MD5
1fd22d479393ef533918ecebb145d1e0
-
SHA1
6ebd97682c08a6e8d25e489762c956e2374b6663
-
SHA256
6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c
-
SHA512
715c69dccb6ed42278284bfc53dd8f7d07caca1b09e68eb4e59319afc0a5ac6c536bdeb95c2a03a3cab3ef6ee28eb309a7b9822e22760bb12c096d3c1ee74cfa
-
SSDEEP
12288:GElIOIAeHc4MrTfLES5q8oX0Y4MjD6Opp:GE33e6DEkq8oEdMjD6O
Malware Config
Extracted
C:\Users\Admin\Contacts\HOW TO BACK FILES.txt
targetcompany
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/572-3-0x0000020ACDBD0000-0x0000020ACDC42000-memory.dmp family_purelog_stealer -
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 4424 bcdedit.exe 2236 bcdedit.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Modifies file permissions 1 TTPs 18 IoCs
pid Process 4140 takeown.exe 332 takeown.exe 2468 takeown.exe 5116 takeown.exe 4036 takeown.exe 3116 takeown.exe 1696 takeown.exe 3212 takeown.exe 4560 takeown.exe 3868 takeown.exe 2816 takeown.exe 2712 takeown.exe 2308 takeown.exe 4200 takeown.exe 4200 takeown.exe 1368 takeown.exe 4956 takeown.exe 2224 takeown.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ynprinm = "C:\\Users\\Admin\\AppData\\Roaming\\Ynprinm.exe" 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\V: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\W: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\E: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\L: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\O: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\S: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\J: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\N: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\P: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Q: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\D: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\A: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\H: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\I: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Z: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\B: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\K: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\R: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\Y: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\G: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\M: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\U: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File opened (read-only) \??\X: 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 572 set thread context of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\dark\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ja-jp\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-tw\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\subscription_intro\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\AppxMetadata\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\km-KH\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Mozilla Firefox\uninstall\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Fonts\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Sort\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pt-br\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Java\jdk-1.8\include\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prc\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-fr\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\System\ole db\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-white\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ca-ES\View3d\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ar-ae\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\es-es\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ar-ae\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ar-SA\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\he-il\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fi-fi\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fi-fi\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ca-es\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pl-pl\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\zh-tw\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\tr-tr\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\root\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\es-es\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\tr-tr\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\cs\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\ja-jp\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\zh-Hans\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\HOW TO BACK FILES.txt 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 2712 takeown.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeDebugPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 1696 takeown.exe Token: SeTakeOwnershipPrivilege 4140 takeown.exe Token: SeTakeOwnershipPrivilege 332 takeown.exe Token: SeTakeOwnershipPrivilege 2468 takeown.exe Token: SeTakeOwnershipPrivilege 2224 takeown.exe Token: SeTakeOwnershipPrivilege 2308 takeown.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe Token: SeTakeOwnershipPrivilege 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 572 wrote to memory of 2252 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 98 PID 572 wrote to memory of 2252 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 98 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 2252 wrote to memory of 5000 2252 cmd.exe 200 PID 2252 wrote to memory of 5000 2252 cmd.exe 200 PID 572 wrote to memory of 3712 572 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 101 PID 2252 wrote to memory of 2712 2252 cmd.exe 102 PID 2252 wrote to memory of 2712 2252 cmd.exe 102 PID 2252 wrote to memory of 4904 2252 cmd.exe 204 PID 2252 wrote to memory of 4904 2252 cmd.exe 204 PID 2252 wrote to memory of 5104 2252 cmd.exe 104 PID 2252 wrote to memory of 5104 2252 cmd.exe 104 PID 2252 wrote to memory of 4948 2252 cmd.exe 105 PID 2252 wrote to memory of 4948 2252 cmd.exe 105 PID 2252 wrote to memory of 2528 2252 cmd.exe 106 PID 2252 wrote to memory of 2528 2252 cmd.exe 106 PID 2252 wrote to memory of 1516 2252 cmd.exe 107 PID 2252 wrote to memory of 1516 2252 cmd.exe 107 PID 2252 wrote to memory of 2388 2252 cmd.exe 168 PID 2252 wrote to memory of 2388 2252 cmd.exe 168 PID 2252 wrote to memory of 2552 2252 cmd.exe 109 PID 2252 wrote to memory of 2552 2252 cmd.exe 109 PID 2252 wrote to memory of 3304 2252 cmd.exe 110 PID 2252 wrote to memory of 3304 2252 cmd.exe 110 PID 2252 wrote to memory of 3252 2252 cmd.exe 111 PID 2252 wrote to memory of 3252 2252 cmd.exe 111 PID 2252 wrote to memory of 2596 2252 cmd.exe 163 PID 2252 wrote to memory of 2596 2252 cmd.exe 163 PID 2252 wrote to memory of 3328 2252 cmd.exe 113 PID 2252 wrote to memory of 3328 2252 cmd.exe 113 PID 2252 wrote to memory of 1064 2252 cmd.exe 202 PID 2252 wrote to memory of 1064 2252 cmd.exe 202 PID 3712 wrote to memory of 2940 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 179 PID 3712 wrote to memory of 2940 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 179 PID 2252 wrote to memory of 3548 2252 cmd.exe 116 PID 2252 wrote to memory of 3548 2252 cmd.exe 116 PID 2252 wrote to memory of 2364 2252 cmd.exe 157 PID 2252 wrote to memory of 2364 2252 cmd.exe 157 PID 3712 wrote to memory of 1164 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 119 PID 3712 wrote to memory of 1164 3712 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe 119 PID 1164 wrote to memory of 4424 1164 cmd.exe 208 PID 1164 wrote to memory of 4424 1164 cmd.exe 208 PID 2940 wrote to memory of 2236 2940 cmd.exe 121 PID 2940 wrote to memory of 2236 2940 cmd.exe 121 PID 2252 wrote to memory of 4516 2252 cmd.exe 143 PID 2252 wrote to memory of 4516 2252 cmd.exe 143 PID 2252 wrote to memory of 4396 2252 cmd.exe 203 PID 2252 wrote to memory of 4396 2252 cmd.exe 203 PID 2252 wrote to memory of 1696 2252 cmd.exe 181 PID 2252 wrote to memory of 1696 2252 cmd.exe 181 PID 2252 wrote to memory of 4036 2252 cmd.exe 207 PID 2252 wrote to memory of 4036 2252 cmd.exe 207 PID 2252 wrote to memory of 4904 2252 cmd.exe 204 PID 2252 wrote to memory of 4904 2252 cmd.exe 204 PID 2252 wrote to memory of 3016 2252 cmd.exe 184 PID 2252 wrote to memory of 3016 2252 cmd.exe 184 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe"C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Kill-Delete.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor" /v "AutoRun" /f3⤵PID:5000
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\cmd.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /g Administrators:f3⤵PID:5104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4948
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g Users:r3⤵PID:2528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1516
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g Administrators:r3⤵PID:2388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2552
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d SERVICE3⤵PID:3304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3252
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d mssqlserver3⤵PID:2596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3328
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d "network service"3⤵PID:1064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3548
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /g system:r3⤵PID:2364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4516
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cmd.exe /e /d mssql$sqlexpress3⤵PID:4396
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\cmd.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4036
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /g Administrators:f3⤵PID:4904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3016
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g Users:r3⤵PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4020
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g Administrators:r3⤵PID:2352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d SERVICE3⤵PID:2316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1064
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d mssqlserver3⤵PID:3308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1368
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d "network service"3⤵PID:2596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3116
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /g system:r3⤵PID:1832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1496
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /d mssql$sqlexpress3⤵PID:4516
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\net.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3428
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /g Administrators:f3⤵PID:3116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /g Users:r3⤵PID:1184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1696
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /g Administrators:r3⤵PID:700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1368
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d SERVICE3⤵PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d mssqlserver3⤵PID:3928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:684
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d "network service"3⤵PID:2292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2364
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d system3⤵PID:4864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4420
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net.exe /e /d mssql$sqlexpress3⤵PID:4036
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\net.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /g Administrators:f3⤵PID:2596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3472
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /g Users:r3⤵PID:3968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3744
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /g Administrators:r3⤵PID:3212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2388
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d SERVICE3⤵PID:1256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2884
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d mssqlserver3⤵PID:700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3092
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d "network service"3⤵PID:2408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d system3⤵PID:3928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net.exe /e /d mssql$sqlexpress3⤵PID:4448
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\net1.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /g Administrators:f3⤵PID:332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1696
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /g Users:r3⤵PID:4140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1936
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /g Administrators:r3⤵PID:3016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2340
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d SERVICE3⤵PID:4864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d mssqlserver3⤵PID:700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d "network service"3⤵PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1944
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d system3⤵PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2156
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\net1.exe /e /d mssql$sqlexpress3⤵PID:2344
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\net1.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3988
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /g Administrators:f3⤵PID:3612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3912
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /g Users:r3⤵PID:3868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:5000
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /g Administrators:r3⤵PID:2172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1064
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d SERVICE3⤵PID:4396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d mssqlserver3⤵PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:700
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d "network service"3⤵PID:4036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4424
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d system3⤵PID:2600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4360
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\net1.exe /e /d mssql$sqlexpress3⤵PID:3308
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\mshta.exe /a3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1836
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /g Administrators:f3⤵PID:4952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /g Users:r3⤵PID:2364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3808
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /g Administrators:r3⤵PID:1700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d SERVICE3⤵PID:3536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2908
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d mssqlserver3⤵PID:3988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4424
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d "network service"3⤵PID:2388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2732
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d system3⤵PID:2940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2552
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\mshta.exe /e /d mssql$sqlexpress3⤵PID:1832
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\mshta.exe /a3⤵
- Modifies file permissions
PID:4200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1936
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /g Administrators:f3⤵PID:3352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /g Users:r3⤵PID:3016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4896
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /g Administrators:r3⤵PID:4864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1368
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d SERVICE3⤵PID:1064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3428
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d mssqlserver3⤵PID:8
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4176
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d "network service"3⤵PID:4564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4396
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d system3⤵PID:1836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4036
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\mshta.exe /e /d mssql$sqlexpress3⤵PID:3428
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\FTP.exe /a3⤵
- Modifies file permissions
PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4896
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /g Administrators:f3⤵PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /g Users:r3⤵PID:1104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3100
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /g Administrators:r3⤵PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2352
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d SERVICE3⤵PID:1724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1092
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d mssqlserver3⤵PID:3016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3988
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d "network service"3⤵PID:5116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3744
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d system3⤵PID:2388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:880
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\FTP.exe /e /d mssql$sqlexpress3⤵PID:3968
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\FTP.exe /a3⤵
- Modifies file permissions
PID:4200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /g Administrators:f3⤵PID:2344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4548
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /g Users:r3⤵PID:2264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2388
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /g Administrators:r3⤵PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4020
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d SERVICE3⤵PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2360
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d mssqlserver3⤵PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d "network service"3⤵PID:1496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1256
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d system3⤵PID:4436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\FTP.exe /e /d mssql$sqlexpress3⤵PID:2300
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\wscript.exe /a3⤵
- Modifies file permissions
PID:3868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:5112
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /g Administrators:f3⤵PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /g Users:r3⤵PID:5104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /g Administrators:r3⤵PID:3744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3144
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d SERVICE3⤵PID:2388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4036
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d mssqlserver3⤵PID:4176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1064
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d "network service"3⤵PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d system3⤵PID:2352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1184
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\wscript.exe /e /d mssql$sqlexpress3⤵PID:1104
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\wscript.exe /a3⤵
- Modifies file permissions
PID:5116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /g Administrators:f3⤵PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /g Users:r3⤵PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4560
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /g Administrators:r3⤵PID:4360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3164
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d SERVICE3⤵PID:5104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2408
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d mssqlserver3⤵PID:3744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:436
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d "network service"3⤵PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3112
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d system3⤵PID:4176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1064
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\wscript.exe /e /d mssql$sqlexpress3⤵PID:3968
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\cscript.exe /a3⤵
- Modifies file permissions
PID:2816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /g Administrators:f3⤵PID:4564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1140
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /g Users:r3⤵PID:2196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2300
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /g Administrators:r3⤵PID:1092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4396
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d SERVICE3⤵PID:3868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3212
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d mssqlserver3⤵PID:4516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2344
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d "network service"3⤵PID:4864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3164
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d system3⤵PID:2600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2408
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\cscript.exe /e /d mssql$sqlexpress3⤵PID:3348
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\cscript.exe /a3⤵
- Modifies file permissions
PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3612
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /g Administrators:f3⤵PID:4860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4040
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /g Users:r3⤵PID:1960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1184
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /g Administrators:r3⤵PID:1256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4984
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d SERVICE3⤵PID:3676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4848
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d mssqlserver3⤵PID:1088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5112
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d "network service"3⤵PID:1516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2172
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d system3⤵PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\cscript.exe /e /d mssql$sqlexpress3⤵PID:2344
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /a3⤵
- Modifies file permissions
PID:4956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3144
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f3⤵PID:5104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2356
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r3⤵PID:2552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3112
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r3⤵PID:3612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3092
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE3⤵PID:4040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:412
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver3⤵PID:1184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1140
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"3⤵PID:2196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2128
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d system3⤵PID:2788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4396
-
-
C:\Windows\system32\cacls.execacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress3⤵PID:5112
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a3⤵
- Modifies file permissions
PID:3212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3184
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f3⤵PID:4560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r3⤵PID:2264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3112
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r3⤵PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1092
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE3⤵PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3212
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver3⤵PID:3808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1960
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"3⤵PID:2340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4848
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system3⤵PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3112
-
-
C:\Windows\system32\cacls.execacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress3⤵PID:1236
-
-
C:\Windows\system32\takeown.exetakeown /f C:\ProgramData /a3⤵
- Modifies file permissions
PID:4036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2308
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /g Administrators:f3⤵PID:2268
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:3112
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /g Users:r3⤵PID:1236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1104
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /g Administrators:r3⤵PID:2816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4420
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d SERVICE3⤵PID:3212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2344
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d mssqlserver3⤵PID:2408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2356
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d "network service"3⤵PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4176
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d system3⤵PID:4040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1092
-
-
C:\Windows\system32\cacls.execacls C:\ProgramData /e /d mssql$sqlexpress3⤵PID:4984
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Users\Public /a3⤵
- Modifies file permissions
PID:3116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2308
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /g Administrators:f3⤵PID:1092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1368
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /g Users:r3⤵PID:3100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:436
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /g Administrators:r3⤵PID:4436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:1624
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d SERVICE3⤵PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4848
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d mssqlserver3⤵PID:3676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3348
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d "network service"3⤵PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:4200
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d system3⤵PID:4176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2344
-
-
C:\Windows\system32\cacls.execacls C:\Users\Public /e /d mssql$sqlexpress3⤵PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exeC:\Users\Admin\AppData\Local\Temp\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe2⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:2236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:4424
-
-
-
-
C:\Windows\System32\wuapihost.exeC:\Windows\System32\wuapihost.exe -Embedding1⤵PID:3116
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv H/FMF6ONdU2TLNkeKDW6BA.0.21⤵PID:1836
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 9f573daffc282487724d4ce16a43977b H/FMF6ONdU2TLNkeKDW6BA.0.1.0.0.01⤵PID:2408
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:4436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3952 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Documents and Settings\Admin\Local Settings\Microsoft\CLR_v4.0\UsageLogs\6be2b4ae091e170fe4a53519a01feb229c2062f0da39923f628cf764c10e4b5c.exe.log
Filesize1KB
MD5ed98b221421bc57aa6ccdad7ca8a9761
SHA165dc8e48f71c99b2247630432c99f4069c156ed1
SHA256b71652195d1d337f163b0ff4ea3539d7826d2f541fe025c4fbdb3ab47e26db7d
SHA5123cf6929e3bc7088005a95d20f552c294f26078a72a46b55b6fcadcabae48db658d263fd7318534f1c9ad7dea77d280f736641cbbfc83690e1fd1b78a9bdacde1
-
Filesize
10KB
MD51726416850d3bba46eeb804fae57083d
SHA17e7957d7e7fd7c27b9fb903a0828b09cbb44c196
SHA256c207a7a561ab726fb272b5abd99c4da8e927b5da788210d5dd186023c2783990
SHA5127747e5c6bd77a43ee958cb7b533a73757e8bfb7b3706af4eb7ec9a99458720f89cd30bb23b4cb069826dc36a6ce737424ad0007307be67a7391591f6c936df27
-
Filesize
1KB
MD5e3fb35af0d1f9f1fa72e5bcb08875a96
SHA1d988cfc36c5e1c53051f736f449cabda80ef7df3
SHA25658ced893df9c0281ed99accde1ee33e7a257412991bb2d23d8ee5db25bd72f38
SHA512d9f67f20c7899a341736a7bb69dc82a84e430432b9e82955ad25bc75f2aaf8b46d1b4401ada4dd2f27cbcb79f6a860a4baa4f498e97a858e4ebe8a5ad9d0b1fa