Analysis
-
max time kernel
136s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
winnt64.exe
Resource
win11-20240611-en
Errors
General
-
Target
winnt64.exe
-
Size
188KB
-
MD5
aa992d93467882ff211f211495e6c545
-
SHA1
75a1a182af719168b9ca7b9c42282b997f82d443
-
SHA256
dadd54e1c3b0496d3a49e112da7c3d71255037df9ba27b890131330b42eabf88
-
SHA512
54d07b5f123b20128459de04694ed295275498c646fef596830c2c98ff1a8fa4741c95ce72be6d59a713fc6d7d7365c4f13eace2ed6bf357ebef44885b882d5d
-
SSDEEP
3072:vV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPTYEbXEC+gwNDF/Kjs:it5hBPi0BW69hd1MMdxPe9N9uA069TBk
Malware Config
Signatures
-
Possible privilege escalation attempt 14 IoCs
Processes:
icacls.exeicacls.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exepid process 1612 icacls.exe 540 icacls.exe 916 icacls.exe 856 takeown.exe 3344 icacls.exe 1992 icacls.exe 408 takeown.exe 1724 takeown.exe 2964 takeown.exe 2676 takeown.exe 1576 icacls.exe 4176 icacls.exe 1676 takeown.exe 4800 takeown.exe -
Modifies file permissions 1 TTPs 14 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exepid process 1676 takeown.exe 1576 icacls.exe 4800 takeown.exe 1612 icacls.exe 540 icacls.exe 856 takeown.exe 2964 takeown.exe 3344 icacls.exe 1992 icacls.exe 1724 takeown.exe 2676 takeown.exe 916 icacls.exe 4176 icacls.exe 408 takeown.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Drops file in Program Files directory 64 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\DELETE~1\MICROS~4.SCA\SNIPPI~1\Assets\SQUARE~2.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MICROS~4.0_X\Assets\CONTRA~2\APAE12~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\CONTRA~1\HXF724~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\HxA-Yahoo-Dark.scale-400.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\HXCALE~3.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MICAAC~1.0_X\Assets\AppTiles\CONTRA~1\MapsAppList.targetsize-24_altform-lightunplated_contrast-black.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MIFEE6~1.0_X\Assets\CONTRA~2\NotepadAppList.targetsize-48.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI0171~1.0_X\WebviewOffline.html cmd.exe File opened for modification C:\Program Files\WindowsApps\MI914F~1.0_X\Images\SQ22F9~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI0BB2~1.SCA\Assets\CONTRA~2\SPLASH~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\DELETE~1\MICROS~4.SCA\Assets\CONTRA~2\SNIPSK~2.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\DELETE~1\MI6273~1.SCA\Assets\CONTRA~2\SMALLL~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MIF8B8~1.0_X\Assets\WideTile.scale-125.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI91CD~1.0_X\Assets\CONTRA~2\PA93B0~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MIF169~1.0_X\Assets\PhotosAppList.targetsize-20_altform-lightunplated_contrast-black.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3CE1~1.0_X\Assets\AL64B1~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\OUAC55~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MIFEE6~1.0_X\Assets\CONTRA~1\NO40C8~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\DELETE~1\MI1EC6~1.SCA\Assets\CONTRA~2\CAMERA~3.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI369D~1.0_X\Assets\TIMER3~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\HxMailAppList.targetsize-16.png cmd.exe File opened for modification C:\Program Files\WindowsApps\DELETE~1\MIA2D3~1.SCA\Assets\CONTRA~2\CAMERA~3.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI0311~1.0_X\Images\POWERA~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\CONTRA~1\HxCalendarAppList.targetsize-72.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI914F~1.0_X\Images\Square44x44Logo.targetsize-40.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\react\lib-amd\SEARCH~1.JS cmd.exe File opened for modification C:\Program Files\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\react\LIB-CO~1\Panel.js cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3CE1~1.0_X\Assets\AlarmsAppList.targetsize-36_altform-unplated_contrast-black.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI914F~1.0_X\Images\STOREL~4.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI1864~1.0_X\Assets\CONTRA~1\OR8C3E~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MIBF04~1.SCA\Assets\AppPackageSmallTile.scale-100.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI05D6~1.SCA\Win10\CONTRA~2\MI9C7B~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI0311~1.0_X\Images\CONTRA~2\PO38CE~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI16D7~1.0_X\Assets\CONTRA~1\AppList.targetsize-24_altform-unplated_contrast-black.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MIC72E~1.SCA\APPXMA~1.XML cmd.exe File opened for modification C:\Program Files\WindowsApps\MI01ED~1.SCA\Assets\FEF02E~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI91CD~1.0_X\Assets\PaintAppList.targetsize-30_altform-lightunplated.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI369D~1.0_X\SNIPPI~1\Assets\Square44x44Logo.targetsize-256_altform-lightunplated.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MIF169~1.0_X\AppCS\Assets\DEVICE~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\PHONE-~2.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI98F9~1.0_X\Assets\CONTRA~2\SplashScreen.scale-125_contrast-white.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\theme\NODE_M~1\@UIFAB~1\UTILIT~1\lib\dom\SETVIR~1.JS cmd.exe File opened for modification C:\Program Files\WindowsApps\MI369D~1.0_X\SNIPPI~1\Assets\Square44x44Logo.targetsize-48_altform-lightunplated.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI1677~1.0_N\APPXSI~1.P7X cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\HXA-EX~4.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\LinkedInboxWideTile.scale-400.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MICAAC~1.0_X\Assets\AppTiles\CONTRA~2\MA73F5~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MICROS~1.9_X\DASHBO~1\WEBCON~1\NODE_M~1\@FLUEN~1\theme\NODE_M~1\@UIFAB~1\UTILIT~1\LIB-CO~1\dom\PORTAL~1.JS cmd.exe File opened for modification C:\Program Files\WindowsApps\MI369D~1.0_X\Assets\CONTRA~2\SN0352~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI9463~1.0_X\Assets\AppList.targetsize-72.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MIF169~1.0_X\Assets\PHC15A~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\CONTRA~1\HXMAIL~4.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MIBF04~1.SCA\APPXMA~1.XML cmd.exe File opened for modification C:\Program Files\WindowsApps\MI91CD~1.0_X\Assets\CONTRA~1\PaintAppList.targetsize-60_altform-lightunplated.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI91CD~1.0_X\Assets\CONTRA~2\PA9479~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3CE1~1.0_X\Assets\AL6320~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI4490~1.0_X\Assets\CONTRA~1\AppList.targetsize-48_altform-unplated_contrast-black.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI1864~1.0_X\Assets\CONTRA~1\AppList.targetsize-72_altform-unplated_contrast-black.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MIDBBC~1.0_X\APPXME~1\CODEIN~1.CAT cmd.exe File opened for modification C:\Program Files\WindowsApps\MIB101~1.0_X\Assets\Icons\STICKY~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI8B91~1.SCA\Images\CONTRA~1\PowerAutomateSquare150x150Logo.scale-100.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI0311~1.0_X\Images\CONTRA~1\PO6842~1.PNG cmd.exe File opened for modification C:\Program Files\WindowsApps\MI47E1~1.0_X\Assets\AppTiles\CONTRA~2\StoreSplashScreen.scale-200.png cmd.exe File opened for modification C:\Program Files\WindowsApps\MI3116~1.0_X\images\OUA81D~1.PNG cmd.exe -
Drops file in Windows directory 64 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorAppList.targetsize-16_altform-unplated_contrast-white.png cmd.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorWideTile.scale-200_contrast-white.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\HCWhite_Search_TraySearchBox_Glyph_100.png cmd.exe File opened for modification C:\Windows\SystemApps\MICROS~1.SEC\pris\resources.fi-FI.pri cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\FILEEX~1\Assets\images\CONTRA~1\windows.invertselection.svg cmd.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\splashscreen.scale-400.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\js\oobewelcome-vm.js cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\oobeupdatesettings-main.html cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AppxBlockMap.xml cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\GUIDED~1\network\AREA-C~1\zh-TW\area-content.local.json cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\toolwindow.f12.css cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\TEMPLA~1\js\common-textinput-vm.js cmd.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorAppList.targetsize-36.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\memoryAnalyzer\memoryAnalyzerRemote.bundle.js cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.FileExplorer_cw5n1h2txyewy\Assets\SquareTile44x44.targetsize-96_altform-unplated_contrast-white_devicefamily-colorfulunplated.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\FILEEX~1\Assets\images\CONTRA~2\THEME-~1\windows.addnetworklocation.svg cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\GUIDED~1\network\AREA-C~1\pt-PT\area-content.local.json cmd.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\TileSmall.contrast-black_scale-125.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.AccountsControl_cw5n1h2txyewy\Assets\SplashScreen.Theme-Dark_Scale-180.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\Assets\PeopleLogo.targetsize-48_altform-unplated.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.FilePicker_cw5n1h2txyewy\pris\resources.en-US.pri cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Cortana.UI\Assets\Icons\AppListIcon.scale-100.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\VALUEB~1\Assets\Images\OneDrive_Logo.svg cmd.exe File opened for modification C:\Windows\SystemApps\MICROS~1.SEC\Assets\SplashScreen.contrast-white_scale-200.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\FILEEX~1\Assets\images\CONTRA~3\SortBy.svg cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\Ratings\RatingStars49.contrast-black_scale-200.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\dom\images\i_show_layout.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\AppxBlockMap.xml cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\FILEEX~1\Assets\images\CONTRA~2\THEME-~2\windows.previewpane.svg cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\Ratings\RatingStars45.contrast-black_scale-200.png cmd.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorMedTile.scale-150_contrast-white.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Cortana.UI\Assets\splashscreen.scale-80.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\GUIDED~1\network\AREA-C~1\id-ID\area-content.local.json cmd.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\logo.targetsize-60.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\Microsoft.WinJS-reduced\css\ui-dark.css cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\RetailDemo\retailDemoSetup.html cmd.exe File opened for modification C:\Windows\SystemApps\MICROS~1.SEC\Assets\SplashScreen.contrast-white_scale-400.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\CONTRA~2\GetStartedMedTile.scale-100_contrast-white.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\FILEEX~1\Assets\images\CONTRA~1\windows.ribbondelete.svg cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\media\oobe-update-settings.svg cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.FilePicker_cw5n1h2txyewy\Assets\SquareTile310x150.scale-400.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.FileExplorer_cw5n1h2txyewy\Assets\Folder_Small.scale-200.png cmd.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorAppList.targetsize-48_altform-unplated_contrast-white.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\CONTRA~1\GetStartedAppList.targetsize-96_contrast-black.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\CONTRA~2\GetStartedAppList.targetsize-30_altform-unplated_contrast-white.png cmd.exe File opened for modification C:\Windows\SystemApps\microsoft.creddialoghost_cw5n1h2txyewy\Assets\Splashscreen.scale-100.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\resources.pri cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\GUIDED~1\network\AREA-C~1\mk-MK\area-content.local.json cmd.exe File opened for modification C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\Windows.UI.ActionCenter.dll cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\FILEEX~1\Assets\images\CONTRA~2\THEME-~2\DisplaySettings.svg cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\GUIDED~1\network\AREA-C~1\el-GR\area-content.local.json cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\CONTRA~2\GetStartedStoreLogo.scale-400_contrast-white.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchUx.MiniUI.winmd cmd.exe File opened for modification C:\Windows\SystemApps\Windows.CBSPreview_cw5n1h2txyewy\Assets\Wide310x150Logo.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\images\columnmove.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\Microsoft.CloudExperienceHost.dll cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\SplashScreen.contrast-black_scale-140.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.FileExplorer_cw5n1h2txyewy\Assets\SquareTile150x150.scale-200.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Cortana.UI\Assets\Icons\CONTRA~1\AppListIcon.targetsize-64.png cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\FILEEX~1\Assets\images\CONTRA~3\windows.shortcut.opencontaining.svg cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\webapps\GUIDED~1\network\AREA-C~1\mt-MT\area-content.local.json cmd.exe File opened for modification C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\WebHost.winmd cmd.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\assets\NarratorAppList.targetsize-24.png cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Resources\Colors_Dark.xbf cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Taskmgr.exeTaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4976 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 5000 taskkill.exe -
Modifies registry class 64 IoCs
Processes:
notepad.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\MRUListEx = ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\NodeSlot = "4" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 = 5600310000000000cb58b5ae100057696e646f777300400009000400efbec5522d60e1583b132e000000a6050000000001000000000000000000000000000000108b4700570069006e0064006f0077007300000016000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 19002f433a5c000000000000000000000000000000000000000000 notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\NodeSlot = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg notepad.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU notepad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" notepad.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 00000000ffffffff notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Taskmgr.exeTaskmgr.exepid process 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
notepad.exepid process 3592 notepad.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetaskkill.exeTaskmgr.exeTaskmgr.exepowershell.exedescription pid process Token: SeTakeOwnershipPrivilege 856 takeown.exe Token: SeTakeOwnershipPrivilege 408 takeown.exe Token: SeTakeOwnershipPrivilege 2964 takeown.exe Token: SeTakeOwnershipPrivilege 1676 takeown.exe Token: SeTakeOwnershipPrivilege 4800 takeown.exe Token: SeTakeOwnershipPrivilege 2676 takeown.exe Token: SeDebugPrivilege 5000 taskkill.exe Token: SeDebugPrivilege 4808 Taskmgr.exe Token: SeSystemProfilePrivilege 4808 Taskmgr.exe Token: SeCreateGlobalPrivilege 4808 Taskmgr.exe Token: 33 4808 Taskmgr.exe Token: SeIncBasePriorityPrivilege 4808 Taskmgr.exe Token: SeDebugPrivilege 2968 Taskmgr.exe Token: SeSystemProfilePrivilege 2968 Taskmgr.exe Token: SeCreateGlobalPrivilege 2968 Taskmgr.exe Token: SeDebugPrivilege 112 powershell.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
Processes:
Taskmgr.exeTaskmgr.exepid process 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 4808 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe 2968 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
notepad.exepid process 3592 notepad.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
winnt64.execmd.exenotepad.exeTaskmgr.exedescription pid process target process PID 1920 wrote to memory of 2912 1920 winnt64.exe cmd.exe PID 1920 wrote to memory of 2912 1920 winnt64.exe cmd.exe PID 2912 wrote to memory of 856 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 856 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 4176 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 4176 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 408 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 408 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 3344 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 3344 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 2964 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 2964 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 1992 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 1992 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 1676 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 1676 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 1612 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 1612 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 4800 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 4800 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 540 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 540 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 1724 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 1724 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 1576 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 1576 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 2676 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 2676 2912 cmd.exe takeown.exe PID 2912 wrote to memory of 916 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 916 2912 cmd.exe icacls.exe PID 2912 wrote to memory of 5000 2912 cmd.exe taskkill.exe PID 2912 wrote to memory of 5000 2912 cmd.exe taskkill.exe PID 2912 wrote to memory of 3592 2912 cmd.exe notepad.exe PID 2912 wrote to memory of 3592 2912 cmd.exe notepad.exe PID 3592 wrote to memory of 4808 3592 notepad.exe Taskmgr.exe PID 3592 wrote to memory of 4808 3592 notepad.exe Taskmgr.exe PID 4808 wrote to memory of 2968 4808 Taskmgr.exe Taskmgr.exe PID 4808 wrote to memory of 2968 4808 Taskmgr.exe Taskmgr.exe PID 2912 wrote to memory of 4976 2912 cmd.exe timeout.exe PID 2912 wrote to memory of 4976 2912 cmd.exe timeout.exe PID 2912 wrote to memory of 1840 2912 cmd.exe msg.exe PID 2912 wrote to memory of 1840 2912 cmd.exe msg.exe PID 2912 wrote to memory of 112 2912 cmd.exe powershell.exe PID 2912 wrote to memory of 112 2912 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\winnt64.exe"C:\Users\Admin\AppData\Local\Temp\winnt64.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\35C5.tmp\35C6.tmp\35C7.bat C:\Users\Admin\AppData\Local\Temp\winnt64.exe"2⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\ntoskrnl.exe"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\ntoskrnl.exe" /grant everyone:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\hal.dll"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\hal.dll" /grant everyone:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\ci.dll"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\ci.dll" /grant everyone:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\winload.efi"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\System32\winload.efi" /grant everyone:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\WindowsApps"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\WindowsApps" /grant everyone:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\SystemApps"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\SystemApps" /grant everyone:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\ImmersiveControlPanel"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\ImmersiveControlPanel" /grant everyone:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\notepad.exenotepad.exe3⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"4⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe" /15⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\timeout.exetimeout /t 30 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\msg.exemsg * ITS TOO LATE TO REPAIR YOUR PC! I'VE PROBABLY HANGED YOUR PC HAHAHAHA3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell wininit3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wininit.exe"C:\Windows\system32\wininit.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\D3DSCache\ecbf0d5a3a180bb\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idxFilesize
64KB
MD5c27c1374edd5b819ac9f67c91d286373
SHA16768048f19f4dd2a3ab401e9f0b57570601f24a8
SHA256a2d78e1e44733d24842f4e3a4fb86abd35219df6f6e90393c59abe99e1bb9ec0
SHA51282bda0747e2e965f9e7a24ae494342af3f96043609eee38db74d18a3da0ddb0c2dabbb23c3f9223e5d0e89256b0b7a4ae0a0537966dd57a181a4505ad8a462c3
-
C:\Users\Admin\AppData\Local\D3DSCache\ecbf0d5a3a180bb\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\ecbf0d5a3a180bb\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.valFilesize
960B
MD54f55be8451c1090c2a54a50d79243cfb
SHA1f1a94bc446b6ae32300ada858fb251667a17b71d
SHA2561b8257869915ac04445cb4bfdc0e0fc03db80efb96da98c49e7cbc4097bc28a2
SHA512b87403fc4ab05cd4dd092d0707cd0dd22f927c65dcf73bce6f6bf2731f0572e089697908eeb377617c9f2531fdb3a495087feafb31871ea9a6f472a45d9d20f6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD500b3ce0e658cf92f7ea6ed8e36f76966
SHA17109d316553b321577fe6090df84d7182aafa590
SHA25676b1b9ebbd2b4b90dd4447c698ee7c76ef2a75399a0f33ccb79b1389f679378a
SHA512eb7998a902bd25847219db3f1800efa94235ee2d62077468993160346255fcfa8acc1b2918aae01cf052c02b9e385b3ec3faf61a425d5924c6709586f87be893
-
C:\Users\Admin\AppData\Local\Temp\35C5.tmp\35C6.tmp\35C7.batFilesize
1KB
MD5c7b7a1bdb6c0ed883395fb5c63fcf775
SHA12cb74dbd18ff3cb8d8df73abbb2e801964925348
SHA2560d4be7c8c1ea9439dcd902e072da04a8b3cc0823c596749dbb8e23382973464c
SHA512acc6bff3eca0c42f7fe410df3744a6d714ab2263aead18a1bed6e7a29772891bd190888b576e0044f7eebdff8a22903d821c486733792efd94e1d16d3380296d
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g3tita52.edg.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/112-36-0x0000014AB3AA0000-0x0000014AB3AC2000-memory.dmpFilesize
136KB
-
memory/4808-5-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-15-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-14-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-13-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-11-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-16-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-17-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-12-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-6-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB
-
memory/4808-7-0x0000019F0AEF0000-0x0000019F0AEF1000-memory.dmpFilesize
4KB