Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
c5ea00ea5973347d54d66f12fb5ee242
-
SHA1
9ce9fe05b746d949ac3095c7b8ed70a34948a0e5
-
SHA256
36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e
-
SHA512
a6061f6d4b22f3e6561da3e2e27bbdf6e0e9ec812c2e584812d9e684c7e9dfb54c6454a8d818e65d82d89aa17e45d95a15e64e88e8ff33eab6fa284a68a1fe0f
-
SSDEEP
49152:Fq3j/91Zrb/TNvO90dL3BmAFd4A64nsfJeomo3d4jMQPvFPL8bg11VgjoCfEJZD1:FG91LomuSBPvqi4B
Malware Config
Extracted
C:\Program Files\phLK_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1588 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 1032 wevtutil.exe 2304 wevtutil.exe 2132 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1672 bcdedit.exe 2412 bcdedit.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 2908 powershell.exe 1796 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\next_down.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\9.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_ja.jar.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_06pWK_7vRn40.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Boise.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_NYNQGU972ks0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR29B.GIF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_AnaDkGyNoQI0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\TURABIAN.XSL.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_-lmEUtl18Pg0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.nl_ja_4.4.0.v20140623020002.jar.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_JmW0ptIC3DA0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00388_.WMF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_kF_PGT0NkFM0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR4B.GIF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_FYkfJMeOQDY0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02413_.WMF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_YOSay9cXXJo0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Waveform.thmx.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_c19VodEBFJA0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105710.WMF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_yTwj6CZt12E0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14710_.GIF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_Mn6HHrUWR0Y0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\CalendarToolIconImages.jpg.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr__dl13-2YKoM0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)greenStateIcon.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\settings.html c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\gadget.xml c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\SETUP.XML.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_WI249ly2flw0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ReviewRouting_Init.xsn.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_hxglD541V4U0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.config.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_t0Yz5iqFrD80.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue.css.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_eDcGJDJA9w40.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Melbourne.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_57WTzY3lD840.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\ARCTIC.INF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_9EypZa7Wb480.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\drag.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dhaka.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_FDBZPArKk7Y0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Media Player\en-US\wmlaunch.exe.mui c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_VelvetRose.gif.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_-ZbQRQZ-NYM0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\RSSFeeds.html c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\IpsMigrationPlugin.dll.mui c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\javafx-doclet.jar.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_I-gYfAqxAxk0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\security\javaws.policy.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_Pn_2lIzdP6A0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Dawson_Creek.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_fFCz9J0Hop80.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00118_.WMF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_HvR3IJnTwEs0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Composite.xml.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_1ywZ0fCor1g0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14828_.GIF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_kuZMR8y3AUs0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-crescent_partly-cloudy.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\button-highlight.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.css_1.7.0.v201011041433.jar.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_-TRz0eUHHxA0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\WordMUI.XML.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_-lABe8TtqMI0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02106_.GIF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_96hJsAsk_UM0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_up.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\logo.png c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\phLK_HOW_TO_DECRYPT.txt c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt.nl_ja_4.4.0.v20140623020002.jar.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_h1yDnXoIjxQ0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-awt_zh_CN.jar.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_D6YRYNUInsk0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Hong_Kong.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_2gD-UFhE5Tc0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Maldives.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_ncAKNDkfcBQ0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01015_.WMF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_rhdh7o2KHPY0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\larrow.gif.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_dAWD4nQqxqI0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-tabcontrol_zh_CN.jar.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_Z3I1fpxr0zc0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\picturePuzzle.css c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\tab_off.gif.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_VC2R6aiWSAQ0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL020.XML.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_Yt-Zy2M9KeY0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01140_.WMF.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_WZDDpQagL3o0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.cfg.53yOJ6Wdb4HKRzyT-WxDHgoGLidU63Es7wXb_DGacWr_7xfZo7e6ycQ0.vck99 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1984 sc.exe 2760 sc.exe 2820 sc.exe 2816 sc.exe 2808 sc.exe 2636 sc.exe 1996 sc.exe 2720 sc.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1320 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1796 powershell.exe 2908 powershell.exe 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1032 wevtutil.exe Token: SeBackupPrivilege 1032 wevtutil.exe Token: SeSecurityPrivilege 2304 wevtutil.exe Token: SeBackupPrivilege 2304 wevtutil.exe Token: SeSecurityPrivilege 2132 wevtutil.exe Token: SeBackupPrivilege 2132 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1800 wmic.exe Token: SeSecurityPrivilege 1800 wmic.exe Token: SeTakeOwnershipPrivilege 1800 wmic.exe Token: SeLoadDriverPrivilege 1800 wmic.exe Token: SeSystemProfilePrivilege 1800 wmic.exe Token: SeSystemtimePrivilege 1800 wmic.exe Token: SeProfSingleProcessPrivilege 1800 wmic.exe Token: SeIncBasePriorityPrivilege 1800 wmic.exe Token: SeCreatePagefilePrivilege 1800 wmic.exe Token: SeBackupPrivilege 1800 wmic.exe Token: SeRestorePrivilege 1800 wmic.exe Token: SeShutdownPrivilege 1800 wmic.exe Token: SeDebugPrivilege 1800 wmic.exe Token: SeSystemEnvironmentPrivilege 1800 wmic.exe Token: SeRemoteShutdownPrivilege 1800 wmic.exe Token: SeUndockPrivilege 1800 wmic.exe Token: SeManageVolumePrivilege 1800 wmic.exe Token: 33 1800 wmic.exe Token: 34 1800 wmic.exe Token: 35 1800 wmic.exe Token: SeIncreaseQuotaPrivilege 2252 wmic.exe Token: SeSecurityPrivilege 2252 wmic.exe Token: SeTakeOwnershipPrivilege 2252 wmic.exe Token: SeLoadDriverPrivilege 2252 wmic.exe Token: SeSystemProfilePrivilege 2252 wmic.exe Token: SeSystemtimePrivilege 2252 wmic.exe Token: SeProfSingleProcessPrivilege 2252 wmic.exe Token: SeIncBasePriorityPrivilege 2252 wmic.exe Token: SeCreatePagefilePrivilege 2252 wmic.exe Token: SeBackupPrivilege 2252 wmic.exe Token: SeRestorePrivilege 2252 wmic.exe Token: SeShutdownPrivilege 2252 wmic.exe Token: SeDebugPrivilege 2252 wmic.exe Token: SeSystemEnvironmentPrivilege 2252 wmic.exe Token: SeRemoteShutdownPrivilege 2252 wmic.exe Token: SeUndockPrivilege 2252 wmic.exe Token: SeManageVolumePrivilege 2252 wmic.exe Token: 33 2252 wmic.exe Token: 34 2252 wmic.exe Token: 35 2252 wmic.exe Token: SeIncreaseQuotaPrivilege 2252 wmic.exe Token: SeSecurityPrivilege 2252 wmic.exe Token: SeTakeOwnershipPrivilege 2252 wmic.exe Token: SeLoadDriverPrivilege 2252 wmic.exe Token: SeSystemProfilePrivilege 2252 wmic.exe Token: SeSystemtimePrivilege 2252 wmic.exe Token: SeProfSingleProcessPrivilege 2252 wmic.exe Token: SeIncBasePriorityPrivilege 2252 wmic.exe Token: SeCreatePagefilePrivilege 2252 wmic.exe Token: SeBackupPrivilege 2252 wmic.exe Token: SeRestorePrivilege 2252 wmic.exe Token: SeShutdownPrivilege 2252 wmic.exe Token: SeDebugPrivilege 2252 wmic.exe Token: SeSystemEnvironmentPrivilege 2252 wmic.exe Token: SeRemoteShutdownPrivilege 2252 wmic.exe Token: SeUndockPrivilege 2252 wmic.exe Token: SeManageVolumePrivilege 2252 wmic.exe Token: 33 2252 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2016 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 30 PID 2600 wrote to memory of 2016 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 30 PID 2600 wrote to memory of 2016 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 30 PID 2016 wrote to memory of 2084 2016 net.exe 32 PID 2016 wrote to memory of 2084 2016 net.exe 32 PID 2016 wrote to memory of 2084 2016 net.exe 32 PID 2600 wrote to memory of 2520 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2520 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 33 PID 2600 wrote to memory of 2520 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2924 2520 net.exe 35 PID 2520 wrote to memory of 2924 2520 net.exe 35 PID 2520 wrote to memory of 2924 2520 net.exe 35 PID 2600 wrote to memory of 2596 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 36 PID 2600 wrote to memory of 2596 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 36 PID 2600 wrote to memory of 2596 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 36 PID 2596 wrote to memory of 2272 2596 net.exe 38 PID 2596 wrote to memory of 2272 2596 net.exe 38 PID 2596 wrote to memory of 2272 2596 net.exe 38 PID 2600 wrote to memory of 2480 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 39 PID 2600 wrote to memory of 2480 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 39 PID 2600 wrote to memory of 2480 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 39 PID 2480 wrote to memory of 2876 2480 net.exe 41 PID 2480 wrote to memory of 2876 2480 net.exe 41 PID 2480 wrote to memory of 2876 2480 net.exe 41 PID 2600 wrote to memory of 2896 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 42 PID 2600 wrote to memory of 2896 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 42 PID 2600 wrote to memory of 2896 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 42 PID 2896 wrote to memory of 2908 2896 net.exe 44 PID 2896 wrote to memory of 2908 2896 net.exe 44 PID 2896 wrote to memory of 2908 2896 net.exe 44 PID 2600 wrote to memory of 3044 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 45 PID 2600 wrote to memory of 3044 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 45 PID 2600 wrote to memory of 3044 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 45 PID 3044 wrote to memory of 2788 3044 net.exe 47 PID 3044 wrote to memory of 2788 3044 net.exe 47 PID 3044 wrote to memory of 2788 3044 net.exe 47 PID 2600 wrote to memory of 2752 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 48 PID 2600 wrote to memory of 2752 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 48 PID 2600 wrote to memory of 2752 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 48 PID 2752 wrote to memory of 2856 2752 net.exe 50 PID 2752 wrote to memory of 2856 2752 net.exe 50 PID 2752 wrote to memory of 2856 2752 net.exe 50 PID 2600 wrote to memory of 2840 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 51 PID 2600 wrote to memory of 2840 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 51 PID 2600 wrote to memory of 2840 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 51 PID 2840 wrote to memory of 2468 2840 net.exe 53 PID 2840 wrote to memory of 2468 2840 net.exe 53 PID 2840 wrote to memory of 2468 2840 net.exe 53 PID 2600 wrote to memory of 2760 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 54 PID 2600 wrote to memory of 2760 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 54 PID 2600 wrote to memory of 2760 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 54 PID 2600 wrote to memory of 2820 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 56 PID 2600 wrote to memory of 2820 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 56 PID 2600 wrote to memory of 2820 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 56 PID 2600 wrote to memory of 2816 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 58 PID 2600 wrote to memory of 2816 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 58 PID 2600 wrote to memory of 2816 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 58 PID 2600 wrote to memory of 2808 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 60 PID 2600 wrote to memory of 2808 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 60 PID 2600 wrote to memory of 2808 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 60 PID 2600 wrote to memory of 2636 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 62 PID 2600 wrote to memory of 2636 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 62 PID 2600 wrote to memory of 2636 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 62 PID 2600 wrote to memory of 1996 2600 c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:2084
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2924
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2272
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2876
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2908
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2788
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2856
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2468
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2760
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2820
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2816
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2808
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:2636
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1996
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1984
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:2376
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1316
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:1324
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1608
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1236
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2960
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2744
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:560
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1328
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:484
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:588
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2860
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2824
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:548
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1356
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:292
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1256
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1676
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:2356
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2060
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:2372
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1160
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1864
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:2432
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2248
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2616
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2232
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:404
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:2740
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:3060
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1944
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1632
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1936
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1320
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1672
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2412
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2176
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1588
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2876
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c7498625660600d7277d186038c05fa
SHA1144ea5eccf0824e9c30681f64c25224753886533
SHA2561da21b2c48b5e60b2e6ced94b990c73a0644fc147cc13b38c022a9f1c058ad3c
SHA51232ee4b3ba5a1c86ee47be70428204af3f30f865eba33693a235dd7c6ae51d33369b4a486ee41e837c8fbe117edf54ba0cd01b1535a369c14683ca833768d4e92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58475082a9d89524049c6dde60cc961db
SHA18dc4c9fd3f006740eb7a56ef8046fb56bee3dee7
SHA256b8a467b931a33241b57beaeb6f6b4938ff76e69e9f3b71dbd3734ca0108323dc
SHA512edbd4942d7f65a7e772d2895556ff2af74740226620bafa7103bbf4f6f362af6a93c8c506ffc39e2d680ae1aed6a024fcc29ba9fce4e8f3b4b3c0f33fb5a3a32