Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe
Resource
win10v2004-20240802-en
General
-
Target
a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe
-
Size
16.4MB
-
MD5
d2901c7724d3a55d168f10f21b9e7393
-
SHA1
7a780a33918daa7989a6b33024631fe731fddd1c
-
SHA256
a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea
-
SHA512
34faff002ea35ae1a03a05b2b8910c7b650b1de5c41171aa1e872e6009aca77896b679370146cfc2bed16778c5518276115d3e7ac44c37eba852d5cf66f9db8a
-
SSDEEP
393216:x6uxKLdKWjA+c9xRdmrE5jnzjQxhYdBz14c4ReeZHgcRK+:Pf1Rdm45jnzUxKD16wibU+
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3164 powershell.exe 1564 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe File created C:\Windows\system32\drivers\etc\hosts WindowsAutHost -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Executes dropped EXE 1 IoCs
pid Process 924 WindowsAutHost -
Indicator Removal: Clear Windows Event Logs 1 TTPs 3 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3144 powercfg.exe 3428 powercfg.exe 3224 powercfg.exe 3348 powercfg.exe 3304 powercfg.exe 716 powercfg.exe 1096 powercfg.exe 2444 powercfg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe WindowsAutHost File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 924 WindowsAutHost 924 WindowsAutHost -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3220 set thread context of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 924 set thread context of 4676 924 WindowsAutHost 138 PID 924 set thread context of 1896 924 WindowsAutHost 142 PID 924 set thread context of 3232 924 WindowsAutHost 144 -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2796 sc.exe 3724 sc.exe 2704 sc.exe 3916 sc.exe 3968 sc.exe 3528 sc.exe 1872 sc.exe 4504 sc.exe 64 sc.exe 1912 sc.exe 4268 sc.exe 3656 sc.exe 2020 sc.exe 1924 sc.exe -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1722910323" OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={CF844034-4BDC-43D8-B9DB-CA578B702315}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Tue, 06 Aug 2024 02:12:04 GMT" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3164 powershell.exe 3164 powershell.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 924 WindowsAutHost 924 WindowsAutHost 924 WindowsAutHost 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 1564 powershell.exe 4812 dialer.exe 4812 dialer.exe 1564 powershell.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe 4812 dialer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3164 powershell.exe Token: SeDebugPrivilege 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe Token: SeDebugPrivilege 4812 dialer.exe Token: SeShutdownPrivilege 3348 powercfg.exe Token: SeCreatePagefilePrivilege 3348 powercfg.exe Token: SeShutdownPrivilege 3224 powercfg.exe Token: SeCreatePagefilePrivilege 3224 powercfg.exe Token: SeShutdownPrivilege 716 powercfg.exe Token: SeCreatePagefilePrivilege 716 powercfg.exe Token: SeShutdownPrivilege 3304 powercfg.exe Token: SeCreatePagefilePrivilege 3304 powercfg.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 924 WindowsAutHost Token: SeDebugPrivilege 4676 dialer.exe Token: SeShutdownPrivilege 2444 powercfg.exe Token: SeCreatePagefilePrivilege 2444 powercfg.exe Token: SeShutdownPrivilege 3144 powercfg.exe Token: SeCreatePagefilePrivilege 3144 powercfg.exe Token: SeShutdownPrivilege 3428 powercfg.exe Token: SeCreatePagefilePrivilege 3428 powercfg.exe Token: SeShutdownPrivilege 1096 powercfg.exe Token: SeCreatePagefilePrivilege 1096 powercfg.exe Token: SeLockMemoryPrivilege 3232 dialer.exe Token: SeAssignPrimaryTokenPrivilege 1784 svchost.exe Token: SeIncreaseQuotaPrivilege 1784 svchost.exe Token: SeSecurityPrivilege 1784 svchost.exe Token: SeTakeOwnershipPrivilege 1784 svchost.exe Token: SeLoadDriverPrivilege 1784 svchost.exe Token: SeSystemtimePrivilege 1784 svchost.exe Token: SeBackupPrivilege 1784 svchost.exe Token: SeRestorePrivilege 1784 svchost.exe Token: SeShutdownPrivilege 1784 svchost.exe Token: SeSystemEnvironmentPrivilege 1784 svchost.exe Token: SeUndockPrivilege 1784 svchost.exe Token: SeManageVolumePrivilege 1784 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1784 svchost.exe Token: SeIncreaseQuotaPrivilege 1784 svchost.exe Token: SeSecurityPrivilege 1784 svchost.exe Token: SeTakeOwnershipPrivilege 1784 svchost.exe Token: SeLoadDriverPrivilege 1784 svchost.exe Token: SeSystemtimePrivilege 1784 svchost.exe Token: SeBackupPrivilege 1784 svchost.exe Token: SeRestorePrivilege 1784 svchost.exe Token: SeShutdownPrivilege 1784 svchost.exe Token: SeSystemEnvironmentPrivilege 1784 svchost.exe Token: SeUndockPrivilege 1784 svchost.exe Token: SeManageVolumePrivilege 1784 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1784 svchost.exe Token: SeIncreaseQuotaPrivilege 1784 svchost.exe Token: SeSecurityPrivilege 1784 svchost.exe Token: SeTakeOwnershipPrivilege 1784 svchost.exe Token: SeLoadDriverPrivilege 1784 svchost.exe Token: SeSystemtimePrivilege 1784 svchost.exe Token: SeBackupPrivilege 1784 svchost.exe Token: SeRestorePrivilege 1784 svchost.exe Token: SeShutdownPrivilege 1784 svchost.exe Token: SeSystemEnvironmentPrivilege 1784 svchost.exe Token: SeUndockPrivilege 1784 svchost.exe Token: SeManageVolumePrivilege 1784 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1784 svchost.exe Token: SeIncreaseQuotaPrivilege 1784 svchost.exe Token: SeSecurityPrivilege 1784 svchost.exe Token: SeTakeOwnershipPrivilege 1784 svchost.exe Token: SeLoadDriverPrivilege 1784 svchost.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3444 Explorer.EXE 3976 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3244 4060 cmd.exe 93 PID 4060 wrote to memory of 3244 4060 cmd.exe 93 PID 3220 wrote to memory of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 3220 wrote to memory of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 3220 wrote to memory of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 3220 wrote to memory of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 3220 wrote to memory of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 3220 wrote to memory of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 3220 wrote to memory of 4812 3220 a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe 107 PID 4812 wrote to memory of 612 4812 dialer.exe 5 PID 4812 wrote to memory of 672 4812 dialer.exe 7 PID 4812 wrote to memory of 964 4812 dialer.exe 12 PID 4812 wrote to memory of 60 4812 dialer.exe 13 PID 4812 wrote to memory of 736 4812 dialer.exe 14 PID 672 wrote to memory of 2812 672 lsass.exe 49 PID 4812 wrote to memory of 1040 4812 dialer.exe 15 PID 4812 wrote to memory of 1136 4812 dialer.exe 17 PID 4812 wrote to memory of 1144 4812 dialer.exe 18 PID 4812 wrote to memory of 1152 4812 dialer.exe 19 PID 4812 wrote to memory of 1180 4812 dialer.exe 20 PID 4812 wrote to memory of 1268 4812 dialer.exe 21 PID 4812 wrote to memory of 1296 4812 dialer.exe 22 PID 4812 wrote to memory of 1368 4812 dialer.exe 23 PID 4812 wrote to memory of 1376 4812 dialer.exe 24 PID 4812 wrote to memory of 1440 4812 dialer.exe 25 PID 4812 wrote to memory of 1576 4812 dialer.exe 26 PID 4812 wrote to memory of 1584 4812 dialer.exe 27 PID 4812 wrote to memory of 1620 4812 dialer.exe 28 PID 4812 wrote to memory of 1732 4812 dialer.exe 29 PID 4812 wrote to memory of 1764 4812 dialer.exe 30 PID 4812 wrote to memory of 1804 4812 dialer.exe 31 PID 4812 wrote to memory of 1900 4812 dialer.exe 32 PID 4812 wrote to memory of 1976 4812 dialer.exe 33 PID 4812 wrote to memory of 1984 4812 dialer.exe 34 PID 4812 wrote to memory of 1004 4812 dialer.exe 35 PID 4812 wrote to memory of 1700 4812 dialer.exe 36 PID 4812 wrote to memory of 1784 4812 dialer.exe 37 PID 4812 wrote to memory of 2124 4812 dialer.exe 38 PID 4812 wrote to memory of 2236 4812 dialer.exe 40 PID 4812 wrote to memory of 2368 4812 dialer.exe 41 PID 4812 wrote to memory of 2488 4812 dialer.exe 42 PID 4812 wrote to memory of 2496 4812 dialer.exe 43 PID 4812 wrote to memory of 2660 4812 dialer.exe 44 PID 4812 wrote to memory of 2676 4812 dialer.exe 45 PID 4812 wrote to memory of 2724 4812 dialer.exe 46 PID 4812 wrote to memory of 2744 4812 dialer.exe 47 PID 4812 wrote to memory of 2752 4812 dialer.exe 48 PID 4812 wrote to memory of 2812 4812 dialer.exe 49 PID 4812 wrote to memory of 2828 4812 dialer.exe 50 PID 4812 wrote to memory of 2848 4812 dialer.exe 51 PID 4812 wrote to memory of 2992 4812 dialer.exe 52 PID 4812 wrote to memory of 3104 4812 dialer.exe 53 PID 4812 wrote to memory of 3444 4812 dialer.exe 55 PID 4812 wrote to memory of 3468 4812 dialer.exe 56 PID 4812 wrote to memory of 3612 4812 dialer.exe 57 PID 4812 wrote to memory of 3812 4812 dialer.exe 58 PID 4812 wrote to memory of 3976 4812 dialer.exe 60 PID 4812 wrote to memory of 3496 4812 dialer.exe 62 PID 4812 wrote to memory of 4448 4812 dialer.exe 65 PID 4812 wrote to memory of 4968 4812 dialer.exe 66 PID 4812 wrote to memory of 2340 4812 dialer.exe 68 PID 4812 wrote to memory of 3820 4812 dialer.exe 69 PID 4812 wrote to memory of 1820 4812 dialer.exe 70 PID 4812 wrote to memory of 3944 4812 dialer.exe 71
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1136
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1180
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1440
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2660
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1584
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1620
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1900
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2236
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2752
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2992
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3104
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe"C:\Users\Admin\AppData\Local\Temp\a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea.exe"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:3244
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:3656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3916
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:3968
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:3528
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WindowsAutHost"3⤵
- Launches sc.exe
PID:64
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WindowsAutHost" binpath= "C:\ProgramData\WindowsServices\WindowsAutHost" start= "auto"3⤵
- Launches sc.exe
PID:1872
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1924
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WindowsAutHost"3⤵
- Launches sc.exe
PID:2796 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2820
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3612
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3812
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4448
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:3820
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1820
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3944
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1776
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4940
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3624
-
C:\ProgramData\WindowsServices\WindowsAutHostC:\ProgramData\WindowsServices\WindowsAutHost1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1964
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4820
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4268
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3724
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2704 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4424
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:1912
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2272
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3116
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3144 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3412
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1572
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:1896
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.4MB
MD5d2901c7724d3a55d168f10f21b9e7393
SHA17a780a33918daa7989a6b33024631fe731fddd1c
SHA256a7d7270ccee9ee5ed6645fb48ba499041d9a59d25e60040f06125e727338a9ea
SHA51234faff002ea35ae1a03a05b2b8910c7b650b1de5c41171aa1e872e6009aca77896b679370146cfc2bed16778c5518276115d3e7ac44c37eba852d5cf66f9db8a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD58ec9b858770ae71075f06a8ebc30210f
SHA1e54f2d1bb0b25b5c59c2eb26a55ac9a1d09a1d08
SHA2567c5a5eb9142e4cd3bbfbd9b9ed482c5a2471c3014f2449138783fe2b92f62339
SHA512abef1fb612996bb1c5d59f55b6163cc481c3f0cdb260946762d6829ee3ab4b4ee8829b511e0462b168ebac039d055440547804e560aec8699820a85cdadff553