Analysis
-
max time kernel
117s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 06:49
Static task
static1
Behavioral task
behavioral1
Sample
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
Resource
win10v2004-20241007-en
General
-
Target
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
-
Size
3.3MB
-
MD5
593bd62eceeda58654db4440f104145a
-
SHA1
b1b91ca760e16a73ed089de05fde9e78fe27416d
-
SHA256
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343
-
SHA512
cc0d4f57815d0dbce6c59cf05920e93c0fa8340aad8effde3160fde2ddb3eb132d1f6a06d2f40176c7ab16c033312ac34f086f977724a47130f94e6054fc09e6
-
SSDEEP
49152:uVcQjH6VIOIgQFF3KzfKeSQSqFvVqp/kHzQJqEFH1D1Rc:uVpjK7xWF34fSQSqFvVqpcfEc
Malware Config
Extracted
C:\Program Files\wFLb_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid Process 1588 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid Process 2244 wevtutil.exe 2332 wevtutil.exe 2320 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
powershell.exepowershell.exepid Process 1760 powershell.exe 2860 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exedescription ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\vlc.mo.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_JeGOhKmCvhs0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_distributed.gif 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.LEX.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_V7eUcTDjHHA0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADVCMP.DIC.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_guQLKJv-ulE0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\TEXTAREA.JPG.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_czKMMhe2Ts40.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\7-Zip\readme.txt.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_gi3VoRtcmbQ0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Common Files\System\msadc\handsafe.reg 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.bmp 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_AjNTbhPmdRM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME12.CSS.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_tVFHhMNIbRI0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\43.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185776.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_xwdudhCy1lA0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01151_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_xkDTDZgVJQM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107254.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_5I1aphvdL-40.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153307.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_cFO1CpGSd7Q0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198226.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_47dUUoNyShs0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\UnreadIconImagesMask.bmp.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_vmPTn1TdC1w0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-attach.xml.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_6RiTa-mUskU0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ADO210.CHM.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_Fed6LN9AAmg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240157.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_SyQOQoUvkWI0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Grid.xml.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_H1qsXPOmAAQ0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Teal.css.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_PT6Lkdkpdys0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7db.kic.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_eE-UTArA3jg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\STUBBY2.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_l40g4hF_PWI0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Curacao.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_8QZrFWPIzXY0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository.nl_ja_4.4.0.v20140623020002.jar.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_t1cTD2aVdBE0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00476_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_JVmc50kPaNY0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AD.XML.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_fhnqIGkzJtM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_scrapbook_Thumbnail.bmp 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00943_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_snCYSez93Nw0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01745_.GIF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_77BwsCFw1880.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21321_.GIF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_12uDP9_--sg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV.HXS.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_nGXo1docr800.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\spacer_highlights.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-gibbous_partly-cloudy.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setEmbeddedCP.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_7fYq6OlMCMw0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_down.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN02559_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_FQo06qhwKWM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Equity.xml.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_GksSjuJbNss0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBRPH2.POC.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_9kC0x0ahm-40.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-fallback.xml.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_EzIR_0ghfkg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE05665_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_YdL7JpIsghA0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Oriel.xml.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_XdyRRDYbU0I0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Sales Pipeline.accdt.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_1WeDPJshaxk0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Vostok.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_KzienBf7P0w0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GRAPH_COL.HXT.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_vAw3DAD5A2I0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\QP.XML.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_14RTpbzovrg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01167_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_xlqgGAiufrk0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03205I.JPG.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz__ZKaTxz1p1A0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_d71ccVGmPrA0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Costa_Rica.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_YCPfQJ3DA-k0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt_1.1.1.v20140903-0821.jar.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_42je4_CpJ6I0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE06450_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_c_M--eNta-M0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02227_.WMF.AQMxk282bJi8hRvjukfXXcNjsh7DV7duHn72vgyQ_vz_L1wlD98IVp80.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 2560 sc.exe 2456 sc.exe 2524 sc.exe 2948 sc.exe 2944 sc.exe 328 sc.exe 1600 sc.exe 1200 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exereg.exewevtutil.execmd.exenet1.exenet1.exesc.exereg.exereg.exereg.exereg.exereg.exewmic.exenet.exenet1.exesc.exesc.exeschtasks.exeschtasks.exenet1.exereg.exereg.exereg.exereg.exevssadmin.execmd.exe80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exenet1.exereg.exenet.exesc.exereg.exereg.exesc.exereg.exereg.exenet1.exenet1.exewevtutil.exenet.exenet.exesc.exereg.exeschtasks.exenet.exenet.exesc.exeschtasks.exeschtasks.exenet1.exereg.execmd.exepowershell.exereg.exereg.exereg.exewevtutil.exesc.exereg.exereg.exereg.exewmic.exenet.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 2992 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exe80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exepid Process 1760 powershell.exe 2860 powershell.exe 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid Process Token: SeSecurityPrivilege 2244 wevtutil.exe Token: SeBackupPrivilege 2244 wevtutil.exe Token: SeSecurityPrivilege 2332 wevtutil.exe Token: SeBackupPrivilege 2332 wevtutil.exe Token: SeSecurityPrivilege 2320 wevtutil.exe Token: SeBackupPrivilege 2320 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2156 wmic.exe Token: SeSecurityPrivilege 2156 wmic.exe Token: SeTakeOwnershipPrivilege 2156 wmic.exe Token: SeLoadDriverPrivilege 2156 wmic.exe Token: SeSystemProfilePrivilege 2156 wmic.exe Token: SeSystemtimePrivilege 2156 wmic.exe Token: SeProfSingleProcessPrivilege 2156 wmic.exe Token: SeIncBasePriorityPrivilege 2156 wmic.exe Token: SeCreatePagefilePrivilege 2156 wmic.exe Token: SeBackupPrivilege 2156 wmic.exe Token: SeRestorePrivilege 2156 wmic.exe Token: SeShutdownPrivilege 2156 wmic.exe Token: SeDebugPrivilege 2156 wmic.exe Token: SeSystemEnvironmentPrivilege 2156 wmic.exe Token: SeRemoteShutdownPrivilege 2156 wmic.exe Token: SeUndockPrivilege 2156 wmic.exe Token: SeManageVolumePrivilege 2156 wmic.exe Token: 33 2156 wmic.exe Token: 34 2156 wmic.exe Token: 35 2156 wmic.exe Token: SeIncreaseQuotaPrivilege 868 wmic.exe Token: SeSecurityPrivilege 868 wmic.exe Token: SeTakeOwnershipPrivilege 868 wmic.exe Token: SeLoadDriverPrivilege 868 wmic.exe Token: SeSystemProfilePrivilege 868 wmic.exe Token: SeSystemtimePrivilege 868 wmic.exe Token: SeProfSingleProcessPrivilege 868 wmic.exe Token: SeIncBasePriorityPrivilege 868 wmic.exe Token: SeCreatePagefilePrivilege 868 wmic.exe Token: SeBackupPrivilege 868 wmic.exe Token: SeRestorePrivilege 868 wmic.exe Token: SeShutdownPrivilege 868 wmic.exe Token: SeDebugPrivilege 868 wmic.exe Token: SeSystemEnvironmentPrivilege 868 wmic.exe Token: SeRemoteShutdownPrivilege 868 wmic.exe Token: SeUndockPrivilege 868 wmic.exe Token: SeManageVolumePrivilege 868 wmic.exe Token: 33 868 wmic.exe Token: 34 868 wmic.exe Token: 35 868 wmic.exe Token: SeIncreaseQuotaPrivilege 868 wmic.exe Token: SeSecurityPrivilege 868 wmic.exe Token: SeTakeOwnershipPrivilege 868 wmic.exe Token: SeLoadDriverPrivilege 868 wmic.exe Token: SeSystemProfilePrivilege 868 wmic.exe Token: SeSystemtimePrivilege 868 wmic.exe Token: SeProfSingleProcessPrivilege 868 wmic.exe Token: SeIncBasePriorityPrivilege 868 wmic.exe Token: SeCreatePagefilePrivilege 868 wmic.exe Token: SeBackupPrivilege 868 wmic.exe Token: SeRestorePrivilege 868 wmic.exe Token: SeShutdownPrivilege 868 wmic.exe Token: SeDebugPrivilege 868 wmic.exe Token: SeSystemEnvironmentPrivilege 868 wmic.exe Token: SeRemoteShutdownPrivilege 868 wmic.exe Token: SeUndockPrivilege 868 wmic.exe Token: SeManageVolumePrivilege 868 wmic.exe Token: 33 868 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid Process procid_target PID 1164 wrote to memory of 3032 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 30 PID 1164 wrote to memory of 3032 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 30 PID 1164 wrote to memory of 3032 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 30 PID 1164 wrote to memory of 3032 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 30 PID 3032 wrote to memory of 2576 3032 net.exe 32 PID 3032 wrote to memory of 2576 3032 net.exe 32 PID 3032 wrote to memory of 2576 3032 net.exe 32 PID 3032 wrote to memory of 2576 3032 net.exe 32 PID 1164 wrote to memory of 2660 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 33 PID 1164 wrote to memory of 2660 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 33 PID 1164 wrote to memory of 2660 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 33 PID 1164 wrote to memory of 2660 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 33 PID 2660 wrote to memory of 2664 2660 net.exe 35 PID 2660 wrote to memory of 2664 2660 net.exe 35 PID 2660 wrote to memory of 2664 2660 net.exe 35 PID 2660 wrote to memory of 2664 2660 net.exe 35 PID 1164 wrote to memory of 2720 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 36 PID 1164 wrote to memory of 2720 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 36 PID 1164 wrote to memory of 2720 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 36 PID 1164 wrote to memory of 2720 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 36 PID 2720 wrote to memory of 2604 2720 net.exe 38 PID 2720 wrote to memory of 2604 2720 net.exe 38 PID 2720 wrote to memory of 2604 2720 net.exe 38 PID 2720 wrote to memory of 2604 2720 net.exe 38 PID 1164 wrote to memory of 2572 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 39 PID 1164 wrote to memory of 2572 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 39 PID 1164 wrote to memory of 2572 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 39 PID 1164 wrote to memory of 2572 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 39 PID 2572 wrote to memory of 2688 2572 net.exe 41 PID 2572 wrote to memory of 2688 2572 net.exe 41 PID 2572 wrote to memory of 2688 2572 net.exe 41 PID 2572 wrote to memory of 2688 2572 net.exe 41 PID 1164 wrote to memory of 2452 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 42 PID 1164 wrote to memory of 2452 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 42 PID 1164 wrote to memory of 2452 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 42 PID 1164 wrote to memory of 2452 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 42 PID 2452 wrote to memory of 2744 2452 net.exe 44 PID 2452 wrote to memory of 2744 2452 net.exe 44 PID 2452 wrote to memory of 2744 2452 net.exe 44 PID 2452 wrote to memory of 2744 2452 net.exe 44 PID 1164 wrote to memory of 2608 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 45 PID 1164 wrote to memory of 2608 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 45 PID 1164 wrote to memory of 2608 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 45 PID 1164 wrote to memory of 2608 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 45 PID 2608 wrote to memory of 2808 2608 net.exe 47 PID 2608 wrote to memory of 2808 2608 net.exe 47 PID 2608 wrote to memory of 2808 2608 net.exe 47 PID 2608 wrote to memory of 2808 2608 net.exe 47 PID 1164 wrote to memory of 2800 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 48 PID 1164 wrote to memory of 2800 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 48 PID 1164 wrote to memory of 2800 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 48 PID 1164 wrote to memory of 2800 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 48 PID 2800 wrote to memory of 2544 2800 net.exe 50 PID 2800 wrote to memory of 2544 2800 net.exe 50 PID 2800 wrote to memory of 2544 2800 net.exe 50 PID 2800 wrote to memory of 2544 2800 net.exe 50 PID 1164 wrote to memory of 2672 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 51 PID 1164 wrote to memory of 2672 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 51 PID 1164 wrote to memory of 2672 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 51 PID 1164 wrote to memory of 2672 1164 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 51 PID 2672 wrote to memory of 2492 2672 net.exe 53 PID 2672 wrote to memory of 2492 2672 net.exe 53 PID 2672 wrote to memory of 2492 2672 net.exe 53 PID 2672 wrote to memory of 2492 2672 net.exe 53 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe"C:\Users\Admin\AppData\Local\Temp\80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:328
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1720
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1084
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:576
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:900
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:564
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1520
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:320
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2992
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51ca4bccdc072b810cb3f0080d616317a
SHA180dea435c073d9b0a2a54a853df4dc058ebd3352
SHA25648f9f649dfdf74a453d0229070bfdadd27c93e014f56cf36992758b70350e169
SHA512fcacc4812f6cd93cb91a5e502fe3571eefba692defdd52f67b55cad3790405535ff156ba87360dcccd86e0766e03ddbd6a1c547b7cd40d1f32ccf7e51dfc4488
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5badbf47c38db56586972adec4780f074
SHA15794378dd9d9c2d77cde5af914315a6c98db907d
SHA256713d65bcdf8eef0045d41f78abba054ab90435b2a74234f94b61188bae1d5dd5
SHA512f7a4e5a50cf600fa7e61f3d52b6edafd149d69c996fa8de0d4f0bc1d16f90caefa732c6b07236ab3f06530e9cc3d94ee34b58bd7f451a98b2485df2e8a3515d0