Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    25s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 22:40

Errors

Reason
Machine shutdown

General

  • Target

    acdf00bc189999d54270c64f59f7ad8d_JaffaCakes118.exe

  • Size

    665KB

  • MD5

    acdf00bc189999d54270c64f59f7ad8d

  • SHA1

    5fda8ba8ae40bd3c7711ff7eba54b1a780f83f3c

  • SHA256

    f1ec5fe994afb650c98ea558f8260df110ce938423da0a1be5b1f84359c13ee6

  • SHA512

    bd104ae410ae7504a19f88ca9ebbcee0c1e7310630f46a07f5f592f5055e6b46477ff53e3ad3f0a8a04f2cbd02014665fa352499edd69468d91371b47e229def

  • SSDEEP

    12288:k1MX89GjRX3rtCqHTNSXoSmDV7QFfb1On4xLIuWV355FXw/+e4wCu+2GV35MwH:6Ms9mRXbnNS/IuWV355FXw/+e4wCu+2W

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Possible privilege escalation attempt 57 IoCs
  • Modifies file permissions 1 TTPs 57 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\acdf00bc189999d54270c64f59f7ad8d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\acdf00bc189999d54270c64f59f7ad8d_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\system32\cmd.exe
      cmd.exe /A /C "ren %SystemRoot%\system32\slmgr.vbs.removewat slmgr.vbs 2>NUL>NUL"
      2⤵
        PID:2884
      • C:\Windows\system32\cmd.exe
        cmd.exe /A /C "ren %SystemRoot%\SysWOW64\slmgr.vbs.removewat slmgr.vbs 2>NUL>NUL"
        2⤵
          PID:3056
        • C:\Windows\system32\cmd.exe
          cmd.exe /A /C "cscript.exe //nologo %SystemRoot%\SysWOW64\slmgr.vbs -rilc 2>NUL>NUL"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\system32\cscript.exe
            cscript.exe //nologo C:\Windows\SysWOW64\slmgr.vbs -rilc
            3⤵
              PID:1912
          • C:\Windows\system32\cmd.exe
            cmd.exe /A /C "net stop sppsvc 2>NUL>NUL"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2128
            • C:\Windows\system32\net.exe
              net stop sppsvc
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2892
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop sppsvc
                4⤵
                  PID:2640
            • C:\Windows\system32\cmd.exe
              cmd.exe /A /C "net stop sppuinotify 2>NUL>NUL"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2700
              • C:\Windows\system32\net.exe
                net stop sppuinotify
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2548
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop sppuinotify
                  4⤵
                    PID:2552
              • C:\Windows\system32\cmd.exe
                cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\slmgr.vbs"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2704
                • C:\Windows\system32\takeown.exe
                  takeown /f C:\Windows\SysWOW64\slmgr.vbs
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2688
              • C:\Windows\system32\cmd.exe
                cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\slmgr.vbs /grant *S-1-1-0:F"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2572
                • C:\Windows\system32\icacls.exe
                  icacls C:\Windows\SysWOW64\slmgr.vbs /grant *S-1-1-0:F
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:2720
              • C:\Windows\system32\cmd.exe
                cmd.exe /A /C "ren %SystemRoot%\SysWOW64\slmgr.vbs slmgr.vbs.oxvac"
                2⤵
                  PID:2580
                • C:\Windows\system32\cmd.exe
                  cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\user32.dll"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2528
                  • C:\Windows\system32\takeown.exe
                    takeown /f C:\Windows\SysWOW64\user32.dll
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2536
                • C:\Windows\system32\cmd.exe
                  cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\user32.dll /grant *S-1-1-0:F"
                  2⤵
                    PID:2556
                    • C:\Windows\system32\icacls.exe
                      icacls C:\Windows\SysWOW64\user32.dll /grant *S-1-1-0:F
                      3⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:2588
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /A /C "ren %SystemRoot%\SysWOW64\user32.dll user32.dll.oxvac"
                    2⤵
                      PID:2644
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\slwga.dll"
                      2⤵
                        PID:1592
                        • C:\Windows\system32\takeown.exe
                          takeown /f C:\Windows\SysWOW64\slwga.dll
                          3⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2996
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\slwga.dll /grant *S-1-1-0:F"
                        2⤵
                          PID:1988
                          • C:\Windows\system32\icacls.exe
                            icacls C:\Windows\SysWOW64\slwga.dll /grant *S-1-1-0:F
                            3⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:2184
                        • C:\Windows\system32\cmd.exe
                          cmd.exe /A /C "ren %SystemRoot%\SysWOW64\slwga.dll slwga.dll.oxvac"
                          2⤵
                            PID:500
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\sppcomapi.dll"
                            2⤵
                              PID:3012
                              • C:\Windows\system32\takeown.exe
                                takeown /f C:\Windows\SysWOW64\sppcomapi.dll
                                3⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1360
                            • C:\Windows\system32\cmd.exe
                              cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\sppcomapi.dll /grant *S-1-1-0:F"
                              2⤵
                                PID:1500
                                • C:\Windows\system32\icacls.exe
                                  icacls C:\Windows\SysWOW64\sppcomapi.dll /grant *S-1-1-0:F
                                  3⤵
                                  • Possible privilege escalation attempt
                                  • Modifies file permissions
                                  PID:588
                              • C:\Windows\system32\cmd.exe
                                cmd.exe /A /C "ren %SystemRoot%\SysWOW64\sppcomapi.dll sppcomapi.dll.oxvac"
                                2⤵
                                  PID:2756
                                • C:\Windows\system32\cmd.exe
                                  cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\sppcommdlg.dll"
                                  2⤵
                                    PID:1764
                                    • C:\Windows\system32\takeown.exe
                                      takeown /f C:\Windows\SysWOW64\sppcommdlg.dll
                                      3⤵
                                      • Possible privilege escalation attempt
                                      • Modifies file permissions
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1740
                                  • C:\Windows\system32\cmd.exe
                                    cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\sppcommdlg.dll /grant *S-1-1-0:F"
                                    2⤵
                                      PID:2848
                                      • C:\Windows\system32\icacls.exe
                                        icacls C:\Windows\SysWOW64\sppcommdlg.dll /grant *S-1-1-0:F
                                        3⤵
                                        • Possible privilege escalation attempt
                                        • Modifies file permissions
                                        PID:2592
                                    • C:\Windows\system32\cmd.exe
                                      cmd.exe /A /C "ren %SystemRoot%\SysWOW64\sppcommdlg.dll sppcommdlg.dll.oxvac"
                                      2⤵
                                        PID:2868
                                      • C:\Windows\system32\cmd.exe
                                        cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\sppuinotify.dll"
                                        2⤵
                                          PID:2964
                                          • C:\Windows\system32\takeown.exe
                                            takeown /f C:\Windows\SysWOW64\sppuinotify.dll
                                            3⤵
                                            • Possible privilege escalation attempt
                                            • Modifies file permissions
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2764
                                        • C:\Windows\system32\cmd.exe
                                          cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\sppuinotify.dll /grant *S-1-1-0:F"
                                          2⤵
                                            PID:488
                                            • C:\Windows\system32\icacls.exe
                                              icacls C:\Windows\SysWOW64\sppuinotify.dll /grant *S-1-1-0:F
                                              3⤵
                                              • Possible privilege escalation attempt
                                              • Modifies file permissions
                                              PID:2584
                                          • C:\Windows\system32\cmd.exe
                                            cmd.exe /A /C "ren %SystemRoot%\SysWOW64\sppuinotify.dll sppuinotify.dll.oxvac"
                                            2⤵
                                              PID:2800
                                            • C:\Windows\system32\cmd.exe
                                              cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\sppwmi.dll"
                                              2⤵
                                                PID:2624
                                                • C:\Windows\system32\takeown.exe
                                                  takeown /f C:\Windows\SysWOW64\sppwmi.dll
                                                  3⤵
                                                  • Possible privilege escalation attempt
                                                  • Modifies file permissions
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2712
                                              • C:\Windows\system32\cmd.exe
                                                cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\sppwmi.dll /grant *S-1-1-0:F"
                                                2⤵
                                                  PID:2340
                                                  • C:\Windows\system32\icacls.exe
                                                    icacls C:\Windows\SysWOW64\sppwmi.dll /grant *S-1-1-0:F
                                                    3⤵
                                                    • Possible privilege escalation attempt
                                                    • Modifies file permissions
                                                    PID:2412
                                                • C:\Windows\system32\cmd.exe
                                                  cmd.exe /A /C "ren %SystemRoot%\SysWOW64\sppwmi.dll sppwmi.dll.oxvac"
                                                  2⤵
                                                    PID:1136
                                                  • C:\Windows\system32\cmd.exe
                                                    cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\systemcpl.dll"
                                                    2⤵
                                                      PID:1408
                                                      • C:\Windows\system32\takeown.exe
                                                        takeown /f C:\Windows\SysWOW64\systemcpl.dll
                                                        3⤵
                                                        • Possible privilege escalation attempt
                                                        • Modifies file permissions
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2424
                                                    • C:\Windows\system32\cmd.exe
                                                      cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\systemcpl.dll /grant *S-1-1-0:F"
                                                      2⤵
                                                        PID:2040
                                                        • C:\Windows\system32\icacls.exe
                                                          icacls C:\Windows\SysWOW64\systemcpl.dll /grant *S-1-1-0:F
                                                          3⤵
                                                          • Possible privilege escalation attempt
                                                          • Modifies file permissions
                                                          PID:2968
                                                      • C:\Windows\system32\cmd.exe
                                                        cmd.exe /A /C "ren %SystemRoot%\SysWOW64\systemcpl.dll systemcpl.dll.oxvac"
                                                        2⤵
                                                          PID:2876
                                                        • C:\Windows\system32\cmd.exe
                                                          cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\winlogon.exe"
                                                          2⤵
                                                            PID:2984
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f C:\Windows\SysWOW64\winlogon.exe
                                                              3⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1080
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\winlogon.exe /grant *S-1-1-0:F"
                                                            2⤵
                                                              PID:992
                                                              • C:\Windows\system32\icacls.exe
                                                                icacls C:\Windows\SysWOW64\winlogon.exe /grant *S-1-1-0:F
                                                                3⤵
                                                                • Possible privilege escalation attempt
                                                                • Modifies file permissions
                                                                PID:1980
                                                            • C:\Windows\system32\cmd.exe
                                                              cmd.exe /A /C "ren %SystemRoot%\SysWOW64\winlogon.exe winlogon.exe.oxvac"
                                                              2⤵
                                                                PID:760
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\winver.exe"
                                                                2⤵
                                                                  PID:540
                                                                  • C:\Windows\system32\takeown.exe
                                                                    takeown /f C:\Windows\SysWOW64\winver.exe
                                                                    3⤵
                                                                    • Possible privilege escalation attempt
                                                                    • Modifies file permissions
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2216
                                                                • C:\Windows\system32\cmd.exe
                                                                  cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\winver.exe /grant *S-1-1-0:F"
                                                                  2⤵
                                                                    PID:320
                                                                    • C:\Windows\system32\icacls.exe
                                                                      icacls C:\Windows\SysWOW64\winver.exe /grant *S-1-1-0:F
                                                                      3⤵
                                                                      • Possible privilege escalation attempt
                                                                      • Modifies file permissions
                                                                      PID:328
                                                                  • C:\Windows\system32\cmd.exe
                                                                    cmd.exe /A /C "ren %SystemRoot%\SysWOW64\winver.exe winver.exe.oxvac"
                                                                    2⤵
                                                                      PID:1156
                                                                    • C:\Windows\system32\cmd.exe
                                                                      cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\slui.exe"
                                                                      2⤵
                                                                        PID:1728
                                                                        • C:\Windows\system32\takeown.exe
                                                                          takeown /f C:\Windows\SysWOW64\slui.exe
                                                                          3⤵
                                                                          • Possible privilege escalation attempt
                                                                          • Modifies file permissions
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2492
                                                                      • C:\Windows\system32\cmd.exe
                                                                        cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\slui.exe /grant *S-1-1-0:F"
                                                                        2⤵
                                                                          PID:2112
                                                                          • C:\Windows\system32\icacls.exe
                                                                            icacls C:\Windows\SysWOW64\slui.exe /grant *S-1-1-0:F
                                                                            3⤵
                                                                            • Possible privilege escalation attempt
                                                                            • Modifies file permissions
                                                                            PID:2104
                                                                        • C:\Windows\system32\cmd.exe
                                                                          cmd.exe /A /C "ren %SystemRoot%\SysWOW64\slui.exe slui.exe.oxvac"
                                                                          2⤵
                                                                            PID:2096
                                                                          • C:\Windows\system32\cmd.exe
                                                                            cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\ntkrnlpa.exe"
                                                                            2⤵
                                                                              PID:1388
                                                                              • C:\Windows\system32\takeown.exe
                                                                                takeown /f C:\Windows\SysWOW64\ntkrnlpa.exe
                                                                                3⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:952
                                                                            • C:\Windows\system32\cmd.exe
                                                                              cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\ntkrnlpa.exe /grant *S-1-1-0:F"
                                                                              2⤵
                                                                                PID:2068
                                                                                • C:\Windows\system32\icacls.exe
                                                                                  icacls C:\Windows\SysWOW64\ntkrnlpa.exe /grant *S-1-1-0:F
                                                                                  3⤵
                                                                                  • Possible privilege escalation attempt
                                                                                  • Modifies file permissions
                                                                                  PID:2300
                                                                              • C:\Windows\system32\cmd.exe
                                                                                cmd.exe /A /C "ren %SystemRoot%\SysWOW64\ntkrnlpa.exe ntkrnlpa.exe.oxvac"
                                                                                2⤵
                                                                                  PID:2156
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\ntoskrnl.exe"
                                                                                  2⤵
                                                                                    PID:2508
                                                                                    • C:\Windows\system32\takeown.exe
                                                                                      takeown /f C:\Windows\SysWOW64\ntoskrnl.exe
                                                                                      3⤵
                                                                                      • Possible privilege escalation attempt
                                                                                      • Modifies file permissions
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1884
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\ntoskrnl.exe /grant *S-1-1-0:F"
                                                                                    2⤵
                                                                                      PID:1116
                                                                                      • C:\Windows\system32\icacls.exe
                                                                                        icacls C:\Windows\SysWOW64\ntoskrnl.exe /grant *S-1-1-0:F
                                                                                        3⤵
                                                                                        • Possible privilege escalation attempt
                                                                                        • Modifies file permissions
                                                                                        PID:2280
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      cmd.exe /A /C "ren %SystemRoot%\SysWOW64\ntoskrnl.exe ntoskrnl.exe.oxvac"
                                                                                      2⤵
                                                                                        PID:1888
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        cmd.exe /A /C "takeown /f %SystemRoot%\SysWOW64\Wat\*"
                                                                                        2⤵
                                                                                          PID:2144
                                                                                          • C:\Windows\system32\takeown.exe
                                                                                            takeown /f C:\Windows\SysWOW64\Wat\*
                                                                                            3⤵
                                                                                            • Possible privilege escalation attempt
                                                                                            • Modifies file permissions
                                                                                            PID:672
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          cmd.exe /A /C "icacls %SystemRoot%\SysWOW64\Wat\* /grant *S-1-1-0:F"
                                                                                          2⤵
                                                                                            PID:872
                                                                                            • C:\Windows\system32\icacls.exe
                                                                                              icacls C:\Windows\SysWOW64\Wat\* /grant *S-1-1-0:F
                                                                                              3⤵
                                                                                              • Possible privilege escalation attempt
                                                                                              • Modifies file permissions
                                                                                              PID:2988
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            cmd.exe /A /C "takeown /f %SystemRoot%\system32\slmgr.vbs"
                                                                                            2⤵
                                                                                              PID:2856
                                                                                              • C:\Windows\system32\takeown.exe
                                                                                                takeown /f C:\Windows\system32\slmgr.vbs
                                                                                                3⤵
                                                                                                • Possible privilege escalation attempt
                                                                                                • Modifies file permissions
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1644
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              cmd.exe /A /C "icacls %SystemRoot%\system32\slmgr.vbs /grant *S-1-1-0:F"
                                                                                              2⤵
                                                                                                PID:444
                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                  icacls C:\Windows\system32\slmgr.vbs /grant *S-1-1-0:F
                                                                                                  3⤵
                                                                                                  • Possible privilege escalation attempt
                                                                                                  • Modifies file permissions
                                                                                                  PID:1112
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                cmd.exe /A /C "ren %SystemRoot%\system32\slmgr.vbs slmgr.vbs.oxvac"
                                                                                                2⤵
                                                                                                  PID:2948
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  cmd.exe /A /C "takeown /f %SystemRoot%\system32\user32.dll"
                                                                                                  2⤵
                                                                                                    PID:2028
                                                                                                    • C:\Windows\system32\takeown.exe
                                                                                                      takeown /f C:\Windows\system32\user32.dll
                                                                                                      3⤵
                                                                                                      • Possible privilege escalation attempt
                                                                                                      • Modifies file permissions
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2420
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    cmd.exe /A /C "icacls %SystemRoot%\system32\user32.dll /grant *S-1-1-0:F"
                                                                                                    2⤵
                                                                                                      PID:1260
                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                        icacls C:\Windows\system32\user32.dll /grant *S-1-1-0:F
                                                                                                        3⤵
                                                                                                        • Possible privilege escalation attempt
                                                                                                        • Modifies file permissions
                                                                                                        PID:1540
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      cmd.exe /A /C "ren %SystemRoot%\system32\user32.dll user32.dll.oxvac"
                                                                                                      2⤵
                                                                                                        PID:2344
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        cmd.exe /A /C "takeown /f %SystemRoot%\system32\slwga.dll"
                                                                                                        2⤵
                                                                                                          PID:1108
                                                                                                          • C:\Windows\system32\takeown.exe
                                                                                                            takeown /f C:\Windows\system32\slwga.dll
                                                                                                            3⤵
                                                                                                            • Possible privilege escalation attempt
                                                                                                            • Modifies file permissions
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:900
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          cmd.exe /A /C "icacls %SystemRoot%\system32\slwga.dll /grant *S-1-1-0:F"
                                                                                                          2⤵
                                                                                                            PID:1668
                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                              icacls C:\Windows\system32\slwga.dll /grant *S-1-1-0:F
                                                                                                              3⤵
                                                                                                              • Possible privilege escalation attempt
                                                                                                              • Modifies file permissions
                                                                                                              PID:608
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            cmd.exe /A /C "ren %SystemRoot%\system32\slwga.dll slwga.dll.oxvac"
                                                                                                            2⤵
                                                                                                              PID:1848
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              cmd.exe /A /C "takeown /f %SystemRoot%\system32\sppcomapi.dll"
                                                                                                              2⤵
                                                                                                                PID:1508
                                                                                                                • C:\Windows\system32\takeown.exe
                                                                                                                  takeown /f C:\Windows\system32\sppcomapi.dll
                                                                                                                  3⤵
                                                                                                                  • Possible privilege escalation attempt
                                                                                                                  • Modifies file permissions
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1464
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                cmd.exe /A /C "icacls %SystemRoot%\system32\sppcomapi.dll /grant *S-1-1-0:F"
                                                                                                                2⤵
                                                                                                                  PID:1460
                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                    icacls C:\Windows\system32\sppcomapi.dll /grant *S-1-1-0:F
                                                                                                                    3⤵
                                                                                                                    • Possible privilege escalation attempt
                                                                                                                    • Modifies file permissions
                                                                                                                    PID:740
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  cmd.exe /A /C "ren %SystemRoot%\system32\sppcomapi.dll sppcomapi.dll.oxvac"
                                                                                                                  2⤵
                                                                                                                    PID:2024
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    cmd.exe /A /C "takeown /f %SystemRoot%\system32\sppcommdlg.dll"
                                                                                                                    2⤵
                                                                                                                      PID:2060
                                                                                                                      • C:\Windows\system32\takeown.exe
                                                                                                                        takeown /f C:\Windows\system32\sppcommdlg.dll
                                                                                                                        3⤵
                                                                                                                        • Possible privilege escalation attempt
                                                                                                                        • Modifies file permissions
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1048
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      cmd.exe /A /C "icacls %SystemRoot%\system32\sppcommdlg.dll /grant *S-1-1-0:F"
                                                                                                                      2⤵
                                                                                                                        PID:1976
                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                          icacls C:\Windows\system32\sppcommdlg.dll /grant *S-1-1-0:F
                                                                                                                          3⤵
                                                                                                                          • Possible privilege escalation attempt
                                                                                                                          • Modifies file permissions
                                                                                                                          PID:2116
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        cmd.exe /A /C "ren %SystemRoot%\system32\sppcommdlg.dll sppcommdlg.dll.oxvac"
                                                                                                                        2⤵
                                                                                                                          PID:2392
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          cmd.exe /A /C "takeown /f %SystemRoot%\system32\sppuinotify.dll"
                                                                                                                          2⤵
                                                                                                                            PID:2440
                                                                                                                            • C:\Windows\system32\takeown.exe
                                                                                                                              takeown /f C:\Windows\system32\sppuinotify.dll
                                                                                                                              3⤵
                                                                                                                              • Possible privilege escalation attempt
                                                                                                                              • Modifies file permissions
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:2332
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            cmd.exe /A /C "icacls %SystemRoot%\system32\sppuinotify.dll /grant *S-1-1-0:F"
                                                                                                                            2⤵
                                                                                                                              PID:2364
                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                icacls C:\Windows\system32\sppuinotify.dll /grant *S-1-1-0:F
                                                                                                                                3⤵
                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                • Modifies file permissions
                                                                                                                                PID:1468
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              cmd.exe /A /C "ren %SystemRoot%\system32\sppuinotify.dll sppuinotify.dll.oxvac"
                                                                                                                              2⤵
                                                                                                                                PID:1852
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                cmd.exe /A /C "takeown /f %SystemRoot%\system32\sppwmi.dll"
                                                                                                                                2⤵
                                                                                                                                  PID:1652
                                                                                                                                  • C:\Windows\system32\takeown.exe
                                                                                                                                    takeown /f C:\Windows\system32\sppwmi.dll
                                                                                                                                    3⤵
                                                                                                                                    • Possible privilege escalation attempt
                                                                                                                                    • Modifies file permissions
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:1676
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  cmd.exe /A /C "icacls %SystemRoot%\system32\sppwmi.dll /grant *S-1-1-0:F"
                                                                                                                                  2⤵
                                                                                                                                    PID:988
                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                      icacls C:\Windows\system32\sppwmi.dll /grant *S-1-1-0:F
                                                                                                                                      3⤵
                                                                                                                                      • Possible privilege escalation attempt
                                                                                                                                      • Modifies file permissions
                                                                                                                                      PID:1640
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    cmd.exe /A /C "ren %SystemRoot%\system32\sppwmi.dll sppwmi.dll.oxvac"
                                                                                                                                    2⤵
                                                                                                                                      PID:1480
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      cmd.exe /A /C "takeown /f %SystemRoot%\system32\systemcpl.dll"
                                                                                                                                      2⤵
                                                                                                                                        PID:1968
                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                          takeown /f C:\Windows\system32\systemcpl.dll
                                                                                                                                          3⤵
                                                                                                                                          • Possible privilege escalation attempt
                                                                                                                                          • Modifies file permissions
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:1000
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        cmd.exe /A /C "icacls %SystemRoot%\system32\systemcpl.dll /grant *S-1-1-0:F"
                                                                                                                                        2⤵
                                                                                                                                          PID:1788
                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                            icacls C:\Windows\system32\systemcpl.dll /grant *S-1-1-0:F
                                                                                                                                            3⤵
                                                                                                                                            • Possible privilege escalation attempt
                                                                                                                                            • Modifies file permissions
                                                                                                                                            PID:1580
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          cmd.exe /A /C "ren %SystemRoot%\system32\systemcpl.dll systemcpl.dll.oxvac"
                                                                                                                                          2⤵
                                                                                                                                            PID:2220
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            cmd.exe /A /C "takeown /f %SystemRoot%\system32\winlogon.exe"
                                                                                                                                            2⤵
                                                                                                                                              PID:1708
                                                                                                                                              • C:\Windows\system32\takeown.exe
                                                                                                                                                takeown /f C:\Windows\system32\winlogon.exe
                                                                                                                                                3⤵
                                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                                • Modifies file permissions
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:2396
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              cmd.exe /A /C "icacls %SystemRoot%\system32\winlogon.exe /grant *S-1-1-0:F"
                                                                                                                                              2⤵
                                                                                                                                                PID:896
                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                  icacls C:\Windows\system32\winlogon.exe /grant *S-1-1-0:F
                                                                                                                                                  3⤵
                                                                                                                                                  • Possible privilege escalation attempt
                                                                                                                                                  • Modifies file permissions
                                                                                                                                                  PID:1944
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                cmd.exe /A /C "ren %SystemRoot%\system32\winlogon.exe winlogon.exe.oxvac"
                                                                                                                                                2⤵
                                                                                                                                                  PID:2196
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  cmd.exe /A /C "takeown /f %SystemRoot%\system32\winver.exe"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1524
                                                                                                                                                    • C:\Windows\system32\takeown.exe
                                                                                                                                                      takeown /f C:\Windows\system32\winver.exe
                                                                                                                                                      3⤵
                                                                                                                                                      • Possible privilege escalation attempt
                                                                                                                                                      • Modifies file permissions
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:2092
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    cmd.exe /A /C "icacls %SystemRoot%\system32\winver.exe /grant *S-1-1-0:F"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2940
                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                        icacls C:\Windows\system32\winver.exe /grant *S-1-1-0:F
                                                                                                                                                        3⤵
                                                                                                                                                        • Possible privilege escalation attempt
                                                                                                                                                        • Modifies file permissions
                                                                                                                                                        PID:616
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      cmd.exe /A /C "ren %SystemRoot%\system32\winver.exe winver.exe.oxvac"
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2080
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        cmd.exe /A /C "takeown /f %SystemRoot%\system32\slui.exe"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1784
                                                                                                                                                          • C:\Windows\system32\takeown.exe
                                                                                                                                                            takeown /f C:\Windows\system32\slui.exe
                                                                                                                                                            3⤵
                                                                                                                                                            • Possible privilege escalation attempt
                                                                                                                                                            • Modifies file permissions
                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                            PID:2772
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          cmd.exe /A /C "icacls %SystemRoot%\system32\slui.exe /grant *S-1-1-0:F"
                                                                                                                                                          2⤵
                                                                                                                                                            PID:2228
                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                              icacls C:\Windows\system32\slui.exe /grant *S-1-1-0:F
                                                                                                                                                              3⤵
                                                                                                                                                              • Possible privilege escalation attempt
                                                                                                                                                              • Modifies file permissions
                                                                                                                                                              PID:2532
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            cmd.exe /A /C "ren %SystemRoot%\system32\slui.exe slui.exe.oxvac"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:2632
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              cmd.exe /A /C "takeown /f %SystemRoot%\system32\ntkrnlpa.exe"
                                                                                                                                                              2⤵
                                                                                                                                                                PID:2188
                                                                                                                                                                • C:\Windows\system32\takeown.exe
                                                                                                                                                                  takeown /f C:\Windows\system32\ntkrnlpa.exe
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Possible privilege escalation attempt
                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                  PID:2616
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                cmd.exe /A /C "icacls %SystemRoot%\system32\ntkrnlpa.exe /grant *S-1-1-0:F"
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:2020
                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                    icacls C:\Windows\system32\ntkrnlpa.exe /grant *S-1-1-0:F
                                                                                                                                                                    3⤵
                                                                                                                                                                    • Possible privilege escalation attempt
                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                    PID:2780
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  cmd.exe /A /C "ren %SystemRoot%\system32\ntkrnlpa.exe ntkrnlpa.exe.oxvac"
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2812
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    cmd.exe /A /C "takeown /f %SystemRoot%\system32\ntoskrnl.exe"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2640
                                                                                                                                                                      • C:\Windows\system32\takeown.exe
                                                                                                                                                                        takeown /f C:\Windows\system32\ntoskrnl.exe
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Possible privilege escalation attempt
                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:2892
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      cmd.exe /A /C "icacls %SystemRoot%\system32\ntoskrnl.exe /grant *S-1-1-0:F"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:3024
                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                          icacls C:\Windows\system32\ntoskrnl.exe /grant *S-1-1-0:F
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Possible privilege escalation attempt
                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                          PID:2160
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        cmd.exe /A /C "ren %SystemRoot%\system32\ntoskrnl.exe ntoskrnl.exe.oxvac"
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2660
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          cmd.exe /A /C "takeown /f %SystemRoot%\system32\Wat\*"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:1548
                                                                                                                                                                            • C:\Windows\system32\takeown.exe
                                                                                                                                                                              takeown /f C:\Windows\system32\Wat\*
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Possible privilege escalation attempt
                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                              PID:2720
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            cmd.exe /A /C "icacls %SystemRoot%\system32\Wat\* /grant *S-1-1-0:F"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:2580
                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                icacls C:\Windows\system32\Wat\* /grant *S-1-1-0:F
                                                                                                                                                                                3⤵
                                                                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                PID:2544
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              cmd.exe /A /C "rmdir /s /q %ALLUSERSPROFILE%\Microsoft\Windows\RAI 2>NUL>NUL"
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:2600
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                cmd.exe /A /C "reg delete HKLM\SOFTWARE\HAL7600 /f 2>NUL>NUL"
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:2556
                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                    reg delete HKLM\SOFTWARE\HAL7600 /f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                    PID:2692
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  cmd.exe /A /C "schtasks.exe /delete /tn \Microsoft\Windows\RAI\RaiTask /f 2>NUL>NUL"
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:3004
                                                                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                      schtasks.exe /delete /tn \Microsoft\Windows\RAI\RaiTask /f
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:2996
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      cmd.exe /A /C "icacls %SystemRoot%\servicing\TrustedInstaller.exe /grant *S-1-1-0:F"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2184
                                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                                          icacls C:\Windows\servicing\TrustedInstaller.exe /grant *S-1-1-0:F
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • Possible privilege escalation attempt
                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                          PID:500
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        cmd.exe /A /C "bcdedit.exe -set testsigning off 2>NUL>NUL"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:3012
                                                                                                                                                                                          • C:\Windows\system32\bcdedit.exe
                                                                                                                                                                                            bcdedit.exe -set testsigning off
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • Modifies boot configuration data using bcdedit
                                                                                                                                                                                            PID:784
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          cmd.exe /A /C "sc config sppsvc start= delayed-auto 2>NUL>NUL"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:1500
                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                              sc config sppsvc start= delayed-auto
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                              PID:1612
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            cmd.exe /A /C "sc config sppuinotify start= demand 2>NUL>NUL"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:1060
                                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                                sc config sppuinotify start= demand
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                PID:1740
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              cmd.exe /A /C "net start sppsvc 2>NUL>NUL"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2828
                                                                                                                                                                                                • C:\Windows\system32\net.exe
                                                                                                                                                                                                  net start sppsvc
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:2852
                                                                                                                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                                                                                                                      C:\Windows\system32\net1 start sppsvc
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:2260
                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                    cmd.exe /A /C "net start sppuinotify 2>NUL>NUL"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:948
                                                                                                                                                                                                      • C:\Windows\system32\net.exe
                                                                                                                                                                                                        net start sppuinotify
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:1940
                                                                                                                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                                                                                                                            C:\Windows\system32\net1 start sppuinotify
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:2412
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          cmd.exe /A /C "NET START "Windows Modules Installer" 2>NUL>NUL"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:1408
                                                                                                                                                                                                            • C:\Windows\system32\net.exe
                                                                                                                                                                                                              NET START "Windows Modules Installer"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:2992
                                                                                                                                                                                                                • C:\Windows\system32\net1.exe
                                                                                                                                                                                                                  C:\Windows\system32\net1 START "Windows Modules Installer"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:2968
                                                                                                                                                                                                              • C:\Windows\System32\sfc.exe
                                                                                                                                                                                                                /scannow
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:2876
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  cmd.exe /A /C "shutdown -r -t 0"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:328
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\shutdown.exe
                                                                                                                                                                                                                    shutdown -r -t 0
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                    PID:320
                                                                                                                                                                                                              • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                                "LogonUI.exe" /flags:0x0
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:2192
                                                                                                                                                                                                                • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                                  "LogonUI.exe" /flags:0x1
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2416

                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                  • memory/896-45-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/900-19-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/988-37-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1000-39-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1048-27-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1108-20-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1460-25-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1464-23-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1480-38-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1508-24-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1524-48-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1548-64-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1652-36-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1668-21-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1676-35-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1708-44-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1784-52-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1788-41-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1848-22-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1852-34-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1968-40-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/1976-29-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2020-57-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2024-26-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2060-28-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2080-50-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2092-47-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2188-56-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2196-46-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2220-42-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2228-53-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2312-0-0x0000000000400000-0x000000000058A000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1.5MB

                                                                                                                                                                                                                  • memory/2312-75-0x0000000000400000-0x000000000058A000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1.5MB

                                                                                                                                                                                                                  • memory/2312-1-0x0000000010000000-0x0000000010011000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    68KB

                                                                                                                                                                                                                  • memory/2312-88-0x0000000000400000-0x000000000058A000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1.5MB

                                                                                                                                                                                                                  • memory/2312-17-0x0000000000590000-0x00000000005CB000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    236KB

                                                                                                                                                                                                                  • memory/2312-9-0x00000000003E0000-0x00000000003F0000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                  • memory/2332-31-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2344-18-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2364-33-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2392-30-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2396-43-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2440-32-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2580-65-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2616-55-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2632-54-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2640-60-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2660-62-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2720-63-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2772-51-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2812-58-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2892-59-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/2940-49-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB

                                                                                                                                                                                                                  • memory/3024-61-0x0000000076FD0000-0x00000000770CA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1000KB