Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe
-
Size
450KB
-
MD5
da5782bac1920b593c0901a2e762955f
-
SHA1
5aa3fc83939b7292286a68fb31ab996d2e08abb3
-
SHA256
6a7629916cbf80c851ef346c1198b6bb6fc572892931f22130cc278a200b29b6
-
SHA512
09442aa6b5e739052670a974795a234e8118770a83ac404fd673db146d53aa9a0c35b9cf355f8a1dfe1d47b3adf68b9fda95008d22abedd2e0d60efbcbdfd628
-
SSDEEP
6144:5aqKTRNjxQ1XUffZ5Lm771lTrnjeZPpePqt+DHv3cyvdkt/ft+UXnjrPFNpV37d/:5OtVx+EffZweJSvM6iNX/FvJ7Q8iztdo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" лпорпароаыв.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" лпорпароаыв.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" лпорпароаыв.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" лпорпароаыв.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection лпорпароаыв.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" лпорпароаыв.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" лпорпароаыв.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection лпорпароаыв.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" лпорпароаыв.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" лпорпароаыв.exe -
Executes dropped EXE 2 IoCs
pid Process 2412 лпорпароаыв.exe 2400 лпорпароаыв.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe -
pid Process 2804 powershell.exe 756 powershell.exe 288 powershell.exe 1996 powershell.exe 2708 powershell.exe 2872 powershell.exe 1952 powershell.exe 3004 powershell.exe 2916 powershell.exe 1984 powershell.exe 344 powershell.exe 2592 powershell.exe 2124 powershell.exe 1924 powershell.exe 2016 powershell.exe 1476 powershell.exe 1140 powershell.exe 2652 powershell.exe 1712 powershell.exe 1920 powershell.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2732 sc.exe 2700 sc.exe 1580 sc.exe 3012 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language лпорпароаыв.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language лпорпароаыв.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ лпорпароаыв.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" лпорпароаыв.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" лпорпароаыв.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = b0d31ba34504db01 powershell.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2592 powershell.exe 2872 powershell.exe 2708 powershell.exe 2916 powershell.exe 1712 powershell.exe 2124 powershell.exe 1920 powershell.exe 1924 powershell.exe 2016 powershell.exe 344 powershell.exe 2804 powershell.exe 1996 powershell.exe 1984 powershell.exe 756 powershell.exe 288 powershell.exe 3004 powershell.exe 2652 powershell.exe 1952 powershell.exe 1140 powershell.exe 1476 powershell.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2916 powershell.exe Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 344 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 756 powershell.exe Token: SeDebugPrivilege 288 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 1140 powershell.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeTcbPrivilege 2664 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2412 2980 da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2412 2980 da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2412 2980 da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2412 2980 da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2064 2412 лпорпароаыв.exe 31 PID 2412 wrote to memory of 2064 2412 лпорпароаыв.exe 31 PID 2412 wrote to memory of 2064 2412 лпорпароаыв.exe 31 PID 2412 wrote to memory of 2064 2412 лпорпароаыв.exe 31 PID 2412 wrote to memory of 2200 2412 лпорпароаыв.exe 33 PID 2412 wrote to memory of 2200 2412 лпорпароаыв.exe 33 PID 2412 wrote to memory of 2200 2412 лпорпароаыв.exe 33 PID 2412 wrote to memory of 2200 2412 лпорпароаыв.exe 33 PID 2412 wrote to memory of 2684 2412 лпорпароаыв.exe 35 PID 2412 wrote to memory of 2684 2412 лпорпароаыв.exe 35 PID 2412 wrote to memory of 2684 2412 лпорпароаыв.exe 35 PID 2412 wrote to memory of 2684 2412 лпорпароаыв.exe 35 PID 2412 wrote to memory of 2316 2412 лпорпароаыв.exe 37 PID 2412 wrote to memory of 2316 2412 лпорпароаыв.exe 37 PID 2412 wrote to memory of 2316 2412 лпорпароаыв.exe 37 PID 2412 wrote to memory of 2316 2412 лпорпароаыв.exe 37 PID 2064 wrote to memory of 2700 2064 cmd.exe 38 PID 2064 wrote to memory of 2700 2064 cmd.exe 38 PID 2064 wrote to memory of 2700 2064 cmd.exe 38 PID 2200 wrote to memory of 2732 2200 cmd.exe 39 PID 2200 wrote to memory of 2732 2200 cmd.exe 39 PID 2200 wrote to memory of 2732 2200 cmd.exe 39 PID 2412 wrote to memory of 2720 2412 лпорпароаыв.exe 40 PID 2412 wrote to memory of 2720 2412 лпорпароаыв.exe 40 PID 2412 wrote to memory of 2720 2412 лпорпароаыв.exe 40 PID 2412 wrote to memory of 2720 2412 лпорпароаыв.exe 40 PID 2412 wrote to memory of 2820 2412 лпорпароаыв.exe 42 PID 2412 wrote to memory of 2820 2412 лпорпароаыв.exe 42 PID 2412 wrote to memory of 2820 2412 лпорпароаыв.exe 42 PID 2412 wrote to memory of 2820 2412 лпорпароаыв.exe 42 PID 2412 wrote to memory of 2740 2412 лпорпароаыв.exe 45 PID 2412 wrote to memory of 2740 2412 лпорпароаыв.exe 45 PID 2412 wrote to memory of 2740 2412 лпорпароаыв.exe 45 PID 2412 wrote to memory of 2740 2412 лпорпароаыв.exe 45 PID 2412 wrote to memory of 2596 2412 лпорпароаыв.exe 47 PID 2412 wrote to memory of 2596 2412 лпорпароаыв.exe 47 PID 2412 wrote to memory of 2596 2412 лпорпароаыв.exe 47 PID 2412 wrote to memory of 2596 2412 лпорпароаыв.exe 47 PID 2720 wrote to memory of 2916 2720 cmd.exe 49 PID 2720 wrote to memory of 2916 2720 cmd.exe 49 PID 2720 wrote to memory of 2916 2720 cmd.exe 49 PID 2316 wrote to memory of 2708 2316 cmd.exe 50 PID 2316 wrote to memory of 2708 2316 cmd.exe 50 PID 2316 wrote to memory of 2708 2316 cmd.exe 50 PID 2412 wrote to memory of 2624 2412 лпорпароаыв.exe 51 PID 2412 wrote to memory of 2624 2412 лпорпароаыв.exe 51 PID 2412 wrote to memory of 2624 2412 лпорпароаыв.exe 51 PID 2412 wrote to memory of 2624 2412 лпорпароаыв.exe 51 PID 2412 wrote to memory of 2768 2412 лпорпароаыв.exe 53 PID 2412 wrote to memory of 2768 2412 лпорпароаыв.exe 53 PID 2412 wrote to memory of 2768 2412 лпорпароаыв.exe 53 PID 2412 wrote to memory of 2768 2412 лпорпароаыв.exe 53 PID 2684 wrote to memory of 2872 2684 cmd.exe 54 PID 2684 wrote to memory of 2872 2684 cmd.exe 54 PID 2684 wrote to memory of 2872 2684 cmd.exe 54 PID 2412 wrote to memory of 2756 2412 лпорпароаыв.exe 56 PID 2412 wrote to memory of 2756 2412 лпорпароаыв.exe 56 PID 2412 wrote to memory of 2756 2412 лпорпароаыв.exe 56 PID 2412 wrote to memory of 2756 2412 лпорпароаыв.exe 56 PID 2412 wrote to memory of 2636 2412 лпорпароаыв.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da5782bac1920b593c0901a2e762955f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\ProgramData\лпорпароаыв.exe"C:\ProgramData\лпорпароаыв.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:2700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc delete WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:2732
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBehaviorMonitoring $true3⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableBehaviorMonitoring $true4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBlockAtFirstSeen $true3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableBlockAtFirstSeen $true4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIOAVProtection $true3⤵PID:2820
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisablePrivacyMode $true3⤵PID:2740
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisablePrivacyMode $true4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIntrusionPreventionSystem $true3⤵PID:2596
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -SevereThreatDefaultAction 63⤵PID:2624
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -SevereThreatDefaultAction 64⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -LowThreatDefaultAction 63⤵PID:2768
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -LowThreatDefaultAction 64⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -ModerateThreatDefaultAction 63⤵PID:2756
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -ModerateThreatDefaultAction 64⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableScriptScanning $true3⤵PID:2636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableScriptScanning $true4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1616
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AB5F7EA8-BA70-4C6A-AA71-BC624D23E2F6} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2388
-
C:\Users\Admin\AppData\Roaming\mslibrary\лпорпароаыв.exeC:\Users\Admin\AppData\Roaming\mslibrary\лпорпароаыв.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend3⤵PID:2512
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:1580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc delete WinDefend3⤵PID:1868
-
C:\Windows\system32\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:3012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵PID:1556
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBehaviorMonitoring $true3⤵PID:1584
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableBehaviorMonitoring $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableBlockAtFirstSeen $true3⤵PID:2104
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableBlockAtFirstSeen $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIOAVProtection $true3⤵PID:2980
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisablePrivacyMode $true3⤵PID:2404
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisablePrivacyMode $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableIntrusionPreventionSystem $true3⤵PID:2744
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -SevereThreatDefaultAction 63⤵PID:3056
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -SevereThreatDefaultAction 64⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -LowThreatDefaultAction 63⤵PID:2732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -LowThreatDefaultAction 64⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -ModerateThreatDefaultAction 63⤵PID:2408
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -ModerateThreatDefaultAction 64⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Set-MpPreference -DisableScriptScanning $true3⤵PID:2604
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableScriptScanning $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD5da5782bac1920b593c0901a2e762955f
SHA15aa3fc83939b7292286a68fb31ab996d2e08abb3
SHA2566a7629916cbf80c851ef346c1198b6bb6fc572892931f22130cc278a200b29b6
SHA51209442aa6b5e739052670a974795a234e8118770a83ac404fd673db146d53aa9a0c35b9cf355f8a1dfe1d47b3adf68b9fda95008d22abedd2e0d60efbcbdfd628
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59f8a77c26c012493562e57b1efb0ece0
SHA18c2382b7c41c6b6dce29b3b23268d33299542163
SHA256dcf9c0afb236d5c6754e8b21f698ff70aad2455f77f034677a6a1ba53a699c69
SHA512f17f7da60bd0ab135682a6ddd4c404432fc92aa9ea5395565986be96351c9aaf9ad4c46fa03b3b670f80ff165f6f1f015639a47730a841d3abea26c5cc4333a6