Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
ef2e7cb424f1a3a1246b33eab15ab25b
-
SHA1
897f967f5764ae03f9feb0067c1219a306f75d34
-
SHA256
f8f1e5215db87786a59bcf20b2db7e941fcd1850dae3cd14f2c9ab5d3753543e
-
SHA512
d08208718438cd8771b67118c6dca21ac1bd8f7fc51a8dd97a739639dd5ad5e540597eba966b1da3fc3804d7915f672a62cfa8cdea041c38057adb8684a3c376
-
SSDEEP
49152:Gp23czIc3tduoI2TSwKPW0wqNgU8bZIhx+EfGbjX1hCqyF/U:G43c/3tduoIoSNPWL08I+MGb2F/U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Arquivos de programas\\msnmsg.exe\"" ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe:*:Enabled:System" ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1484 netsh.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\windows\SysWOW64\zeroinfect.txt ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\Windows\Menu Iniciar\Programas\Iniciar\msnmsg.exe ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Kills process with taskkill 43 IoCs
pid Process 2768 taskkill.exe 2948 taskkill.exe 2960 taskkill.exe 2028 taskkill.exe 2352 taskkill.exe 2336 taskkill.exe 2448 taskkill.exe 2864 taskkill.exe 1764 taskkill.exe 932 taskkill.exe 2204 taskkill.exe 3052 taskkill.exe 2112 taskkill.exe 1680 taskkill.exe 2308 taskkill.exe 2032 taskkill.exe 1716 taskkill.exe 2744 taskkill.exe 2804 taskkill.exe 2796 taskkill.exe 2572 taskkill.exe 2492 taskkill.exe 1652 taskkill.exe 3032 taskkill.exe 1480 taskkill.exe 844 taskkill.exe 2588 taskkill.exe 2648 taskkill.exe 2116 taskkill.exe 2692 taskkill.exe 2848 taskkill.exe 2824 taskkill.exe 3028 taskkill.exe 2884 taskkill.exe 1604 taskkill.exe 1412 taskkill.exe 1012 taskkill.exe 2484 taskkill.exe 1512 taskkill.exe 368 taskkill.exe 2676 taskkill.exe 2712 taskkill.exe 2732 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2500 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 2848 taskkill.exe Token: SeDebugPrivilege 2204 taskkill.exe Token: SeDebugPrivilege 2676 taskkill.exe Token: SeDebugPrivilege 2732 taskkill.exe Token: SeDebugPrivilege 2804 taskkill.exe Token: SeDebugPrivilege 932 taskkill.exe Token: SeDebugPrivilege 2448 taskkill.exe Token: SeDebugPrivilege 2768 taskkill.exe Token: SeDebugPrivilege 2744 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 2824 taskkill.exe Token: SeDebugPrivilege 3028 taskkill.exe Token: SeDebugPrivilege 2336 taskkill.exe Token: SeDebugPrivilege 2588 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 1412 taskkill.exe Token: SeDebugPrivilege 2884 taskkill.exe Token: SeDebugPrivilege 1764 taskkill.exe Token: SeDebugPrivilege 2112 taskkill.exe Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 2712 taskkill.exe Token: SeDebugPrivilege 3052 taskkill.exe Token: SeDebugPrivilege 2796 taskkill.exe Token: SeDebugPrivilege 368 taskkill.exe Token: SeDebugPrivilege 2308 taskkill.exe Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 844 taskkill.exe Token: SeDebugPrivilege 1512 taskkill.exe Token: SeDebugPrivilege 2484 taskkill.exe Token: SeDebugPrivilege 3032 taskkill.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 2948 taskkill.exe Token: SeDebugPrivilege 2032 taskkill.exe Token: SeDebugPrivilege 1480 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 1652 taskkill.exe Token: SeDebugPrivilege 1604 taskkill.exe Token: SeDebugPrivilege 1680 taskkill.exe Token: SeDebugPrivilege 2692 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 948 wrote to memory of 2500 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 31 PID 948 wrote to memory of 2500 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 31 PID 948 wrote to memory of 2500 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 31 PID 948 wrote to memory of 2500 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 31 PID 948 wrote to memory of 932 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 33 PID 948 wrote to memory of 932 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 33 PID 948 wrote to memory of 932 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 33 PID 948 wrote to memory of 932 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 33 PID 948 wrote to memory of 2676 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 34 PID 948 wrote to memory of 2676 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 34 PID 948 wrote to memory of 2676 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 34 PID 948 wrote to memory of 2676 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 34 PID 948 wrote to memory of 2848 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 35 PID 948 wrote to memory of 2848 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 35 PID 948 wrote to memory of 2848 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 35 PID 948 wrote to memory of 2848 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 35 PID 948 wrote to memory of 2336 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 38 PID 948 wrote to memory of 2336 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 38 PID 948 wrote to memory of 2336 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 38 PID 948 wrote to memory of 2336 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 38 PID 948 wrote to memory of 2204 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 39 PID 948 wrote to memory of 2204 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 39 PID 948 wrote to memory of 2204 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 39 PID 948 wrote to memory of 2204 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 39 PID 948 wrote to memory of 2448 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 41 PID 948 wrote to memory of 2448 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 41 PID 948 wrote to memory of 2448 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 41 PID 948 wrote to memory of 2448 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 41 PID 948 wrote to memory of 2744 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 43 PID 948 wrote to memory of 2744 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 43 PID 948 wrote to memory of 2744 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 43 PID 948 wrote to memory of 2744 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 43 PID 948 wrote to memory of 2864 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 46 PID 948 wrote to memory of 2864 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 46 PID 948 wrote to memory of 2864 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 46 PID 948 wrote to memory of 2864 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 46 PID 948 wrote to memory of 2824 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 47 PID 948 wrote to memory of 2824 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 47 PID 948 wrote to memory of 2824 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 47 PID 948 wrote to memory of 2824 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 47 PID 948 wrote to memory of 3032 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 49 PID 948 wrote to memory of 3032 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 49 PID 948 wrote to memory of 3032 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 49 PID 948 wrote to memory of 3032 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 49 PID 948 wrote to memory of 2804 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 50 PID 948 wrote to memory of 2804 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 50 PID 948 wrote to memory of 2804 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 50 PID 948 wrote to memory of 2804 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 50 PID 948 wrote to memory of 3028 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 53 PID 948 wrote to memory of 3028 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 53 PID 948 wrote to memory of 3028 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 53 PID 948 wrote to memory of 3028 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 53 PID 948 wrote to memory of 2712 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 54 PID 948 wrote to memory of 2712 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 54 PID 948 wrote to memory of 2712 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 54 PID 948 wrote to memory of 2712 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 54 PID 948 wrote to memory of 2112 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 55 PID 948 wrote to memory of 2112 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 55 PID 948 wrote to memory of 2112 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 55 PID 948 wrote to memory of 2112 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 55 PID 948 wrote to memory of 2796 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 56 PID 948 wrote to memory of 2796 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 56 PID 948 wrote to memory of 2796 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 56 PID 948 wrote to memory of 2796 948 ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef2e7cb424f1a3a1246b33eab15ab25b_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\start.bat /sc onstart /ru system2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spybotSD.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avp.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nod32krn.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nod32kui.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im KAVPF.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Kav.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im gcasServ.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im zlclient.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgemc.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgupsvc.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgamsvr.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im avgcc.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashdisp.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashmaisv.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashserv.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ashwebsv.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im aswupdsv.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ccsetmgr.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cccproxy.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ccapp.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ccevtmgr.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcdash.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Mcdetect.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcregwiz.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im McTskshd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcupdmgr.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcupdui.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfAgent.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfConsole.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfService.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfTray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MpfWizard.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mvtx.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcappins.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcinfo.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mghtml.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcinsupd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcmnhdlr.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im McShield.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im McVSEscn.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mcvsftsn.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im naiavfin.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im oasclnt.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode = disable2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1