Analysis
-
max time kernel
138s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 11:09
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe
-
Size
15KB
-
MD5
1983ead6d04607d63ca056ec796fb87f
-
SHA1
a437a10a281b78b7e7d87049a7864ed9fb2dc765
-
SHA256
74e35db0e018a83a1002237e7521e2cc0f2d03c6befa319d2b55c68f248f5bbd
-
SHA512
f4c195487428ed46830bf5047c87614d575adb871e8e8e32bb9eb9806be07b8076a78903288b5d7323e5930f5a4b7ef914bd25b0c5d7dc59dad7c445441e6c8b
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
nancy.chen@exxacitcorp.com - Password:
LifeDram2021
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe\"" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4032-10-0x0000000006770000-0x00000000067DA000-memory.dmp family_agenttesla behavioral2/memory/584-36-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/520-40-0x00000000004374CE-mapping.dmp family_agenttesla behavioral2/memory/3944-67-0x00000000004374CE-mapping.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Drops startup file 2 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe = "0" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe = "0" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe" SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exepid process 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription pid process target process PID 4032 set thread context of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 set thread context of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 set thread context of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 set thread context of 3264 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 set thread context of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exepowershell.exepowershell.exepowershell.exepowershell.exeSecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exeSecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exepid process 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 2064 powershell.exe 1948 powershell.exe 2160 powershell.exe 2772 powershell.exe 584 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 584 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 3944 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 3944 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe 2772 powershell.exe 2064 powershell.exe 2160 powershell.exe 1948 powershell.exe 2160 powershell.exe 1948 powershell.exe 2772 powershell.exe 2064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exepowershell.exepowershell.exepowershell.exepowershell.exeSecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exeSecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription pid process Token: SeDebugPrivilege 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 2160 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 1948 powershell.exe Token: SeDebugPrivilege 584 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe Token: SeDebugPrivilege 3944 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exepid process 3944 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exedescription pid process target process PID 4032 wrote to memory of 2160 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2160 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2160 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2064 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2064 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2064 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 1948 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 1948 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 1948 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2772 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2772 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 2772 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe powershell.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 584 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 520 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 2744 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3264 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3264 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3264 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3264 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe PID 4032 wrote to memory of 3944 4032 SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.lm.22420.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
4f23dc4a215e434be37c934fdcf96e6b
SHA162a799d9590d96ae703a35717fad9c04d487c265
SHA25675b456e4fbd4da3757d670c287529d954e6ba71c3486aa4963ce03c2543d7681
SHA512368636f77bb57f2fdf011fa8d6f43965a812eebf725df81a87fb57c69b18b20f3e4b6c192697c046c818bb065774516dcca774c2d1f9bf0571ed404f81eb9ef8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
e8806a753907fd0ed06f329d642babbd
SHA140da540aba46e455e19adc11643a3f542126e1fa
SHA256131609d8006b047d9c24287aec414640633c1f197568fd42cd3e1976f9176baa
SHA5122b1382fa6ac1cacef5e0462a1bf0b01dc05c9718195eb5e2323392b6079af5a041a9d82c1808b5fca3af1a137aef0caceeb7b1f06ee506fffc3703954f4adc74
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
25abdd12499d12b65d11355df32a7c5d
SHA12d27956cff125c8e109f3e23dec0c658ee3ef71d
SHA256358fb25ff28961432a745f914f85f2a018d2e55ef70b2c066b7577445ddcdd37
SHA512321d109078004924fd8c3109e148efdb145c0630e259ad32a14d374d19cc3a9d082313ac0e2330154d140b276439538c95e938fb034daabe8b625ec8b4054338
-
memory/520-79-0x0000000001240000-0x0000000001241000-memory.dmpFilesize
4KB
-
memory/520-43-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/520-40-0x00000000004374CE-mapping.dmp
-
memory/584-37-0x00000000004374CE-mapping.dmp
-
memory/584-74-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/584-39-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/584-36-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1948-101-0x000000007F160000-0x000000007F161000-memory.dmpFilesize
4KB
-
memory/1948-102-0x0000000009400000-0x0000000009433000-memory.dmpFilesize
204KB
-
memory/1948-42-0x00000000075A0000-0x00000000075A1000-memory.dmpFilesize
4KB
-
memory/1948-14-0x0000000000000000-mapping.dmp
-
memory/1948-18-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/1948-149-0x0000000004B63000-0x0000000004B64000-memory.dmpFilesize
4KB
-
memory/1948-93-0x00000000086C0000-0x00000000086C1000-memory.dmpFilesize
4KB
-
memory/1948-34-0x0000000004B62000-0x0000000004B63000-memory.dmpFilesize
4KB
-
memory/1948-85-0x00000000076D0000-0x00000000076D1000-memory.dmpFilesize
4KB
-
memory/1948-32-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/1948-151-0x00000000098D0000-0x00000000098D1000-memory.dmpFilesize
4KB
-
memory/2064-19-0x0000000006ED0000-0x0000000006ED1000-memory.dmpFilesize
4KB
-
memory/2064-30-0x00000000070B2000-0x00000000070B3000-memory.dmpFilesize
4KB
-
memory/2064-28-0x00000000070B0000-0x00000000070B1000-memory.dmpFilesize
4KB
-
memory/2064-22-0x00000000076F0000-0x00000000076F1000-memory.dmpFilesize
4KB
-
memory/2064-148-0x00000000070B3000-0x00000000070B4000-memory.dmpFilesize
4KB
-
memory/2064-89-0x0000000007D40000-0x0000000007D41000-memory.dmpFilesize
4KB
-
memory/2064-13-0x0000000000000000-mapping.dmp
-
memory/2064-16-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/2064-105-0x000000007E4C0000-0x000000007E4C1000-memory.dmpFilesize
4KB
-
memory/2160-29-0x0000000003890000-0x0000000003891000-memory.dmpFilesize
4KB
-
memory/2160-147-0x0000000003893000-0x0000000003894000-memory.dmpFilesize
4KB
-
memory/2160-143-0x0000000009C00000-0x0000000009C01000-memory.dmpFilesize
4KB
-
memory/2160-116-0x000000007E820000-0x000000007E821000-memory.dmpFilesize
4KB
-
memory/2160-12-0x0000000000000000-mapping.dmp
-
memory/2160-31-0x0000000003892000-0x0000000003893000-memory.dmpFilesize
4KB
-
memory/2160-159-0x0000000009BA0000-0x0000000009BA1000-memory.dmpFilesize
4KB
-
memory/2160-17-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/2744-48-0x00000000004374CE-mapping.dmp
-
memory/2744-50-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/2772-112-0x000000007E520000-0x000000007E521000-memory.dmpFilesize
4KB
-
memory/2772-131-0x0000000008020000-0x0000000008021000-memory.dmpFilesize
4KB
-
memory/2772-21-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/2772-33-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/2772-75-0x00000000078F0000-0x00000000078F1000-memory.dmpFilesize
4KB
-
memory/2772-150-0x0000000000FC3000-0x0000000000FC4000-memory.dmpFilesize
4KB
-
memory/2772-35-0x0000000000FC2000-0x0000000000FC3000-memory.dmpFilesize
4KB
-
memory/2772-136-0x0000000008E60000-0x0000000008E61000-memory.dmpFilesize
4KB
-
memory/2772-15-0x0000000000000000-mapping.dmp
-
memory/2772-51-0x0000000007630000-0x0000000007631000-memory.dmpFilesize
4KB
-
memory/3264-54-0x00000000004374CE-mapping.dmp
-
memory/3944-67-0x00000000004374CE-mapping.dmp
-
memory/3944-70-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/3944-141-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/3944-173-0x00000000050D1000-0x00000000050D2000-memory.dmpFilesize
4KB
-
memory/3944-84-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/4032-8-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/4032-9-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/4032-2-0x0000000073940000-0x000000007402E000-memory.dmpFilesize
6.9MB
-
memory/4032-41-0x0000000006A80000-0x0000000006A81000-memory.dmpFilesize
4KB
-
memory/4032-11-0x0000000006850000-0x0000000006851000-memory.dmpFilesize
4KB
-
memory/4032-7-0x0000000005790000-0x0000000005791000-memory.dmpFilesize
4KB
-
memory/4032-6-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/4032-5-0x0000000005A90000-0x0000000005A91000-memory.dmpFilesize
4KB
-
memory/4032-3-0x0000000000CF0000-0x0000000000CF1000-memory.dmpFilesize
4KB
-
memory/4032-10-0x0000000006770000-0x00000000067DA000-memory.dmpFilesize
424KB